메뉴 건너뛰기




Volumn 16, Issue 8, 2011, Pages 3245-3256

A more secure parallel keyed hash function based on chaotic neural network

Author keywords

Chaotic neural network; Hash function; Parallel; Security

Indexed keywords

ACCESS CONTROL; NETWORK SECURITY; NEURAL NETWORKS;

EID: 79952538941     PISSN: 10075704     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cnsns.2010.12.009     Document Type: Article
Times cited : (29)

References (15)
  • 7
    • 2442684584 scopus 로고    scopus 로고
    • A combined chaotic cryptographic and hashing scheme
    • Wong K.W. A combined chaotic cryptographic and hashing scheme. Phys Lett A 2003, 307:292-298.
    • (2003) Phys Lett A , vol.307 , pp. 292-298
    • Wong, K.W.1
  • 8
    • 9644303109 scopus 로고    scopus 로고
    • One-way Hash function construction based on the chaotic map with changeable parameter
    • Xiao D., Liao X.F., Deng S.J. One-way Hash function construction based on the chaotic map with changeable parameter. Chaos, Solitons Fract 2005, 24:65-71.
    • (2005) Chaos, Solitons Fract , vol.24 , pp. 65-71
    • Xiao, D.1    Liao, X.F.2    Deng, S.J.3
  • 9
    • 22244444503 scopus 로고    scopus 로고
    • Hash function based on chaotic tent maps
    • Yi X. Hash function based on chaotic tent maps. IEEE Trans Circuits Syst II 2005, 52:354-357.
    • (2005) IEEE Trans Circuits Syst II , vol.52 , pp. 354-357
    • Yi, X.1
  • 10
    • 33748433928 scopus 로고    scopus 로고
    • Secure hash function based on neural network
    • Lian S.G., Sun J.S., Wang Z.Q. Secure hash function based on neural network. Neurocomputing 2006, 69:2346-2350.
    • (2006) Neurocomputing , vol.69 , pp. 2346-2350
    • Lian, S.G.1    Sun, J.S.2    Wang, Z.Q.3
  • 11
    • 33644670737 scopus 로고    scopus 로고
    • A chaos-based cryptographic hash function for message authentication
    • Kwok H.S., Tang W.K.S. A chaos-based cryptographic hash function for message authentication. Int J Bifur Chaos 2005, 15:4043-4050.
    • (2005) Int J Bifur Chaos , vol.15 , pp. 4043-4050
    • Kwok, H.S.1    Tang, W.K.S.2
  • 12
    • 67349196408 scopus 로고    scopus 로고
    • A novel combined cryptographic and hash algorithm based on chaotic control character
    • Deng S.J., Xiao D., Li Y.T., Peng W.B. A novel combined cryptographic and hash algorithm based on chaotic control character. Commun Nonlinear Sci Numer Simul 2009, 14:3889-3900.
    • (2009) Commun Nonlinear Sci Numer Simul , vol.14 , pp. 3889-3900
    • Deng, S.J.1    Xiao, D.2    Li, Y.T.3    Peng, W.B.4
  • 13
    • 67349180690 scopus 로고    scopus 로고
    • Parallel keyed Hash function construction based on chaotic neural network
    • Xiao D., Liao X.F., Wang Y. Parallel keyed Hash function construction based on chaotic neural network. Neurocomputing 2009, 72:2288-2296.
    • (2009) Neurocomputing , vol.72 , pp. 2288-2296
    • Xiao, D.1    Liao, X.F.2    Wang, Y.3
  • 14
    • 0011285982 scopus 로고
    • Design of one-dimensional chaotic maps with prescribed statistical properties
    • Baranousky A., Daems D. Design of one-dimensional chaotic maps with prescribed statistical properties. Int J Bifur Chaos 1995, 5(6):1585-1598.
    • (1995) Int J Bifur Chaos , vol.5 , Issue.6 , pp. 1585-1598
    • Baranousky, A.1    Daems, D.2
  • 15
    • 0026122066 scopus 로고
    • What every computer scientist should know about floating-point arithmetic
    • Goldberg D., Priest D. What every computer scientist should know about floating-point arithmetic. ACM Comput Surv ACM Comput Surv 1991, 23:5-48.
    • (1991) ACM Comput Surv ACM Comput Surv , vol.23 , pp. 5-48
    • Goldberg, D.1    Priest, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.