Improving the security of a parallel keyed hash function based on chaotic maps
From MaRDI portal
Recommendations
- A more secure parallel keyed hash function based on chaotic neural network
- Parallel keyed hash function construction based on chaotic maps
- Cryptanalysis on a parallel keyed hash function based on chaotic maps
- A novel keyed parallel hashing scheme based on a new chaotic system
- Design and Analysis on a Parallel Chaos-Based Hash Function
Cites work
- A combined chaotic cryptographic and hashing scheme
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Cryptanalysis on a parallel keyed hash function based on chaotic maps
- One-way hash function construction based on the chaotic map with changeable-parameter
- Parallel keyed hash function construction based on chaotic maps
Cited in
(14)- One-way hash function based on delay-induced hyperchaos
- Second preimage attack on a chaos-based hash function construction and its improvement
- Constructing chaos-based hash function via parallel impulse perturbation
- Cryptanalysis on a parallel keyed hash function based on chaotic maps
- A topological study of chaotic iterations application to hash functions
- A more secure parallel keyed hash function based on chaotic neural network
- Parallel keyed hash function construction based on chaotic maps
- A keyed hash function based on the modified coupled chaotic map lattice
- A structure-based chaotic hashing scheme
- Chaotic hash function based on the dynamic S-box with variable parameters
- A novel keyed parallel hashing scheme based on a new chaotic system
- Chaotic hash function based on circular shifts with variable parameters
- Design and Analysis on a Parallel Chaos-Based Hash Function
- A parallel encryption algorithm based on piecewise linear chaotic map
This page was built for publication: Improving the security of a parallel keyed hash function based on chaotic maps
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q407971)