Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …
Construction of one-way hash functions with increased key space using adaptive chaotic maps
Chaotic hash functions are a prospective branch of modern cryptography. Being compared
with traditional hashing algorithms, an approach based on deterministic chaos allows …
with traditional hashing algorithms, an approach based on deterministic chaos allows …
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
Chaotic maps have various properties that mirror the security requirements of cryptographic
algorithms. As such, researchers have utilized them in the design of algorithms such as hash …
algorithms. As such, researchers have utilized them in the design of algorithms such as hash …
Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security
Y Li, G Ge - Multimedia Tools and Applications, 2019 - Springer
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash
values), which can be used in a wide range of multimedia applications for communication …
values), which can be used in a wide range of multimedia applications for communication …
Designing two secure keyed hash functions based on sponge construction and the chaotic neural network
In this paper, we propose, implement, and analyze the structures of two keyed hash
functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …
functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …
A simple secure hash function scheme using multiple chaotic maps
The chaotic maps posses high parameter sensitivity, random-like behavior and one-way
computations, which favor the construction of cryptographic hash functions. In this paper, we …
computations, which favor the construction of cryptographic hash functions. In this paper, we …
An image blocks encryption algorithm based on spatiotemporal chaos
X Wang, L Teng - Nonlinear Dynamics, 2012 - Springer
In this paper, the CML-based spatiotemporal chaos system is used for image blocks
encryption, which gets higher security. The basic idea is to divide the image into blocks, and …
encryption, which gets higher security. The basic idea is to divide the image into blocks, and …
A fast and efficient chaos-based keyed hash function
This paper proposes a new chaotic keyed hash function based on a single 4-dimensional
chaotic cat map whose irregular outputs are used to compute a hash value. The suggested …
chaotic cat map whose irregular outputs are used to compute a hash value. The suggested …
Chaotic hash function based on the dynamic S-Box with variable parameters
We present a chaotic hash function based on the dynamic S-Box with variable parameters in
this paper. More specifically, we first exploit the piecewise linear chaotic map to obtain four …
this paper. More specifically, we first exploit the piecewise linear chaotic map to obtain four …
Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main
aim of this paper is how to increase the security level of the blockchain based on the …
aim of this paper is how to increase the security level of the blockchain based on the …