-
1
-
-
78650922644
-
The MD4 message digest algorithm
-
Springer-Verlag
-
Rivest R.L. The MD4 message digest algorithm. Advances in cryptology-crypto'90 LNCS vol. 537 (1991), Springer-Verlag 303-331
-
(1991)
Advances in cryptology-crypto'90 LNCS
, vol.537
, pp. 303-331
-
-
Rivest, R.L.1
-
2
-
-
0003602325
-
The MD5 message digest algorithm, request for comments (RFC) 1321 internet activities board internet privacy task force
-
April
-
R.L. Rivest, The MD5 message digest algorithm, request for comments (RFC) 1321 internet activities board internet privacy task force, April, 1992.
-
(1992)
-
-
Rivest, R.L.1
-
3
-
-
67649381885
-
-
FIPS180, Secure hash standard, federal information processing standard (FIPS), publication 180, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., May 1993.
-
FIPS180, Secure hash standard, federal information processing standard (FIPS), publication 180, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., May 1993.
-
-
-
-
5
-
-
0013058662
-
Data authentication using modification detection codes based on a public one way encryption function,
-
U.S. Patent Number 4,908,861, March 13
-
B.O. Brachtl, D. Coppersmith, M.M. Hyden, S.M. Matyas, C.H. Meyer, J. Oseas, S. Pilpel, M. Schilling, Data authentication using modification detection codes based on a public one way encryption function, U.S. Patent Number 4,908,861, March 13, 1990.
-
(1990)
-
-
Brachtl, B.O.1
Coppersmith, D.2
Hyden, M.M.3
Matyas, S.M.4
Meyer, C.H.5
Oseas, J.6
Pilpel, S.7
Schilling, M.8
-
6
-
-
84957799016
-
Security of iterated hash functions based on block ciphers
-
Springer-Verlag
-
Hohl W., Lai X., Meier T., and Waldvogel C. Security of iterated hash functions based on block ciphers. Advances in cryptology-crypto93 LNCS vol. 773 (1994), Springer-Verlag 379-390
-
(1994)
Advances in cryptology-crypto93 LNCS
, vol.773
, pp. 379-390
-
-
Hohl, W.1
Lai, X.2
Meier, T.3
Waldvogel, C.4
-
8
-
-
35248889035
-
New attacks on all double block length hash functions of hash rate 1 including the parallel-DM
-
Springer-Verlag
-
Knudsen L.R., and Lai X. New attacks on all double block length hash functions of hash rate 1 including the parallel-DM. Advances in cryptology-eurocrypt'94 LNCS vol. 959 (1995), Springer-Verlag 410-418
-
(1995)
Advances in cryptology-eurocrypt'94 LNCS
, vol.959
, pp. 410-418
-
-
Knudsen, L.R.1
Lai, X.2
-
9
-
-
45849121786
-
Parallel image encryption algorithm based on discretized chaotic map
-
Qing Z., Kwok-Wo W., Xiaofeng L., Tao X., and Yue H. Parallel image encryption algorithm based on discretized chaotic map. Chaos Solitons & Fractals 38 4 (2008) 1081-1092
-
(2008)
Chaos Solitons & Fractals
, vol.38
, Issue.4
, pp. 1081-1092
-
-
Qing, Z.1
Kwok-Wo, W.2
Xiaofeng, L.3
Tao, X.4
Yue, H.5
-
10
-
-
33845201998
-
Digital color image encoding and decoding using a novel chaotic random generator
-
Nien H.H., Huang C.K., Changchien S.K., Shieh H.W., Chen C.T., and Tuan Y.Y. Digital color image encoding and decoding using a novel chaotic random generator. Chaos, Solitons & Fractals 32 (2007) 1070-1080
-
(2007)
Chaos, Solitons & Fractals
, vol.32
, pp. 1070-1080
-
-
Nien, H.H.1
Huang, C.K.2
Changchien, S.K.3
Shieh, H.W.4
Chen, C.T.5
Tuan, Y.Y.6
-
11
-
-
64549097566
-
Applications of tripled chaotic maps in cryptography
-
Behnia S., Akhshani A., Akhavan A., and Mahmodi H. Applications of tripled chaotic maps in cryptography. Chaos Solitons & Fractals 40 1 (2009) 505-519
-
(2009)
Chaos Solitons & Fractals
, vol.40
, Issue.1
, pp. 505-519
-
-
Behnia, S.1
Akhshani, A.2
Akhavan, A.3
Mahmodi, H.4
-
12
-
-
85126471185
-
-
Song Han, Security of a key agreement protocol based on chaotic maps, Chaos Solitons & Fractals, Available from: .
-
Song Han, Security of a key agreement protocol based on chaotic maps, Chaos Solitons & Fractals, Available from: .
-
-
-
-
13
-
-
34548620637
-
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
-
Khan M.K., Zhang J., and Wang X. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals 35 (2008) 519-524
-
(2008)
Chaos, Solitons & Fractals
, vol.35
, pp. 519-524
-
-
Khan, M.K.1
Zhang, J.2
Wang, X.3
-
14
-
-
2442684584
-
A combined chaotic cryptographic and hashing scheme
-
Wong K. A combined chaotic cryptographic and hashing scheme. Phys Lett A 307 (2003) 292-298
-
(2003)
Phys Lett A
, vol.307
, pp. 292-298
-
-
Wong, K.1
-
15
-
-
9644303109
-
One-way Hash function construction based on the chaotic map with changeable-parameter
-
Xiao D., Liao X., and Deng S. One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals 24 (2005) 65-71
-
(2005)
Chaos, Solitons & Fractals
, vol.24
, pp. 65-71
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
16
-
-
38349025681
-
Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
-
Xiao D., Liao X., and Deng S. Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inform Sci 178 6 (2008) 1598-1602
-
(2008)
Inform Sci
, vol.178
, Issue.6
, pp. 1598-1602
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
17
-
-
24744456105
-
One way Hash function construction based on spatiotemporal chaos
-
[in Chinese]
-
Zhang H., Wang X., Li Z., and Liu D. One way Hash function construction based on spatiotemporal chaos. Acta Phys Sinica 54 9 (2005) 4006-4011 [in Chinese]
-
(2005)
Acta Phys Sinica
, vol.54
, Issue.9
, pp. 4006-4011
-
-
Zhang, H.1
Wang, X.2
Li, Z.3
Liu, D.4
-
18
-
-
33846348219
-
Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
-
Zhang J., Wang X., and Zhang W. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Phys Lett A 362 (2007) 439-448
-
(2007)
Phys Lett A
, vol.362
, pp. 439-448
-
-
Zhang, J.1
Wang, X.2
Zhang, W.3
-
19
-
-
37249092682
-
One-way hash function construction based on 2D coupled map lattices
-
Wang Y., Liao X., Xiao D., and Wong K. One-way hash function construction based on 2D coupled map lattices. Inform Sci 178 (2008) 1391-1406
-
(2008)
Inform Sci
, vol.178
, pp. 1391-1406
-
-
Wang, Y.1
Liao, X.2
Xiao, D.3
Wong, K.4
-
20
-
-
2442662577
-
Cryptanalysis of dynamic look-up table based chaotic cryptosystems
-
Alvarez G., Montoya F., Romera M., and Pastor G. Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys Lett A 326 (2004) 211-218
-
(2004)
Phys Lett A
, vol.326
, pp. 211-218
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
21
-
-
27544464865
-
One-way Hash function construction based on two-dimensional hyper-chaotic mappings
-
in Chinese
-
Peng Fei, Qiu Shui-Sheng, Long Min. One-way Hash function construction based on two-dimensional hyper-chaotic mappings. Acta Phys Sinica 2005;54(10):4562-07 [in Chinese].
-
(2005)
Acta Phys Sinica
, vol.54
, Issue.10
, pp. 4562-4607
-
-
Fei, P.1
Qiu, S.-S.2
Min, L.3
-
24
-
-
0026122066
-
What every computer scientist should know about floating-point arithmetic
-
Goldberg D., and Priest D. What every computer scientist should know about floating-point arithmetic. ACM Comput Surveys 23 1 (1991) 5-48
-
(1991)
ACM Comput Surveys
, vol.23
, Issue.1
, pp. 5-48
-
-
Goldberg, D.1
Priest, D.2
|