Chaotic hash function based on circular shifts with variable parameters
From MaRDI portal
Publication:2410456
DOI10.1016/j.chaos.2016.08.014zbMath1372.94434OpenAlexW2509227418MaRDI QIDQ2410456
Publication date: 18 October 2017
Published in: Chaos, Solitons and Fractals (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.chaos.2016.08.014
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45)
Related Items (4)
Construction of one-way hash functions with increased key space using adaptive chaotic maps ⋮ Constructing keyed hash algorithm using enhanced chaotic map with varying parameter ⋮ Design and Analysis on a Parallel Chaos-Based Hash Function ⋮ One-Way Hash Function Based on Delay-Induced Hyperchaos
Uses Software
Cites Work
- Unnamed Item
- Pseudo random number generator based on quantum chaotic map
- A structure-based chaotic hashing scheme
- Chaotic hash function based on the dynamic S-box with variable parameters
- Improving the security of a parallel keyed hash function based on chaotic maps
- A novel keyed parallel hashing scheme based on a new chaotic system
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Hash function based on piecewise nonlinear chaotic map
- Cryptanalysis on a parallel keyed hash function based on chaotic maps
- A fast and efficient chaos-based keyed hash function
- Parallel keyed hash function construction based on chaotic maps
- Analysis and improvement of a chaos-based hash function construction
- Parallel hash function construction based on coupled map lattices
- A chaos-based hash function with both modification detection and localization capabilities
- A combined chaotic cryptographic and hashing scheme
- Collision analysis of one kind of chaos-based hash function
- One-way hash function construction based on 2D coupled map lattices
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- HASH FUNCTION CONSTRUCTION BASED ON THE CHAOTIC LOOK-UP TABLE WITH CHANGEABLE PARAMETER
- TestU01
- Communication Theory of Secrecy Systems*
- New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis
- Improving Local Collisions: New Attacks on Reduced SHA-256
- Keyed hash functions
- Finding Collisions in the Full SHA-1
This page was built for publication: Chaotic hash function based on circular shifts with variable parameters