One-way hash function based on delay-induced hyperchaos

HP Ren, CF Zhao, C Grebogi - International Journal of Bifurcation …, 2020 - World Scientific
A scheme for constructing one-way Hash function based on hyperchaos induced by time
delay and key-stream function iteration is proposed in this paper. In this scheme, the …

A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform

WZ Yeoh, JS Teh, HR Chern - Multimedia Tools and Applications, 2019 - Springer
True random number generators are used in high security applications such as
cryptography where non-determinism is required. However, they are slower than their …

Secure and efficient parallel hash function construction and its application on cloud audit

Y Yang, F Chen, Z Sun, S Wang, J Li, J Chen, Z Ming - Soft Computing, 2019 - Springer
Rapid development of cloud computing has created enormous security challenges on
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …

Javaweb login authentication based on improved MD5 algorithm

L Zhong, W Wan, D Kong - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
MD5 (message digest algorithm) plays an important role in the digital signature, identity
authentication and data encryption on account of its special ability of strong one-way …

Novel one round message authentication scheme for constrained IoT devices

HN Noura, O Salman, R Couturier… - Journal of Ambient …, 2022 - Springer
Security and privacy concerns have emerged as critical challenges in the Internet-of-Things
(IoT) era. These issues need to be carefully addressed due to the sensitive data within IoT …

A parallel hash function with variable initial values

P Zhang, X Zhang, J Yu - Wireless Personal Communications, 2017 - Springer
In recent years, considerable effort has been devoted to research on hash function.
Nevertheless, it's hard to obtain the proporties of sensitivity, confusion and diffusion, collision …

A secure and efficient chaotic maps based authenticated key-exchange protocol for smart grid

M Bayat, MB Atashgah, MR Aref - Wireless Personal Communications, 2017 - Springer
Nicanfar and Leung proposed a multilayer consensus elliptic curve based password
authenticated key-exchange (MCEPAK) protocol for smart grid. They claimed that their …

[PDF][PDF] Competent Hybrid Digital Image Watermarking Technique Based on Daubechies Wavelet and Block Bitmap Modification

HGA Altameemi, AA Alani, AAA Asmael… - Int. J …, 2022 - pdfs.semanticscholar.org
Over many years, in order to provide powerful techniques for protecting digital copyrights,
digital watermarking techniques have been developed. This research focuses on proposing …

Enhancing one-dimensional chaotic map based on bitstream dividing model

M Alawida, A Samsudin, WH Alshoura - Proceedings of the 2019 8th …, 2019 - dl.acm.org
The chaotic map has attracted more researchers in chaotic cryptography domain. That is
because to large similarity among their characteristics such as unpredictability and …

Chaotic neural networks and farfalle construction based parallel keyed secure hash function

MM Belal, T Maitra, D Giri, AK Das - Security and Privacy, 2022 - Wiley Online Library
Parallel computing of hash functions along with the security requirements have great
advantage in order to reduce the time consumption and overhead of the CPU. In this article …