One-Way Hash Function Based on Delay-Induced Hyperchaos
暂无分享,去创建一个
[1] Zengqiang Chen,et al. A new image encryption algorithm based on hyper-chaos , 2008 .
[2] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[3] Mohammad Ghebleh,et al. A structure-based chaotic hashing scheme , 2015, Nonlinear Dynamics.
[4] Xiang Li,et al. A fast and efficient hash function based on generalized chaotic mapping with variable parameters , 2016, Neural Computing and Applications.
[5] H. Ren,et al. Heteroclinic orbits in Chen circuit with time delay , 2010 .
[6] Shahram Jamali,et al. A novel keyed parallel hashing scheme based on a new chaotic system , 2016 .
[7] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[8] G. Álvarez,et al. Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.
[9] Tzung-Her Chen,et al. Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes , 2015, Signal Process. Image Commun..
[10] Celso Grebogi,et al. Dynamics of delay induced composite multi-scroll attractor and its application in encryption , 2017 .
[11] Liu Ding,et al. Anticontrol of chaos via direct time delay feedback , 2006 .
[12] Zhen Ji,et al. Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems , 2003, Int. J. Bifurc. Chaos.
[13] Xiaofeng Liao,et al. Design of image Hash functions based on fluid dynamics model , 2012 .
[14] Yantao Li,et al. Chaotic hash function based on circular shifts with variable parameters , 2016 .
[15] Ali Kanso,et al. A fast and efficient chaos-based keyed hash function , 2013, Commun. Nonlinear Sci. Numer. Simul..
[16] Florian Mendel,et al. Improving Local Collisions: New Attacks on Reduced SHA-256 , 2013, EUROCRYPT.
[17] Yong Wang,et al. Improving the security of a parallel keyed hash function based on chaotic maps , 2009 .
[18] L. Cardoza-Avendaño,et al. A novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2016, Nonlinear Dynamics.
[19] Kwok-Wo Wong,et al. A combined chaotic cryptographic and hashing scheme , 2003 .
[20] Bernie Sin-Hung Kwok,et al. An efficient diffusion approach for chaos-based image encryption , 2009 .
[21] Guoyuan Qi,et al. A four-wing hyper-chaotic attractor and transient chaos generated from a new 4-D quadratic autonomous system , 2010 .
[22] Rhouma Rhouma,et al. Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .
[23] Hans Dobbertin. Cryptanalysis of MD4 , 1996, FSE.
[24] Morteza Dardel,et al. Vibration control of a nonlinear beam with a nonlinear energy sink , 2016 .
[25] Yong Wang,et al. A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..
[26] Amir Akhavan,et al. Parallel chaotic hash function based on the shuffle-exchange network , 2015 .
[27] Jun-jie Chen,et al. A chaos-based digital image encryption scheme with an improved diffusion strategy. , 2012, Optics express.
[28] Rui Yang,et al. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption , 2016, Scientific Reports.
[29] Xun Yi,et al. Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.
[30] Shujun Li,et al. Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding , 2001, IMACC.
[31] Guanrong Chen,et al. YET ANOTHER CHAOTIC ATTRACTOR , 1999 .
[32] Marc Stevens,et al. New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis , 2013, EUROCRYPT.
[33] Jinhu Lu,et al. A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map , 2017, Int. J. Bifurc. Chaos.
[34] Jongho Moon,et al. Security enhanced multi-factor biometric authentication scheme using bio-hash function , 2017, PloS one.
[35] Hui Chen,et al. Cryptanalysis of the Hash Functions MD4 and RIPEMD , 2005, EUROCRYPT.
[36] M. Baptista. Cryptography with chaos , 1998 .
[37] Bart Preneel,et al. Construction of secure and fast hash functions using nonbinary error-correcting codes , 2002, IEEE Trans. Inf. Theory.