A novel combined cryptographic and hash algorithm based on chaotic control character
暂无分享,去创建一个
Di Xiao | Shaojiang Deng | Yantao Li | D. Xiao | Shaojiang Deng | Yantao Li | Wenbing Peng | Wenbin Peng
[1] Kwok-Wo Wong,et al. Improving the security of a dynamic look-up table based chaotic cryptosystem , 2006, IEEE Transactions on Circuits and Systems II: Express Briefs.
[2] Kwok-Wo Wong,et al. A combined chaotic cryptographic and hashing scheme , 2003 .
[3] G. Álvarez,et al. Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.
[4] Shiguo Lian,et al. Secure hash function based on neural network , 2006, Neurocomputing.
[5] Yiu-ming Cheung,et al. Security of public key encryption technique based on multiple chaotic systems , 2005, nlin/0510017.
[6] X. Liao,et al. One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .
[7] Zhiliang Zhu,et al. Cryptanalysis and Improvement on a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems , 2009, 2010 International Workshop on Chaos-Fractal Theories and Applications.
[8] Tao Xiang,et al. An improved chaotic cryptosystem with external key , 2008 .
[9] Wenfang Zhang,et al. Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .
[10] William E. Burr. A New Hash Competition , 2008, IEEE Security & Privacy Magazine.
[11] Xun Yi,et al. Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.
[12] Liu Fen-lin. Chaotic encryption scheme based on control character , 2007 .
[13] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[14] L. Kocarev,et al. Logistic map as a block encryption algorithm , 2001 .
[15] X. Liao,et al. Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map , 2007 .
[16] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.