Design and security analysis of two robust keyed hash functions based on chaotic neural networks
暂无分享,去创建一个
Olivier Déforges | Mohamad Khalil | Safwan El Assad | Nabil Abdoun | Rima Assaf | S. E. Assad | O. Déforges | Mohamad Khalil | Nabil Abdoun | R. Assaf | Safwan El Assad
[1] Xiaofeng Liao,et al. Parallel keyed hash function construction based on chaotic maps , 2008 .
[2] A. Akhavan,et al. Hash function based on piecewise nonlinear chaotic map , 2009 .
[3] Di Xiao,et al. A novel Hash algorithm construction based on chaotic neural network , 2011, Neural Computing and Applications.
[4] X. Liao,et al. One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .
[5] Di Xiao,et al. Parallel chaotic Hash function construction based on cellular neural network , 2011, Neural Computing and Applications.
[6] Shiguo Lian,et al. Secure hash function based on neural network , 2006, Neurocomputing.
[7] Kwok-Wo Wong,et al. A combined chaotic cryptographic and hashing scheme , 2003 .
[8] Di Xiao,et al. Analysis and improvement of a chaos-based Hash function construction , 2010 .
[9] W. San-Um,et al. A topologically simple keyed hash function based on circular chaotic sinusoidal map network , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).
[10] Yong Wang,et al. Parallel hash function construction based on coupled map lattices , 2011 .
[11] Joos Vandewalle,et al. Collision-free hashfunctions based on blockcipher algorithms , 1989, Proceedings. International Carnahan Conference on Security Technology.
[12] Zhongquan Huang. A more secure parallel keyed hash function based on chaotic neural network , 2011 .
[13] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[14] Wen-Chung Kuo,et al. A new digital signature scheme based on chaotic maps , 2013, Nonlinear dynamics.
[15] Ahmed A. Abd El-Latif,et al. Chaos-based hash function (CBHF) for cryptographic applications , 2009 .
[16] Abdennaceur Kachouri,et al. A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2 , 2015, Nonlinear Dynamics.
[17] Kazuo Ohta,et al. Confirmation that Some Hash Functions Are Not Collision Free , 1991, EUROCRYPT.
[18] Ki-Ryong Kwon,et al. Polyline curvatures based robust vector data hashing , 2013, Multimedia Tools and Applications.
[19] Mahmoud Maqableh,et al. New Hash Function Based on Chaos Theory (CHA-1) , 2008 .
[20] Philippe Flajolet,et al. Birthday Paradox, Coupon Collectors, Caching Algorithms and Self-Organizing Search , 1992, Discret. Appl. Math..
[21] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[22] Shiguo Lian,et al. Hash function based on chaotic neural networks , 2006, 2006 IEEE International Symposium on Circuits and Systems.
[23] Yu Sasaki,et al. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 , 2009, CRYPTO.
[24] Sung-Bong Jang,et al. File similarity evaluation scheme for multimedia data using partial hash information , 2016, Multimedia Tools and Applications.
[25] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[26] H. Feistel. Cryptography and Computer Privacy , 1973 .
[27] Mohamad Khalil,et al. Secure Hash Algorithm based on Efficient Chaotic Neural Network , 2016, 2016 International Conference on Communications (COMM).
[28] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[29] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[30] Xiangdong Liu,et al. Hysteresis modeling based on the hysteretic chaotic neural network , 2008, Neural Computing and Applications.
[31] Zhang Jia-Shu,et al. Keyed one-way Hash function construction based on the chaotic dynamic S-Box , 2006 .
[32] Pieter Retief Kasselman,et al. Analysis and design of cryptographic hash functions , 1999 .
[33] Hongjun Wu,et al. Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster) , 2011, ACISP.
[34] Mridul Nandi,et al. Speeding Up the Wide-Pipe: Secure and Fast Hashing , 2010, INDOCRYPT.
[35] Di Xiao,et al. Improvement and performance analysis of a novel hash function based on chaotic neural network , 2011, Neural Computing and Applications.
[36] Kai Yang,et al. A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System , 2012, J. Comput..
[37] Yong Wang,et al. Parallel keyed hash function construction based on chaotic neural network , 2009, Neurocomputing.
[38] Xiaofeng Liao,et al. A chaos-based hash function with both modification detection and localization capabilities , 2010 .
[39] Joos Vandewalle,et al. Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.
[40] Xun Yi,et al. Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.
[41] Amir Akhavan,et al. Parallel chaotic hash function based on the shuffle-exchange network , 2015 .
[42] Di Xiao,et al. A novel combined cryptographic and hash algorithm based on chaotic control character , 2009 .
[43] Huaxiong Wang,et al. Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 , 2010, ASIACRYPT.
[44] Hai Yu,et al. One-Way Hash Function Construction Based on Chaotic Coupled Map Network , 2011, 2011 Fourth International Workshop on Chaos-Fractals Theories and Applications.
[45] Li,et al. Secure hash function based on chaotic tent map with changeable parameter , 2012 .
[46] Jian Guo,et al. Preimages for Step-Reduced SHA-2 , 2009, IACR Cryptol. ePrint Arch..
[47] Yu Sasaki,et al. Improved Preimage Attack for 68-Step HAS-160 , 2009, ICISC.
[48] Wenfang Zhang,et al. Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .
[49] Yu Sasaki,et al. Preimage Attacks on One-Block MD4, 63-Step MD5 and More , 2009, Selected Areas in Cryptography.
[50] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[51] Yong Wang,et al. One-way hash function construction based on 2D coupled map lattices , 2008, Inf. Sci..
[52] Kwok-Wo Wong,et al. One-way hash function construction based on chaotic map network , 2009 .
[53] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[54] Yu Sasaki,et al. Finding Preimages in Full MD5 Faster Than Exhaustive Search , 2009, EUROCRYPT.
[55] Stefan Lucks,et al. Design Principles for Iterated Hash Functions , 2004, IACR Cryptol. ePrint Arch..
[56] Yong Wang,et al. A novel method for one-way hash function construction based on spatiotemporal chaos , 2009 .
[57] A. Ramezani,et al. A dynamic chaotic hash function based upon circle chord methods , 2012, 6th International Symposium on Telecommunications (IST).
[58] Bart Preneel,et al. On the Security of Two MAC Algorithms , 1996, EUROCRYPT.
[59] Yu Sasaki,et al. Preimage Attacks on 3, 4, and 5-Pass HAVAL , 2008, ASIACRYPT.
[60] Xiaofeng Liao,et al. A Combined Hash and Encryption Scheme by Chaotic Neural Network , 2004, ISNN.
[61] Sk Hafizul Islam,et al. Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps , 2014 .
[62] Amir Akhavan,et al. A novel parallel hash function based on 3D chaotic map , 2013, EURASIP Journal on Advances in Signal Processing.
[63] Hefei Ling,et al. Local and global structure preserving hashing for fast digital fingerprint tracing , 2014, Multimedia Tools and Applications.
[64] Di Xiao,et al. Keyed hash function based on a dynamic lookup table of functions , 2012, Inf. Sci..
[65] Yong Wang,et al. One-Way Hash Function Construction Based on Iterating a Chaotic Map , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).
[66] Yong Wang,et al. Improving the security of a parallel keyed hash function based on chaotic maps , 2009 .
[67] Qi Han,et al. Parallel Hash function construction based on chaotic maps with changeable parameters , 2011, Neural Computing and Applications.
[68] Zhang Han,et al. One way Hash function construction based on spatiotemporal chaos , 2005 .
[69] Ilya Mironov,et al. Hash functions: Theory, attacks, and applications , 2005 .
[70] V. Lakshmi Praba,et al. Study of chaos functions for their suitability in generating Message Authentication Codes , 2007, Appl. Soft Comput..
[71] Wallace Kit-Sang Tang,et al. A Chaos-Based Cryptographic Hash Function for Message Authentication , 2005, Int. J. Bifurc. Chaos.
[72] Safwan El Assad,et al. Chaos Based Information Hiding and Security , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[73] Han Zhang,et al. One-way Hash Function Construction Based on Conservative Chaotic Systems , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[74] Yu-Ling Luo,et al. One-way hash function construction based on the spatiotemporal chaotic system , 2012 .
[75] Safwan El Assad,et al. Efficient multicore implementation of an advanced generator of discrete chaotic sequences , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).
[76] Shahram Jamali,et al. A novel keyed parallel hashing scheme based on a new chaotic system , 2016 .
[77] Olivier Déforges,et al. Hash function based on efficient Chaotic Neural Network , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).