A chaos-based hash function with both modification detection and localization capabilities
From MaRDI portal
Publication:720114
DOI10.1016/J.CNSNS.2009.10.012zbMATH Open1222.94040OpenAlexW2012771314MaRDI QIDQ720114FDOQ720114
Authors: Di Xiao, Frank Y. Shih, Xiaofeng Liao
Publication date: 13 October 2011
Published in: Communications in Nonlinear Science and Numerical Simulation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cnsns.2009.10.012
Recommendations
- Analysis and improvement of a chaos-based hash function construction
- A fast and efficient chaos-based keyed hash function
- A CHAOS-BASED CRYPTOGRAPHIC HASH FUNCTION FOR MESSAGE AUTHENTICATION
- A keyed hash function based on the modified coupled chaotic map lattice
- A combined chaotic cryptographic and hashing scheme
- Chaos Based Hash Function
- Constructing chaos-based hash function via parallel impulse perturbation
- Hash functions using chaotic iterations
- A structure-based chaotic hashing scheme
Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Cryptography (94A60)
Cites Work
- Title not available (Why is that?)
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
- Title not available (Why is that?)
- One-way hash function construction based on the chaotic map with changeable-parameter
- A combined chaotic cryptographic and hashing scheme
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Chaos and cryptography
- An improved chaotic cryptosystem with external key
- A block encryption algorithm based on dynamic sequences of multiple chaotic systems
Cited In (23)
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
- An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
- A revised key agreement protocol based on chaotic maps
- A structure-based chaotic hashing scheme
- A keyed hash function based on the modified coupled chaotic map lattice
- An improved secure and efficient password and chaos-based two-party key agreement protocol
- Chaotic hash function based on the dynamic S-box with variable parameters
- An anonymous key agreement protocol based on chaotic maps
- Parallel hash function construction based on coupled map lattices
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- The design of keyed hash function based on CNN-MD structure
- Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
- Chaotic hash function based on circular shifts with variable parameters
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- Collision analysis of one kind of chaos-based hash function
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- A new digital signature scheme based on chaotic maps
- Chaotic maps-based three-party password-authenticated key agreement scheme
This page was built for publication: A chaos-based hash function with both modification detection and localization capabilities
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q720114)