메뉴 건너뛰기




Volumn 41, Issue 5, 2009, Pages 2566-2574

One-way hash function construction based on chaotic map network

Author keywords

[No Author keywords available]

Indexed keywords

CHAOTIC SYSTEMS;

EID: 67649348499     PISSN: 09600779     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.chaos.2008.09.056     Document Type: Article
Times cited : (44)

References (24)
  • 1
    • 78650922644 scopus 로고
    • The MD4 message digest algorithm
    • Springer-Verlag
    • Rivest R.L. The MD4 message digest algorithm. Advances in cryptology-crypto'90 LNCS vol. 537 (1991), Springer-Verlag 303-331
    • (1991) Advances in cryptology-crypto'90 LNCS , vol.537 , pp. 303-331
    • Rivest, R.L.1
  • 2
    • 0003602325 scopus 로고
    • The MD5 message digest algorithm, request for comments (RFC) 1321 internet activities board internet privacy task force
    • April
    • R.L. Rivest, The MD5 message digest algorithm, request for comments (RFC) 1321 internet activities board internet privacy task force, April, 1992.
    • (1992)
    • Rivest, R.L.1
  • 3
    • 67649381885 scopus 로고    scopus 로고
    • FIPS180, Secure hash standard, federal information processing standard (FIPS), publication 180, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., May 1993.
    • FIPS180, Secure hash standard, federal information processing standard (FIPS), publication 180, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., May 1993.
  • 4
    • 85026897539 scopus 로고
    • Hash functions based on block ciphers A synthetic approach
    • Springer-Verlag
    • Preneel B., Govaerts R., and Vandewalle J. Hash functions based on block ciphers A synthetic approach. Advances in cryptology-crypto'93 LNCS vol. 773 (1994), Springer-Verlag 368-378
    • (1994) Advances in cryptology-crypto'93 LNCS , vol.773 , pp. 368-378
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 5
    • 0013058662 scopus 로고
    • Data authentication using modification detection codes based on a public one way encryption function,
    • U.S. Patent Number 4,908,861, March 13
    • B.O. Brachtl, D. Coppersmith, M.M. Hyden, S.M. Matyas, C.H. Meyer, J. Oseas, S. Pilpel, M. Schilling, Data authentication using modification detection codes based on a public one way encryption function, U.S. Patent Number 4,908,861, March 13, 1990.
    • (1990)
    • Brachtl, B.O.1    Coppersmith, D.2    Hyden, M.M.3    Matyas, S.M.4    Meyer, C.H.5    Oseas, J.6    Pilpel, S.7    Schilling, M.8
  • 6
    • 84957799016 scopus 로고
    • Security of iterated hash functions based on block ciphers
    • Springer-Verlag
    • Hohl W., Lai X., Meier T., and Waldvogel C. Security of iterated hash functions based on block ciphers. Advances in cryptology-crypto93 LNCS vol. 773 (1994), Springer-Verlag 379-390
    • (1994) Advances in cryptology-crypto93 LNCS , vol.773 , pp. 379-390
    • Hohl, W.1    Lai, X.2    Meier, T.3    Waldvogel, C.4
  • 7
    • 84958591161 scopus 로고    scopus 로고
    • Fast and secure hashing based on codes
    • Springer-Verlag
    • Knudsen L.R., and Preneel B. Fast and secure hashing based on codes. Advances in cryptology-crypto'97 LNCS Vol. 1294 (1997), Springer-Verlag 485-498
    • (1997) Advances in cryptology-crypto'97 LNCS , vol.1294 , pp. 485-498
    • Knudsen, L.R.1    Preneel, B.2
  • 8
    • 35248889035 scopus 로고
    • New attacks on all double block length hash functions of hash rate 1 including the parallel-DM
    • Springer-Verlag
    • Knudsen L.R., and Lai X. New attacks on all double block length hash functions of hash rate 1 including the parallel-DM. Advances in cryptology-eurocrypt'94 LNCS vol. 959 (1995), Springer-Verlag 410-418
    • (1995) Advances in cryptology-eurocrypt'94 LNCS , vol.959 , pp. 410-418
    • Knudsen, L.R.1    Lai, X.2
  • 9
    • 45849121786 scopus 로고    scopus 로고
    • Parallel image encryption algorithm based on discretized chaotic map
    • Qing Z., Kwok-Wo W., Xiaofeng L., Tao X., and Yue H. Parallel image encryption algorithm based on discretized chaotic map. Chaos Solitons & Fractals 38 4 (2008) 1081-1092
    • (2008) Chaos Solitons & Fractals , vol.38 , Issue.4 , pp. 1081-1092
    • Qing, Z.1    Kwok-Wo, W.2    Xiaofeng, L.3    Tao, X.4    Yue, H.5
  • 12
    • 85126471185 scopus 로고    scopus 로고
    • Song Han, Security of a key agreement protocol based on chaotic maps, Chaos Solitons & Fractals, Available from: .
    • Song Han, Security of a key agreement protocol based on chaotic maps, Chaos Solitons & Fractals, Available from: .
  • 13
    • 34548620637 scopus 로고    scopus 로고
    • Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    • Khan M.K., Zhang J., and Wang X. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals 35 (2008) 519-524
    • (2008) Chaos, Solitons & Fractals , vol.35 , pp. 519-524
    • Khan, M.K.1    Zhang, J.2    Wang, X.3
  • 14
    • 2442684584 scopus 로고    scopus 로고
    • A combined chaotic cryptographic and hashing scheme
    • Wong K. A combined chaotic cryptographic and hashing scheme. Phys Lett A 307 (2003) 292-298
    • (2003) Phys Lett A , vol.307 , pp. 292-298
    • Wong, K.1
  • 15
    • 9644303109 scopus 로고    scopus 로고
    • One-way Hash function construction based on the chaotic map with changeable-parameter
    • Xiao D., Liao X., and Deng S. One-way Hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals 24 (2005) 65-71
    • (2005) Chaos, Solitons & Fractals , vol.24 , pp. 65-71
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 16
    • 38349025681 scopus 로고    scopus 로고
    • Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
    • Xiao D., Liao X., and Deng S. Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inform Sci 178 6 (2008) 1598-1602
    • (2008) Inform Sci , vol.178 , Issue.6 , pp. 1598-1602
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 17
    • 24744456105 scopus 로고    scopus 로고
    • One way Hash function construction based on spatiotemporal chaos
    • [in Chinese]
    • Zhang H., Wang X., Li Z., and Liu D. One way Hash function construction based on spatiotemporal chaos. Acta Phys Sinica 54 9 (2005) 4006-4011 [in Chinese]
    • (2005) Acta Phys Sinica , vol.54 , Issue.9 , pp. 4006-4011
    • Zhang, H.1    Wang, X.2    Li, Z.3    Liu, D.4
  • 18
    • 33846348219 scopus 로고    scopus 로고
    • Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
    • Zhang J., Wang X., and Zhang W. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Phys Lett A 362 (2007) 439-448
    • (2007) Phys Lett A , vol.362 , pp. 439-448
    • Zhang, J.1    Wang, X.2    Zhang, W.3
  • 19
    • 37249092682 scopus 로고    scopus 로고
    • One-way hash function construction based on 2D coupled map lattices
    • Wang Y., Liao X., Xiao D., and Wong K. One-way hash function construction based on 2D coupled map lattices. Inform Sci 178 (2008) 1391-1406
    • (2008) Inform Sci , vol.178 , pp. 1391-1406
    • Wang, Y.1    Liao, X.2    Xiao, D.3    Wong, K.4
  • 20
    • 2442662577 scopus 로고    scopus 로고
    • Cryptanalysis of dynamic look-up table based chaotic cryptosystems
    • Alvarez G., Montoya F., Romera M., and Pastor G. Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys Lett A 326 (2004) 211-218
    • (2004) Phys Lett A , vol.326 , pp. 211-218
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 21
    • 27544464865 scopus 로고    scopus 로고
    • One-way Hash function construction based on two-dimensional hyper-chaotic mappings
    • in Chinese
    • Peng Fei, Qiu Shui-Sheng, Long Min. One-way Hash function construction based on two-dimensional hyper-chaotic mappings. Acta Phys Sinica 2005;54(10):4562-07 [in Chinese].
    • (2005) Acta Phys Sinica , vol.54 , Issue.10 , pp. 4562-4607
    • Fei, P.1    Qiu, S.-S.2    Min, L.3
  • 24
    • 0026122066 scopus 로고
    • What every computer scientist should know about floating-point arithmetic
    • Goldberg D., and Priest D. What every computer scientist should know about floating-point arithmetic. ACM Comput Surveys 23 1 (1991) 5-48
    • (1991) ACM Comput Surveys , vol.23 , Issue.1 , pp. 5-48
    • Goldberg, D.1    Priest, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.