Chaos-Based Image Integrity Authentication Code
暂无分享,去创建一个
[1] S. M. Ulam,et al. On Combination of Stochastic and Deterministic Processes , 1947 .
[2] Amir Akhavan,et al. Applications of tripled chaotic maps in cryptography , 2007, 0705.2633.
[3] Kwok-Wo Wong,et al. A combined chaotic cryptographic and hashing scheme , 2003 .
[4] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[5] X. Liao,et al. One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .
[6] Bart Preneel,et al. Integrity Primitives for Secure Information Systems , 2005, Lecture Notes in Computer Science.
[7] Sasaki Yu,et al. Improved Collision Attack on MD5 , 2005 .
[8] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[9] G. Álvarez,et al. Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.
[10] Yu Sasaki,et al. Improved Collision Attack on MD4 with Probability Almost 1 , 2005, ICISC.
[11] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[12] H. H. Nien,et al. Digital color image encoding and decoding using a novel chaotic random generator , 2007 .
[13] Kwok-Wo Wong,et al. One-way hash function construction based on chaotic map network , 2009 .
[14] Joos Vandewalle,et al. Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.
[15] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[16] James H. Burrows,et al. Secure Hash Standard , 1995 .
[17] A. Kanso,et al. Logistic chaotic maps for binary numbers generations , 2009 .
[18] Zengqiang Chen,et al. Image encryption based on a new total shuffling algorithm , 2008 .
[19] Tao Xiang,et al. Parallel image encryption algorithm based on discretized chaotic map , 2008 .
[20] Hui Chen,et al. Cryptanalysis of the Hash Functions MD4 and RIPEMD , 2005, EUROCRYPT.