메뉴 건너뛰기




Volumn 69, Issue 16-18, 2006, Pages 2346-2350

Secure hash function based on neural network

Author keywords

Chaotic neural networks; Digital signature; Hash function; Neural networks

Indexed keywords

DATA COMPRESSION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; SECURITY OF DATA;

EID: 33748433928     PISSN: 09252312     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.neucom.2006.04.003     Document Type: Article
Times cited : (48)

References (8)
  • 1
    • 0035271446 scopus 로고    scopus 로고
    • The convergence properties of a clipped Hopfield network and its application in the design of keystream generator
    • Chan C.-K., and Cheng L.M. The convergence properties of a clipped Hopfield network and its application in the design of keystream generator. IEEE Trans. Neural Networks 12 2 (March 2001) 340-348
    • (2001) IEEE Trans. Neural Networks , vol.12 , Issue.2 , pp. 340-348
    • Chan, C.-K.1    Cheng, L.M.2
  • 2
    • 0038355068 scopus 로고    scopus 로고
    • On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators
    • Karras D.A., and Zorkadis V. On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators. Neural Networks 16 5-6 (2003) 899-905
    • (2003) Neural Networks , vol.16 , Issue.5-6 , pp. 899-905
    • Karras, D.A.1    Zorkadis, V.2
  • 3
    • 24944525903 scopus 로고    scopus 로고
    • S.G. Lian, G.R. Chen, A. Cheung, Z.Q. Wang, A chaotic-neural-network-based encryption algorithm for JPEG2000 encoded images, in: Proceedings of the 2004 IEEE Symposium on Neural Networks (ISNN2004), Dalian, China, Lecture Notes in Computer Science, Springer, Berlin, vol. 3174, 2004, pp. 627-632.
  • 4
    • 16344371432 scopus 로고    scopus 로고
    • Security analysis of a chaos-based image encryption Algorithm
    • Lian S.G., Sun J.S., and Wang Z.Q. Security analysis of a chaos-based image encryption Algorithm. Physica A 351 2-4 (15 June 2005) 645-661
    • (2005) Physica A , vol.351 , Issue.2-4 , pp. 645-661
    • Lian, S.G.1    Sun, J.S.2    Wang, Z.Q.3
  • 5
    • 0035652952 scopus 로고    scopus 로고
    • A probabilistic symmetric encryption scheme for very fast secure communication based on chaotic systems of difference equations
    • Papadimitriou S., Bountis T., Mavroudi S., and Bezerianos A. A probabilistic symmetric encryption scheme for very fast secure communication based on chaotic systems of difference equations. Int. J. Bifurcation Chaos 11 12 (2001) 3107-3115
    • (2001) Int. J. Bifurcation Chaos , vol.11 , Issue.12 , pp. 3107-3115
    • Papadimitriou, S.1    Bountis, T.2    Mavroudi, S.3    Bezerianos, A.4
  • 6
    • 33748415380 scopus 로고    scopus 로고
    • Secure Hash Standard, Federal Information Processing Standards Publications (FIPS PUBS) 180-2, 2002.
  • 8
    • 0036079845 scopus 로고    scopus 로고
    • L.P. Yee, L.C. De Silva, Application of multilayer perception networks in symmetric block ciphers, in: Proceedings of the 2002 International Joint Conference on Neural Networks, Honolulu, HI, USA, vol. 2, 12-17 May 2002, pp. 1455-1458.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.