Keyed hash function based on a chaotic map
From MaRDI portal
Publication:425540
DOI10.1016/j.ins.2011.09.008zbMath1239.94053OpenAlexW1974544592MaRDI QIDQ425540
Mohammed Almulla, Hamdi Yahyaoui, Ali Kanso
Publication date: 8 June 2012
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2011.09.008
Cryptography (94A60) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45)
Related Items
A structure-based chaotic hashing scheme ⋮ On the cryptanalysis of two cryptographic algorithms that utilize chaotic neural networks ⋮ Constructing keyed hash algorithm using enhanced chaotic map with varying parameter ⋮ A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map ⋮ Constructing chaos-based hash function via parallel impulse perturbation
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Hash function based on piecewise nonlinear chaotic map
- A novel combined cryptographic and hash algorithm based on chaotic control character
- Analysis and improvement of a chaos-based hash function construction
- Random number generators and causality
- One-way hash function construction based on the chaotic map with changeable-parameter
- Predicting a chaotic time series using a fuzzy neural network
- A combined chaotic cryptographic and hashing scheme
- Cryptography with chaos
- One-way hash function construction based on 2D coupled map lattices
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- IRREGULARLY DECIMATED CHAOTIC MAP(S) FOR BINARY DIGITS GENERATIONS
- TestU01
- Communication Theory of Secrecy Systems*
- STEPS TOWARD UNMASKING SECURE COMMUNICATIONS
- UNMASKING A MODULATED CHAOTIC COMMUNICATIONS SCHEME
- Generating Chaotic Secure Sequences with Desired Statistical Properties and High Security
- Chaos and cryptography: block encryption ciphers based on chaotic maps
- Keyed hash functions
- SEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATOR
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- ON THE DYNAMICAL DEGRADATION OF DIGITAL PIECEWISE LINEAR CHAOTIC MAPS
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
- Analysis of some recently proposed chaos-based encryption algorithms
- One Way Hash Functions and DES