One-way hash function construction based on 2D coupled map lattices
DOI10.1016/J.INS.2007.10.008zbMATH Open1134.68023OpenAlexW2069876656MaRDI QIDQ2476772FDOQ2476772
Authors: Yong Wang, Xiaofeng Liao, Di Xiao, Kwok-Wo Wong
Publication date: 12 March 2008
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2007.10.008
Recommendations
- One-way hash function construction based on a crossing coupled map lattice
- One-way Hash function construction based on composite chaotic maps
- One-way hash function based on a piecewise logistic chaotic map
- One-way hash function construction based on the chaotic map with changeable-parameter
- Efficient Constructions for One-Way Hash Chains
- scientific article; zbMATH DE number 177608
- Construction of one-way hash functions with increased key space using adaptive chaotic maps
- Parallel hash function construction based on coupled map lattices
Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Data encryption (aspects in computer science) (68P25) Cryptography (94A60)
Cites Work
- EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
- Determining Lyapunov exponents from a time series
- Title not available (Why is that?)
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME
- One-way hash function construction based on the chaotic map with changeable-parameter
- A combined chaotic cryptographic and hashing scheme
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Predicting a chaotic time series using a fuzzy neural network
- STEPS TOWARD UNMASKING SECURE COMMUNICATIONS
- A Secret Key Cryptosystem by Iterating a Chaotic Map
- Cryptosystems with discretized chaotic maps
- How to construct secure proxy cryptosystem
- Fingerprint images encryption via multi-scroll chaotic attractors
- A novel symmetrical cryptosystem based on discretized two-dimensional chaotic map
- Hashing via finite field
Cited In (27)
- Hash function construction based on time average moiré
- Spatiotemporal chaos in mixed linear-nonlinear two-dimensional coupled logistic map lattice
- A novel color image encryption algorithm based on spatial permutation and quantum chaotic map
- One-way hash function construction based on a crossing coupled map lattice
- Traveling waves and pattern formation for spatially discrete bistable reaction-diffusion equations
- Travelling waves for adaptive grid discretizations of reaction diffusion systems. I: Well-posedness
- Chaotic properties of a class of coupled mapping lattice induced by fuzzy mapping in non-autonomous discrete systems
- A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map
- A structure-based chaotic hashing scheme
- Keyed hash function based on a chaotic map
- A keyed hash function based on the modified coupled chaotic map lattice
- Hash function based on piecewise nonlinear chaotic map
- Chaotic hash function based on the dynamic S-box with variable parameters
- Analysis and improvement of a chaos-based hash function construction
- Parallel hash function construction based on coupled map lattices
- The design of keyed hash function based on CNN-MD structure
- A block cipher with dynamic S-boxes based on tent map
- A fast image encryption and authentication scheme based on chaotic maps
- A stream cipher algorithm based on 2D coupled map lattice and partitioned cellular automata
- Chaotic hash function based on circular shifts with variable parameters
- A new chaos mapping hash function structural method and its application
- On the inadequacy of multimodal maps for cryptographic hash applications with phase-space modulation
- A novel keyed parallel hashing scheme based on a new chaotic system
- A secure and improved self-embedding algorithm to combat digital document forgery
- Hash function construction based on the chaotic look-up table with changeable parameter
- A novel method to design S-box based on chaotic map and genetic algorithm
- A TCML-based spatiotemporal chaotic one-way hash function
Uses Software
This page was built for publication: One-way hash function construction based on 2D coupled map lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2476772)