Parallel hash function construction based on coupled map lattices
暂无分享,去创建一个
Yong Wang | Kwok-Wo Wong | Di Xiao | Kwok-Wo Wong | Yong Wang | D. Xiao | Kwok-wo Wong
[1] Kwok-Wo Wong,et al. A combined chaotic cryptographic and hashing scheme , 2003 .
[2] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[3] Zhang Han,et al. One way Hash function construction based on spatiotemporal chaos , 2005 .
[4] X. Liao,et al. One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .
[5] David Goldberg,et al. What every computer scientist should know about floating-point arithmetic , 1991, CSUR.
[6] Xiaofeng Liao,et al. Parallel keyed hash function construction based on chaotic maps , 2008 .
[7] Di Xiao,et al. Analysis and improvement of a chaos-based Hash function construction , 2010 .
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Xun Yi,et al. Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.
[10] Wenfang Zhang,et al. Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .
[11] Shiguo Lian,et al. Hash function based on chaotic neural networks , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[12] Jinyu Kuang,et al. PERIODICITY OF CHAOTIC TRAJECTORIES IN REALIZATIONS OF FINITE COMPUTER PRECISIONS AND ITS IMPLICATION IN CHAOS COMMUNICATIONS , 2003, nlin/0309005.
[13] Hui Chen,et al. Cryptanalysis of the Hash Functions MD4 and RIPEMD , 2005, EUROCRYPT.
[14] Wallace Kit-Sang Tang,et al. A Chaos-Based Cryptographic Hash Function for Message Authentication , 2005, Int. J. Bifurc. Chaos.
[15] Yong Wang,et al. One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..
[16] Guanrong Chen,et al. A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map , 2006 .
[17] Xuejia Lai,et al. Hash Function Based on Block Ciphers , 1992, EUROCRYPT.
[18] Xiaofeng Liao,et al. A chaos-based hash function with both modification detection and localization capabilities , 2010 .
[19] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[20] Yong Wang,et al. Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.
[21] Wei Guo,et al. Cryptanalysis on a parallel keyed hash function based on chaotic maps , 2009 .