A dynamic chaotic hash function based upon circle chord methods
暂无分享,去创建一个
A. Ramezani | A. Ebrahimi | M. Nouri | A. Khezeli | A. Ramezani | Ali Khezeli | M. Nouri | Azita Ebrahimi
[1] W. Xiaomin,et al. One way Hash function construction based on the extended chaotic maps switch , 2003 .
[2] Roland Schmitz,et al. Use of chaotic dynamical systems in cryptography , 2001, J. Frankl. Inst..
[3] Jinyu Kuang,et al. PERIODICITY OF CHAOTIC TRAJECTORIES IN REALIZATIONS OF FINITE COMPUTER PRECISIONS AND ITS IMPLICATION IN CHAOS COMMUNICATIONS , 2003, nlin/0309005.
[4] Guanrong Chen,et al. A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map , 2006 .
[5] Han Wei. Construction of the control orbit function based on the chaos theory , 2002 .
[6] Boris S. Verkhovsky. Information Assurance Protocols: Efficiency Analysis and Implementation for Secure Communication , 2008 .
[7] Xiao Di. A Parallel Hash Function Based on Chaos , 2008 .
[8] B Surekha,et al. A Watermarking Technique based on Visual Cryptography , 2009 .
[9] Qiu Shui-sheng,et al. One-way Hash Functions Based on Iterated Chaotic Systems , 2007, 2007 International Conference on Communications, Circuits and Systems.
[10] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[11] Parlitz,et al. Synchronization-based parameter estimation from time series. , 1996, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[12] Wenbin Luo. Hashing via finite field , 2006, Inf. Sci..