Keyed hash function based on a chaotic map
From MaRDI portal
Publication:425540
DOI10.1016/J.INS.2011.09.008zbMATH Open1239.94053OpenAlexW1974544592MaRDI QIDQ425540FDOQ425540
M. Almulla, H. Yahyaoui, A. Kanso
Publication date: 8 June 2012
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2011.09.008
Recommendations
- Hash function based on chaotic map lattices
- A keyed hash function based on the modified coupled chaotic map lattice
- Hash function based on piecewise nonlinear chaotic map
- A fast and efficient chaos-based keyed hash function
- Chaos Based Hash Function
- Parallel keyed hash function construction based on chaotic maps
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter
- Hash functions using chaotic iterations
- Cryptanalysis on a parallel keyed hash function based on chaotic maps
Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Cryptography (94A60)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Communication Theory of Secrecy Systems*
- Title not available (Why is that?)
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME
- One Way Hash Functions and DES
- TestU01
- Cryptography with chaos
- One-way hash function construction based on the chaotic map with changeable-parameter
- A combined chaotic cryptographic and hashing scheme
- One-way hash function construction based on 2D coupled map lattices
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Hash function based on piecewise nonlinear chaotic map
- A novel combined cryptographic and hash algorithm based on chaotic control character
- Analysis and improvement of a chaos-based hash function construction
- Predicting a chaotic time series using a fuzzy neural network
- STEPS TOWARD UNMASKING SECURE COMMUNICATIONS
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Title not available (Why is that?)
- Keyed hash functions
- SEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATOR
- Analysis of some recently proposed chaos-based encryption algorithms
- Random number generators and causality
- IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS
- Generating Chaotic Secure Sequences with Desired Statistical Properties and High Security
Cited In (15)
- Title not available (Why is that?)
- A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map
- On the cryptanalysis of two cryptographic algorithms that utilize chaotic neural networks
- A structure-based chaotic hashing scheme
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Parallel keyed hash function construction based on chaotic maps
- Title not available (Why is that?)
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter
- Constructing chaos-based hash function via parallel impulse perturbation
- Title not available (Why is that?)
- Chaos Based Hash Function
- A nondegenerate \(n\)-dimensional hyperchaotic map model with application in a keyed parallel hash function
- Constructing a nondegenerate 2D integer-domain hyperchaotic map over \(\mathrm{GF}(2^n)\) with application in parallel hashing
- 2D hash chain robust random key distribution scheme
Uses Software
This page was built for publication: Keyed hash function based on a chaotic map
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q425540)