One-way hash function based on delay-induced hyperchaos
HP Ren, CF Zhao, C Grebogi - International Journal of Bifurcation …, 2020 - World Scientific
A scheme for constructing one-way Hash function based on hyperchaos induced by time
delay and key-stream function iteration is proposed in this paper. In this scheme, the …
delay and key-stream function iteration is proposed in this paper. In this scheme, the …
A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform
True random number generators are used in high security applications such as
cryptography where non-determinism is required. However, they are slower than their …
cryptography where non-determinism is required. However, they are slower than their …
Secure and efficient parallel hash function construction and its application on cloud audit
Rapid development of cloud computing has created enormous security challenges on
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …
authenticity, integrity, availability and reliability of outsourced data. Cloud audit is an …
Javaweb login authentication based on improved MD5 algorithm
L Zhong, W Wan, D Kong - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
MD5 (message digest algorithm) plays an important role in the digital signature, identity
authentication and data encryption on account of its special ability of strong one-way …
authentication and data encryption on account of its special ability of strong one-way …
Novel one round message authentication scheme for constrained IoT devices
Security and privacy concerns have emerged as critical challenges in the Internet-of-Things
(IoT) era. These issues need to be carefully addressed due to the sensitive data within IoT …
(IoT) era. These issues need to be carefully addressed due to the sensitive data within IoT …
A parallel hash function with variable initial values
P Zhang, X Zhang, J Yu - Wireless Personal Communications, 2017 - Springer
In recent years, considerable effort has been devoted to research on hash function.
Nevertheless, it's hard to obtain the proporties of sensitivity, confusion and diffusion, collision …
Nevertheless, it's hard to obtain the proporties of sensitivity, confusion and diffusion, collision …
A secure and efficient chaotic maps based authenticated key-exchange protocol for smart grid
Nicanfar and Leung proposed a multilayer consensus elliptic curve based password
authenticated key-exchange (MCEPAK) protocol for smart grid. They claimed that their …
authenticated key-exchange (MCEPAK) protocol for smart grid. They claimed that their …
[PDF][PDF] Competent Hybrid Digital Image Watermarking Technique Based on Daubechies Wavelet and Block Bitmap Modification
HGA Altameemi, AA Alani, AAA Asmael… - Int. J …, 2022 - pdfs.semanticscholar.org
Over many years, in order to provide powerful techniques for protecting digital copyrights,
digital watermarking techniques have been developed. This research focuses on proposing …
digital watermarking techniques have been developed. This research focuses on proposing …
Enhancing one-dimensional chaotic map based on bitstream dividing model
The chaotic map has attracted more researchers in chaotic cryptography domain. That is
because to large similarity among their characteristics such as unpredictability and …
because to large similarity among their characteristics such as unpredictability and …
Chaotic neural networks and farfalle construction based parallel keyed secure hash function
Parallel computing of hash functions along with the security requirements have great
advantage in order to reduce the time consumption and overhead of the CPU. In this article …
advantage in order to reduce the time consumption and overhead of the CPU. In this article …