메뉴 건너뛰기




Volumn 186, Issue 1, 2012, Pages 249-264

Keyed hash function based on a chaotic map

Author keywords

Chaos; Cryptography; Keyed hash function; Skew tent map

Indexed keywords

CHAOTIC MAP; COLLISION RESISTANCE; CRYPTOGRAPHIC APPLICATIONS; DIGITAL SIGNATURE SCHEMES; HASH VALUE; HIGH SENSITIVITY; SECRET KEY; SECURE HASH FUNCTION; SKEW TENT MAP; STATISTICAL PERFORMANCE; WEB APPLICATION;

EID: 81355163544     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2011.09.008     Document Type: Article
Times cited : (76)

References (48)
  • 1
    • 67650071037 scopus 로고    scopus 로고
    • Hash function based on piecewise nonlinear chaotic map
    • A. Akhavan, A. Samsudin, and A. Akhshani Hash function based on piecewise nonlinear chaotic map Chaos, Solitons and Fractals 42 2 2009 1046 1053
    • (2009) Chaos, Solitons and Fractals , vol.42 , Issue.2 , pp. 1046-1053
    • Akhavan, A.1    Samsudin, A.2    Akhshani, A.3
  • 3
    • 2442662577 scopus 로고    scopus 로고
    • Cryptanalysis of dynamic look-up table based chaotic cryptosystems
    • G. Alvarez, F. Montoya, M. Romera, and G. Pastor Cryptanalysis of dynamic look-up table based chaotic cryptosystems Physics Letters A 326 2004 211 218
    • (2004) Physics Letters A , vol.326 , pp. 211-218
    • Alvarez, G.1    Montoya, F.2    Romera, M.3    Pastor, G.4
  • 4
    • 34047273584 scopus 로고    scopus 로고
    • Study of chaos functions for their suitability in generating Message Authentication Codes
    • DOI 10.1016/j.asoc.2006.05.005, PII S1568494606000640
    • G. Arumugam, V. Lakshmi Praba, and S. Radhakrishana Study of chaos functions for their suitability in generating message authentication codes Applied Soft Computing 7 3 2007 1064 1071 (Pubitemid 46551936)
    • (2007) Applied Soft Computing Journal , vol.7 , Issue.3 , pp. 1064-1071
    • Arumugam, G.1    Lakshmi Praba, V.2    Radhakrishnan, S.3
  • 5
    • 77955516185 scopus 로고    scopus 로고
    • Keyed Hash Functions
    • Cryptography: Policy and Algorithms
    • S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk Keyed hash functions Proceedings of the Cryptography: Policy and Algorithms Conference Lecture Notes in Computer Science vol. 1029 1995 Springer-Verlag Berlin 201 214 (Pubitemid 126030174)
    • (1996) Lecture Notes in Computer Science , Issue.1029 , pp. 201-214
    • Bakhtiari, S.1    Safavi-Naini, R.2    Pieprzyk, J.3
  • 7
    • 76349087823 scopus 로고    scopus 로고
    • Compression-unimpaired batch-image encryption combining vector quantization and index compression
    • T. Chen, and C. Wu Compression-unimpaired batch-image encryption combining vector quantization and index compression Information Sciences 180 9 2010 1690 1701
    • (2010) Information Sciences , vol.180 , Issue.9 , pp. 1690-1701
    • Chen, T.1    Wu, C.2
  • 8
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Santa Barbara, CA
    • I.B. Damgard, A design principle for hash functions, in: Proceedings of Crypto'89, Santa Barbara, CA, 1989, pp. 416-427.
    • (1989) Proceedings of Crypto'89 , pp. 416-427
    • Damgard, I.B.1
  • 12
    • 81355155129 scopus 로고    scopus 로고
    • FIPS 180-1, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington DC, 1995
    • FIPS 180-1, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington DC, 1995.
  • 16
    • 77950352173 scopus 로고    scopus 로고
    • Search-based chaotic pseudorandom bit generator
    • A. Kanso Search-based chaotic pseudorandom bit generator International Journal of Bifurcations and Chaos 19 12 2009 4227 4235
    • (2009) International Journal of Bifurcations and Chaos , vol.19 , Issue.12 , pp. 4227-4235
    • Kanso, A.1
  • 17
    • 69249152191 scopus 로고    scopus 로고
    • Irregularly decimated chaotic map(s) for binary digits generations
    • A. Kanso, and N. Smaoui Irregularly decimated chaotic map(s) for binary digits generations International Journal of Bifurcations and Chaos 19 4 2009 1169 1183
    • (2009) International Journal of Bifurcations and Chaos , vol.19 , Issue.4 , pp. 1169-1183
    • Kanso, A.1    Smaoui, N.2
  • 18
    • 67349197413 scopus 로고    scopus 로고
    • Logistic chaotic maps for binary numbers generations
    • A. Kanso, and N. Smaoui Logistic chaotic maps for binary numbers generations Chaos, Solitons and Fractals 40 5 2009 2557 2568
    • (2009) Chaos, Solitons and Fractals , vol.40 , Issue.5 , pp. 2557-2568
    • Kanso, A.1    Smaoui, N.2
  • 19
    • 0003294665 scopus 로고    scopus 로고
    • The Art of Computer Programming
    • second ed. Addison-Wesley
    • D. Knuth The Art of Computer Programming second ed. Sorting and Searching vol. 3 1998 Addison-Wesley
    • (1998) Sorting and Searching , vol.3
    • Knuth, D.1
  • 20
    • 33644670737 scopus 로고    scopus 로고
    • A chaos-based cryptographic hash function for message authentication
    • DOI 10.1142/S0218127405014489
    • H. Kwok, and W. Tang A chaos-based cryptographic hash function for message authentication International Journal of Bifurcation and Chaos 15 2005 4043 4050 (Pubitemid 43333484)
    • (2005) International Journal of Bifurcation and Chaos , vol.15 , Issue.12 , pp. 4043-4050
    • Kwok, H.S.1    Tang, W.K.S.2
  • 21
    • 34548237327 scopus 로고    scopus 로고
    • TestU01: A C library for empirical testing of random number generators
    • Article No. 22.
    • P. L'Ecuyer, and R. Simard TestU01: a C library for empirical testing of random number generators ACM Transactions on Mathematical Software 33 4 2007 Article No. 22.
    • (2007) ACM Transactions on Mathematical Software , vol.33 , Issue.4
    • L'Ecuyer, P.1    Simard, R.2
  • 23
    • 7644238021 scopus 로고    scopus 로고
    • Ph.D. Thesis, School of Electronics and Information Engineering, Xian Jiaotong University, Xian, China
    • S. Li, Analyses and new designs of digital chaotic ciphers, Ph.D. Thesis, School of Electronics and Information Engineering, Xian Jiaotong University, Xian, China, , 2003.
    • (2003) Analyses and New Designs of Digital Chaotic Ciphers
    • Li, S.1
  • 24
    • 84974731225 scopus 로고    scopus 로고
    • Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography
    • Lecture Notes in Computer Science Springer-Verlag Berlin
    • S. Li, X. Mou, and Y. Cai Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography Proceedings of INDOCRYPT 01 Lecture Notes in Computer Science vol. 2247 2001 Springer-Verlag Berlin 316 329
    • (2001) Proceedings of INDOCRYPT 01 , vol.2247 , pp. 316-329
    • Li, S.1    Mou, X.2    Cai, Y.3
  • 27
    • 0032301756 scopus 로고    scopus 로고
    • Predicting a chaotic time series using a fuzzy neural network
    • PII S0020025598100269
    • L. Maguire, B. Roche, T. McGinnity, and L. McDaid Predicting a chaotic time series using a fuzzy neural network Information Sciences 112 1998 125 136 (Pubitemid 128649631)
    • (1998) Information Sciences , vol.112 , Issue.1-4 , pp. 125-136
    • Maguire, L.P.1    Roche, B.2    McGinnity, T.M.3    McDaid, L.J.4
  • 28
    • 84950900200 scopus 로고
    • On the derivation of a chaotic encryption algorithm
    • R. Matthews On the derivation of a chaotic encryption algorithm Cryptologia XIII 1 1989 29 42
    • (1989) Cryptologia , vol.13 , Issue.1 , pp. 29-42
    • Matthews, R.1
  • 30
    • 84937461306 scopus 로고
    • One way hash functions and des
    • Santa Barbara, CA
    • R.C. Merkle, One way hash functions and DES, in: Proceedings of Crypto'89, Santa Barbara, CA, 1989, pp. 428-446.
    • (1989) Proceedings of Crypto'89 , pp. 428-446
    • Merkle, C.1
  • 32
    • 41349113980 scopus 로고    scopus 로고
    • Extracting information masked by the chaotic signal of a time-delay system
    • V.I. Ponomarenko, and M.D. Prokhorov Extracting information masked by the chaotic signal of a time-delay system Physical Review E 66 2002 026215
    • (2002) Physical Review e , vol.66 , pp. 026215
    • Ponomarenko, V.I.1    Prokhorov, M.D.2
  • 34
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E. Shannon Communication theory of secrecy systems Bell System Technical Journal 28 1948 656 715
    • (1948) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 38
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the hash functions MD4 and RIPEMD
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • X. Wang, X. Lai, D. Feng, H. Chen, and X. Yu Cryptanalysis of the hash functions MD4 and RIPEMD Proceedings of Eurocrypt'05 Lecture Notes in Computer Science vol. 3494 2005 Springer-Verlag Berlin 1 18 (Pubitemid 41313943)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 39
    • 37249092682 scopus 로고    scopus 로고
    • One-way hash function construction based on 2D coupled map lattices
    • DOI 10.1016/j.ins.2007.10.008, PII S0020025507004938
    • Y. Wang, X. Liao, D. Xiao, and K. Wong One-way hash function construction based on 2D coupled map lattices Information Sciences 178 2008 1391 1406 (Pubitemid 350266639)
    • (2008) Information Sciences , vol.178 , Issue.5 , pp. 1391-1406
    • Wang, Y.1    Liao, X.2    Xiao, D.3    Wong, K.-W.4
  • 40
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • X. Wang, and H. Yu How to break MD5 and other hash functions Proceedings of Eurocrypt'05 Lecture Notes in Computer Science vol. 3494 2005 Springer-Verlag Berlin 19 35 (Pubitemid 41313944)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 41
    • 2442684584 scopus 로고    scopus 로고
    • A combined chaotic cryptographic and hashing scheme
    • K.W. Wong A combined chaotic cryptographic and hashing scheme Physics Letters A 307 2003 292 298
    • (2003) Physics Letters A , vol.307 , pp. 292-298
    • Wong, K.W.1
  • 42
    • 9644303109 scopus 로고    scopus 로고
    • One-way hash function construction based on the chaotic map with changeable-parameter
    • D. Xiao, X. Liao, and S. Deng One-way hash function construction based on the chaotic map with changeable-parameter Chaos, Solitons and Fractals 24 2005 65 71
    • (2005) Chaos, Solitons and Fractals , vol.24 , pp. 65-71
    • Xiao, D.1    Liao, X.2    Deng, S.3
  • 43
    • 67349180690 scopus 로고    scopus 로고
    • Parallel keyed hash function construction based on chaotic neural network
    • D. Xiao, X. Liao, and Y. Wang Parallel keyed hash function construction based on chaotic neural network Neurocomputing 72 2009 2288 2296
    • (2009) Neurocomputing , vol.72 , pp. 2288-2296
    • Xiao, D.1    Liao, X.2    Wang, Y.3
  • 45
    • 33846348219 scopus 로고    scopus 로고
    • Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
    • J. Zhang, X. Wang, and W. Zhang Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter Physics Letters A 362 2007 439 448
    • (2007) Physics Letters A , vol.362 , pp. 439-448
    • Zhang, J.1    Wang, X.2    Zhang, W.3
  • 46
    • 24744456105 scopus 로고    scopus 로고
    • One way Hash function construction based on Spatiotemporal chaos
    • H. Zhang, X. Wang, Z. Li, and D. Liu One way hash function construction based on spatiotemporal chaos Acta Physica Sinica 54 9 2005 4006 4011 (Pubitemid 41294015)
    • (2005) Wuli Xuebao/Acta Physica Sinica , vol.54 , Issue.9 , pp. 4006-4011
    • Zhang, H.1    Wang, X.-F.2    Li, Z.-H.3    Liu, D.-H.4
  • 47
    • 0030635241 scopus 로고    scopus 로고
    • Generating chaotic secure sequences with desired statistical properties and high security
    • H. Zhou, and X.T. Ling Generating chaotic secure sequences with desired statistical properties and high security International Journal of Bifurcations and Chaos 7 1 1997 205 213
    • (1997) International Journal of Bifurcations and Chaos , vol.7 , Issue.1 , pp. 205-213
    • Zhou, H.1    Ling, X.T.2
  • 48
    • 67650998490 scopus 로고    scopus 로고
    • True random number generator based on mouse movement and chaotic hash function
    • Q. Zhou, X. Liao, K. Wong, Y. Hu, and D. Xiao True random number generator based on mouse movement and chaotic hash function Information Sciences 179 19 2009 3442 3450
    • (2009) Information Sciences , vol.179 , Issue.19 , pp. 3442-3450
    • Zhou, Q.1    Liao, X.2    Wong, K.3    Hu, Y.4    Xiao, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.