Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation
暂无分享,去创建一个
[1] Hegui Zhu,et al. Analyzing Devaney Chaos of a Sine-Cosine Compound Function System , 2018, Int. J. Bifurc. Chaos.
[2] Krishna Asawa,et al. Building a 256-bit hash function on a stronger MD variant , 2014, Central European Journal of Computer Science.
[3] Zhiliang Zhu,et al. An image encryption algorithm based on compound homogeneous hyper-chaotic system , 2017, Nonlinear Dynamics.
[4] Xianghong Li,et al. Bursting phenomenon in a piecewise mechanical system with parameter perturbation in stiffness , 2016 .
[5] Xiang Li,et al. A fast and efficient hash function based on generalized chaotic mapping with variable parameters , 2016, Neural Computing and Applications.
[6] Xingyuan Wang,et al. A hyperchaos generated from Lorenz system , 2008 .
[7] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[8] Wang Xing-Yuan,et al. Modified function projective lag synchronization in fractional-order chaotic (hyperchaotic) systems , 2014 .
[9] Dawen Xia,et al. Chaotic hash function based on the dynamic S-Box with variable parameters , 2016, Nonlinear Dynamics.
[10] G. Geetha,et al. Cryptographic Hash Functions: A Review , 2012 .
[11] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[12] Ali Kanso,et al. A fast and efficient chaos-based keyed hash function , 2013, Commun. Nonlinear Sci. Numer. Simul..
[13] Luo Chao,et al. Hybrid Delayed Synchronizations of Complex Chaotic Systems in Modulus-Phase Spaces and Its Application , 2016 .
[14] Dawei Wang,et al. A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .
[15] Qiang Jia,et al. Hyperchaos generated from the Lorenz chaotic system and its control , 2007 .
[16] Xing-Yuan Wang,et al. A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice , 2014, Inf. Sci..
[17] Musheer Ahmad,et al. Cryptographic one-way hash function generation using twelve-terms 4D nonlinear system , 2018, International Journal of Information Technology.
[18] Xing-Yuan Wang,et al. A new image encryption algorithm based on non-adjacent coupled map lattices , 2015, Appl. Soft Comput..
[19] Naveen K. Nishchal,et al. An optical Hash function construction based on equal modulus decomposition for authentication verification , 2018, Optics Communications.
[20] Ali Kanso,et al. Keyed hash function based on a chaotic map , 2012, Inf. Sci..
[21] Xingyuan Wang,et al. Chaos in the fractional-order complex Lorenz system and its synchronization , 2013 .
[22] Kaijun Tan,et al. A chaos-based keyed hash function based on fixed point representation , 2018, Cluster Computing.
[23] Musheer Ahmad,et al. A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps , 2017 .
[24] Abdurahman Kadir,et al. Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections , 2017 .
[25] Dag Arne Osvik,et al. MD5 considered harmful today, creating a rogue CA certificate , 2008 .
[26] S. Santhanalakshmi,et al. Design of secure Cryptographic hash function using soft computing techniques , 2017 .
[27] Daniel Smith-Tone,et al. Report on Post-Quantum Cryptography , 2016 .