Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators
Digital chaotic maps are becoming increasingly popular in the area of cryptography due to
commonalities but have drawbacks which adversely effect security strength. Thus …
commonalities but have drawbacks which adversely effect security strength. Thus …
Deterministic chaotic finite-state automata
Chaotic dynamics have been widely applied in various domains such as cryptography,
watermarking and optimization algorithms. Enhancing chaotic complexity of simple one …
watermarking and optimization algorithms. Enhancing chaotic complexity of simple one …
A new image encryption algorithm with nonlinear-diffusion based on multiple coupled map lattices
X Wang, H Zhao, M Wang - Optics & Laser Technology, 2019 - Elsevier
This paper proposes a new spatiotemporal chaos system named Multiple coupled map
lattices (MCML). The proposed spatiotemporal chaos system has outstanding cryptographic …
lattices (MCML). The proposed spatiotemporal chaos system has outstanding cryptographic …
A chaos-based keyed hash function based on fixed point representation
Chaotic maps are used in the design of hash functions due to their characteristics that are
analogous to cryptographic requirements. However, these maps are commonly …
analogous to cryptographic requirements. However, these maps are commonly …
Construction of one-way hash functions with increased key space using adaptive chaotic maps
Chaotic hash functions are a prospective branch of modern cryptography. Being compared
with traditional hashing algorithms, an approach based on deterministic chaos allows …
with traditional hashing algorithms, an approach based on deterministic chaos allows …
Chaotic image encryption algorithm using wave-line permutation and block diffusion
G Ye, H Zhao, H Chai - Nonlinear Dynamics, 2016 - Springer
An efficient and secure image encryption algorithm is proposed in this manuscript using
SHA-3 hash function together with double two-dimensional Arnold chaotic maps. Classical …
SHA-3 hash function together with double two-dimensional Arnold chaotic maps. Classical …
A novel hash function based on a chaotic sponge and DNA sequence
Many chaos-based hash functions have convoluted designs that are not based on proper
design principles, complicating the verification of security claims. We address this problem …
design principles, complicating the verification of security claims. We address this problem …
[HTML][HTML] From Collatz Conjecture to chaos and hash function
M Rasool, SB Belhaouari - Chaos, Solitons & Fractals, 2023 - Elsevier
The non-linear property of Chaos is a promising approach to information security, and many
accomplishments have been made by combining Chaos with several sub-security domains …
accomplishments have been made by combining Chaos with several sub-security domains …
Enhancing unimodal digital chaotic maps through hybridisation
Despite sharing many similar properties with cryptography, digitizing chaotic maps for the
purpose of developing chaos-based cryptosystems leads to dynamical degradation, causing …
purpose of developing chaos-based cryptosystems leads to dynamical degradation, causing …