-
1
-
-
34047273584
-
Study of chaos functions for their suitability in generating message authentication codes
-
Arumugam G., Lakshmi Praba V., and Radhakrishnan S. Study of chaos functions for their suitability in generating message authentication codes. Applied Soft Computing 7 (2007) 1064-1071
-
(2007)
Applied Soft Computing
, vol.7
, pp. 1064-1071
-
-
Arumugam, G.1
Lakshmi Praba, V.2
Radhakrishnan, S.3
-
2
-
-
77955516185
-
Keyed hash function
-
Proceedings of the Cryptography: Policy and Algorithms, Springer, Berlin
-
S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk, Keyed hash function, in: Proceedings of the Cryptography: Policy and Algorithms, Lecture Notes in Computer Science, vol. 1029, Springer, Berlin, 1996, pp. 201-214.
-
(1996)
Lecture Notes in Computer Science
, vol.1029
, pp. 201-214
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
3
-
-
0011285982
-
Design of one-dimensional chaotic maps with prescribed statistical properties
-
Baranousky A., and Daems D. Design of one-dimensional chaotic maps with prescribed statistical properties. International Journal of Bifurcation and Chaos 5 6 (1995) 1585-1598
-
(1995)
International Journal of Bifurcation and Chaos
, vol.5
, Issue.6
, pp. 1585-1598
-
-
Baranousky, A.1
Daems, D.2
-
4
-
-
0026122066
-
What every computer scientist should know about floating-point arithmetic
-
Goldberg D., and Priest D. What every computer scientist should know about floating-point arithmetic. ACM Computing Surveys 23 1 (1991) 5-48
-
(1991)
ACM Computing Surveys
, vol.23
, Issue.1
, pp. 5-48
-
-
Goldberg, D.1
Priest, D.2
-
5
-
-
33748433928
-
Secure hash function based on neural network
-
Lian S.G., Sun J.S., and Wang Z.Q. Secure hash function based on neural network. Neurocomputing 69 (2006) 2346-2350
-
(2006)
Neurocomputing
, vol.69
, pp. 2346-2350
-
-
Lian, S.G.1
Sun, J.S.2
Wang, Z.Q.3
-
7
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
Vanstone S.A., Menezes A.J., and Oorschot P.C. Handbook of Applied Cryptography (1996), CRC Press, Boca Raton, FL
-
(1996)
Handbook of Applied Cryptography
-
-
Vanstone, S.A.1
Menezes, A.J.2
Oorschot, P.C.3
-
8
-
-
2442684584
-
A combined chaotic cryptographic and hashing scheme
-
Wong K.W. A combined chaotic cryptographic and hashing scheme. Physics Letters A 307 (2003) 292-298
-
(2003)
Physics Letters A
, vol.307
, pp. 292-298
-
-
Wong, K.W.1
-
9
-
-
35048818468
-
A combined hash and encryption scheme by chaotic neural network
-
Proceedings of the 2004 IEEE Symposium on Neural Networks ISNN2004, Springer, Berlin
-
D. Xiao, X.F. Liao, A combined hash and encryption scheme by chaotic neural network, in: Proceedings of the 2004 IEEE Symposium on Neural Networks (ISNN2004), Lecture Notes in Computer Science, vol. 3174, Springer, Berlin, 2004, pp. 633-638.
-
(2004)
Lecture Notes in Computer Science
, vol.3174
, pp. 633-638
-
-
Xiao, D.1
Liao, X.F.2
-
10
-
-
9644303109
-
One-way hash function construction based on the chaotic map with changeable-parameter
-
Xiao D., Liao X.F., and Deng S.J. One-way hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals 24 1 (2005) 65-71
-
(2005)
Chaos, Solitons & Fractals
, vol.24
, Issue.1
, pp. 65-71
-
-
Xiao, D.1
Liao, X.F.2
Deng, S.J.3
-
11
-
-
22244444503
-
Hash function based on chaotic tent maps
-
Yi X. Hash function based on chaotic tent maps. IEEE Transactions on Circuits and Systems-II 52 6 (2005) 354-357
-
(2005)
IEEE Transactions on Circuits and Systems-II
, vol.52
, Issue.6
, pp. 354-357
-
-
Yi, X.1
-
12
-
-
33846348219
-
Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
-
Zhang J.S., Wang X.M., and Zhang W.F. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Physics Letters A 362 (2007) 439-448
-
(2007)
Physics Letters A
, vol.362
, pp. 439-448
-
-
Zhang, J.S.1
Wang, X.M.2
Zhang, W.F.3
|