Analysis and improvement of a chaos-based hash function construction
From MaRDI portal
Publication:718239
DOI10.1016/j.cnsns.2009.05.065zbMath1221.94043OpenAlexW2065690797MaRDI QIDQ718239
Di Xiao, Shaojiang Deng, Yan Tao Li
Publication date: 23 September 2011
Published in: Communications in Nonlinear Science and Numerical Simulation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cnsns.2009.05.065
Related Items (22)
A structure-based chaotic hashing scheme ⋮ Chaotic hash function based on the dynamic S-box with variable parameters ⋮ HASH FUNCTION CONSTRUCTION BASED ON THE CHAOTIC LOOK-UP TABLE WITH CHANGEABLE PARAMETER ⋮ Chaotic hash function based on circular shifts with variable parameters ⋮ Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol ⋮ Constructing keyed hash algorithm using enhanced chaotic map with varying parameter ⋮ Keyed hash function based on a chaotic map ⋮ A keyed hash function based on the modified coupled chaotic map lattice ⋮ Efficiency and security problems of anonymous key agreement protocol based on chaotic maps ⋮ On the non-negative impulse response of multi-dimensional systems ⋮ A new digital signature scheme based on chaotic maps ⋮ Design and Analysis on a Parallel Chaos-Based Hash Function ⋮ Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ An efficient online/offline ID-based short signature procedure using extended chaotic maps ⋮ Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing ⋮ An anonymous key agreement protocol based on chaotic maps ⋮ An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map ⋮ Parallel hash function construction based on coupled map lattices ⋮ An iterative constrained minimax approach to magnitude response design of FIR evidence filters ⋮ A revised key agreement protocol based on chaotic maps
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Parallel keyed hash function construction based on chaotic maps
- A novel combined cryptographic and hash algorithm based on chaotic control character
- One-way hash function construction based on the chaotic map with changeable-parameter
- A combined chaotic cryptographic and hashing scheme
- One-way hash function construction based on 2D coupled map lattices
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Communication Theory of Secrecy Systems*
- How to Break MD5 and Other Hash Functions
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
This page was built for publication: Analysis and improvement of a chaos-based hash function construction