Secure Hash Algorithm based on Efficient Chaotic Neural Network
暂无分享,去创建一个
Mohamad Khalil | Nabil Abdoun | Rima Assaf | Olivier Deforges | Safwan El Assad | Mohammad Abu Taha | S. E. Assad | O. Déforges | Mohamad Khalil | Nabil Abdoun | M. A. Taha | R. Assaf
[1] Di Xiao,et al. A novel Hash algorithm construction based on chaotic neural network , 2011, Neural Computing and Applications.
[2] Olivier Déforges,et al. Chaos-based cryptosystems using dependent diffusion: An overview , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[3] James H. Burrows,et al. Secure Hash Standard , 1995 .
[4] Olivier Déforges,et al. Hash function based on efficient Chaotic Neural Network , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[5] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[6] Zhongquan Huang. A more secure parallel keyed hash function based on chaotic neural network , 2011 .
[7] Yong Wang,et al. Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.
[8] He Bo,et al. A method for designing Hash function based on chaotic neural network , 2013, CloudCom 2013.
[9] Imad Fakhri Taha Alshaikhli,et al. Broad View of Cryptographic Hash Functions , 2013 .
[10] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[11] Shiguo Lian,et al. Secure hash function based on neural network , 2006, Neurocomputing.
[12] Ilya Mironov,et al. Hash functions: Theory, attacks, and applications , 2005 .
[13] Safwan El Assad,et al. Efficient multicore implementation of an advanced generator of discrete chaotic sequences , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).
[14] Safwan El Assad,et al. Chaos Based Information Hiding and Security , 2012, 2012 International Conference for Internet Technology and Secured Transactions.