A Topological Study of Chaotic Iterations Application to Hash Functions
From MaRDI portal
Publication:3225389
DOI10.1007/978-3-642-25237-2_5zbMath1233.37064arXiv1608.05920OpenAlexW28371118MaRDI QIDQ3225389
Christophe Guyeux, Jacques M. Bahi
Publication date: 20 March 2012
Published in: Computational Intelligence for Privacy and Security (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1608.05920
Learning and adaptive systems in artificial intelligence (68T05) Applications of dynamical systems (37N99) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45) Information storage and retrieval of data (68P20) Distributed algorithms (68W15)
Related Items
Theoretical design and circuit implementation of novel digital chaotic systems via hybrid control ⋮ Proving Chaotic Behavior of CBC Mode of Operation ⋮ Efficient Chaotic Encryption Scheme with OFB Mode
Cites Work
- Unnamed Item
- Unnamed Item
- Improving the security of a parallel keyed hash function based on chaotic maps
- Image compression based on the neural network art
- Extracting information masked by chaos and contaminated with noise: some considerations on the security of communication approaches using chaos.
- A secure digital signature algorithm based on elliptic curve and chaotic mappings
- Chaotic relaxation
- Chaos-based multipurpose image watermarking algorithm
- Hash Functions Using Chaotic Iterations
- On Devaney's Definition of Chaos
- Topological Entropy
- A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption
- Entropy for Group Endomorphisms and Homogeneous Spaces
This page was built for publication: A Topological Study of Chaotic Iterations Application to Hash Functions