Chaotic hash function based on the dynamic S-box with variable parameters
From MaRDI portal
Publication:333180
DOI10.1007/s11071-016-2652-1zbMath1347.94044OpenAlexW2253491794MaRDI QIDQ333180
Guangfu Ge, Dawen Xia, Yan Tao Li
Publication date: 9 November 2016
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-016-2652-1
Cryptography (94A60) Applications of dynamical systems (37N99) Strange attractors, chaotic dynamics of systems with hyperbolic behavior (37D45)
Related Items (5)
Construction of one-way hash functions with increased key space using adaptive chaotic maps ⋮ The design of keyed hash function based on CNN-MD structure ⋮ Chaotic hash function based on circular shifts with variable parameters ⋮ Constructing keyed hash algorithm using enhanced chaotic map with varying parameter ⋮ A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map
Uses Software
Cites Work
- Unnamed Item
- A structure-based chaotic hashing scheme
- Improving the security of a parallel keyed hash function based on chaotic maps
- Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
- Hash function based on piecewise nonlinear chaotic map
- Cryptanalysis on a parallel keyed hash function based on chaotic maps
- A fast and efficient chaos-based keyed hash function
- Parallel keyed hash function construction based on chaotic maps
- Analysis and improvement of a chaos-based hash function construction
- Parallel hash function construction based on coupled map lattices
- A chaos-based hash function with both modification detection and localization capabilities
- Open problems in hash function security
- Hash functions and Cayley graphs
- A combined chaotic cryptographic and hashing scheme
- Collision analysis of one kind of chaos-based hash function
- One-way hash function construction based on 2D coupled map lattices
- Cryptanalysis of dynamic look-up table based chaotic cryptosystems
- Some observations on the theory of cryptographic hash functions
- Communication Theory of Secrecy Systems*
- New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis
- Improving Local Collisions: New Attacks on Reduced SHA-256
- Keyed hash functions
- Finding Collisions in the Full SHA-1
This page was built for publication: Chaotic hash function based on the dynamic S-box with variable parameters