Keyed hash function based on a chaotic map
From MaRDI portal
Recommendations
- Hash function based on chaotic map lattices
- A keyed hash function based on the modified coupled chaotic map lattice
- Hash function based on piecewise nonlinear chaotic map
- A fast and efficient chaos-based keyed hash function
- Chaos Based Hash Function
- Parallel keyed hash function construction based on chaotic maps
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter
- Hash functions using chaotic iterations
- Cryptanalysis on a parallel keyed hash function based on chaotic maps
Cites work
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 1052006 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- scientific article; zbMATH DE number 1857538 (Why is no real title available?)
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
- A combined chaotic cryptographic and hashing scheme
- A novel combined cryptographic and hash algorithm based on chaotic control character
- Analysis and improvement of a chaos-based hash function construction
- Analysis of some recently proposed chaos-based encryption algorithms
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Communication Theory of Secrecy Systems*
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- Cryptography with chaos
- Generating Chaotic Secure Sequences with Desired Statistical Properties and High Security
- Hash function based on piecewise nonlinear chaotic map
- How to Break MD5 and Other Hash Functions
- IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS
- Keyed hash functions
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- One Way Hash Functions and DES
- One-way hash function construction based on 2D coupled map lattices
- One-way hash function construction based on the chaotic map with changeable-parameter
- Predicting a chaotic time series using a fuzzy neural network
- Random number generators and causality
- STEPS TOWARD UNMASKING SECURE COMMUNICATIONS
- Search-based chaotic pseudorandom bit generator
- TestU01
- UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME
Cited in
(24)- Hash functions using chaotic iterations
- On the security of digital signature protocol based on iterated function systems
- Constructing chaos-based hash function via parallel impulse perturbation
- An ANN-based scalable hashing algorithm for computational clouds with schedulers
- scientific article; zbMATH DE number 2000417 (Why is no real title available?)
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter
- On the inadequacy of multimodal maps for cryptographic hash applications with phase-space modulation
- A fast and efficient chaos-based keyed hash function
- JERIM-320: a 320-bit hash function with dual applications -- a statistical analysis
- A more secure parallel keyed hash function based on chaotic neural network
- A nondegenerate \(n\)-dimensional hyperchaotic map model with application in a keyed parallel hash function
- On the cryptanalysis of two cryptographic algorithms that utilize chaotic neural networks
- Constructing a nondegenerate 2D integer-domain hyperchaotic map over \(\mathrm{GF}(2^n)\) with application in parallel hashing
- Parallel keyed hash function construction based on chaotic maps
- Chaos Based Hash Function
- A keyed hash function based on the modified coupled chaotic map lattice
- A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- A structure-based chaotic hashing scheme
- A novel keyed parallel hashing scheme based on a new chaotic system
- scientific article; zbMATH DE number 1717237 (Why is no real title available?)
- 2D hash chain robust random key distribution scheme
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
- scientific article; zbMATH DE number 5582954 (Why is no real title available?)
This page was built for publication: Keyed hash function based on a chaotic map
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q425540)