Cryptographic one-way hash function generation using twelve-terms 4D nonlinear system
暂无分享,去创建一个
[1] Antoine Joux,et al. Collisions of SHA-0 and Reduced SHA-1 , 2005, EUROCRYPT.
[2] A. Akhavan,et al. Hash function based on piecewise nonlinear chaotic map , 2009 .
[3] Balasubramanian Raman,et al. A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .
[4] Musheer Ahmad,et al. Chaotic hash function based plain-image dependent block ciphering technique , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[5] M. Jafarizadeh,et al. Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps , 2009 .
[6] Kwok-Wo Wong,et al. A combined chaotic cryptographic and hashing scheme , 2003 .
[7] Di Xiao,et al. Analysis and improvement of a chaos-based Hash function construction , 2010 .
[8] Zhang Han,et al. One way Hash function construction based on spatiotemporal chaos , 2005 .
[9] K. Murali,et al. Chaos based spread spectrum image steganography , 2004, IEEE Transactions on Consumer Electronics.
[10] Wansheng Tang,et al. A novel bounded 4D chaotic system , 2012 .
[11] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[12] Amir Akhavan,et al. A novel parallel hash function based on 3D chaotic map , 2013, EURASIP Journal on Advances in Signal Processing.
[13] Ali Kanso,et al. A fast and efficient chaos-based keyed hash function , 2013, Commun. Nonlinear Sci. Numer. Simul..
[14] Wallace Kit-Sang Tang,et al. A Chaos-Based Cryptographic Hash Function for Message Authentication , 2005, Int. J. Bifurc. Chaos.
[15] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[16] Yong Wang,et al. One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..
[17] Zhi-Hong Guan,et al. A novel digital watermark algorithm based on chaotic maps , 2007 .
[18] Mahmoud Maqableh,et al. New Hash Function Based on Chaos Theory (CHA-1) , 2008 .
[19] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[20] Li,et al. Secure hash function based on chaotic tent map with changeable parameter , 2012 .
[21] Xuejia Lai,et al. Improved Collision Attack on Hash Function MD5 , 2007, Journal of Computer Science and Technology.
[22] Musheer Ahmad,et al. Designing Chaotic Chirikov Map-Based Secure Hash Function , 2016 .
[23] Stefan Lucks,et al. Design Principles for Iterated Hash Functions , 2004, IACR Cryptol. ePrint Arch..
[24] Yong Wang,et al. A novel method for one-way hash function construction based on spatiotemporal chaos , 2009 .
[25] Wenfang Zhang,et al. Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .
[26] Xiang Li,et al. A fast and efficient hash function based on generalized chaotic mapping with variable parameters , 2016, Neural Computing and Applications.
[27] Ali Adnan Al-Temeemy. The Development of a 3D LADAR Simulator Based on a Fast Target Impulse Response Generation Approach , 2017 .
[28] Ningning Yang,et al. A novel fractional-order hyperchaotic system stabilization via fractional sliding-mode control , 2013 .
[29] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[30] Amir Akhavan,et al. Parallel chaotic hash function based on the shuffle-exchange network , 2015 .
[31] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[32] Wen-Chung Kuo,et al. A new digital signature scheme based on chaotic maps , 2013, Nonlinear dynamics.
[33] Christophe Guyeux,et al. On the use of chaotic iterations to design keyed hash function , 2017, Cluster Computing.
[34] Xiaofeng Liao,et al. Chaos Based Hash Function , 2011, Chaos-Based Cryptography.
[35] Musheer Ahmad,et al. A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps , 2017 .
[36] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[37] Bruce Schneier,et al. Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..
[38] X. Liao,et al. One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .
[39] Yevgeniy Dodis,et al. New Design Criteria for Hash Functions and Block Ciphers , 2007 .
[40] Shiguo Lian,et al. Secure hash function based on neural network , 2006, Neurocomputing.
[41] Ali Kanso,et al. Keyed hash function based on a chaotic map , 2012, Inf. Sci..
[42] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[43] Ljupco Kocarev,et al. Intelligent Computing Based on Chaos , 2009 .
[44] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[45] Antoine Joux,et al. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.
[46] Di Xiao,et al. Improvement and performance analysis of a novel hash function based on chaotic neural network , 2011, Neural Computing and Applications.