-
2
-
-
35048891868
-
Keying hash functions for message authentication
-
Springer-Verlag, dvances in Cryptology-Crypto 96 Proceedings
-
Bellare M., Canetti R., Krawczyk H. Keying hash functions for message authentication. Lecture Notes in Computer Science 1996, 1109:1-19. Springer-Verlag.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 1-19
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
85196163844
-
-
FIPS 180-1, Secure hash standard, federal information processing standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., 1995.
-
FIPS 180-1, Secure hash standard, federal information processing standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., 1995.
-
-
-
-
5
-
-
85196182374
-
-
Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, IACR Cryptology ePrint Archive
-
Wang X, Feng D, Lai X, Yu H. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, IACR Cryptology ePrint Archive, 2004, pp. 199.
-
(2004)
, pp. 199
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Yu, H.4
-
6
-
-
24944591357
-
How to break MD5 and other hash functions
-
Springer-Verlag, Advances in cryptology-eurocrypt 05 proceedings
-
Wang X., Yu H. How to break MD5 and other hash functions. Lecture notes in computer science 2005, 3494:19-35. Springer-Verlag.
-
(2005)
Lecture notes in computer science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
7
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Springer-Verlag, Advances in cryptology-crypto 05 proceedings
-
Wang X., Yin Y.L., Yu H. Finding collisions in the full SHA-1. Lecture notes in computer science 2005, 3494:17-36. Springer-Verlag.
-
(2005)
Lecture notes in computer science
, vol.3494
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
8
-
-
0042786512
-
Cryptography with chaos
-
Baptista M.S. Cryptography with chaos. Phys Lett A 1998, 240:50-54.
-
(1998)
Phys Lett A
, vol.240
, pp. 50-54
-
-
Baptista, M.S.1
-
10
-
-
69249152191
-
Irregularly decimated chaotic map(s) for binary digits generations
-
Kanso A., Smaoui N. Irregularly decimated chaotic map(s) for binary digits generations. Int J Bifurcat Chaos 2009, 19(4):1169-1183.
-
(2009)
Int J Bifurcat Chaos
, vol.19
, Issue.4
, pp. 1169-1183
-
-
Kanso, A.1
Smaoui, N.2
-
11
-
-
67349197413
-
Logistic chaotic maps for binary numbers generations
-
Kanso A., Smaoui N. Logistic chaotic maps for binary numbers generations. Chaos Solitons Fract 2009, 40(5):2557-2568.
-
(2009)
Chaos Solitons Fract
, vol.40
, Issue.5
, pp. 2557-2568
-
-
Kanso, A.1
Smaoui, N.2
-
12
-
-
2442684584
-
A combined chaotic cryptographic and hashing scheme
-
Wong K.W. A combined chaotic cryptographic and hashing scheme. Phys Lett A 2003, 307:292-298.
-
(2003)
Phys Lett A
, vol.307
, pp. 292-298
-
-
Wong, K.W.1
-
13
-
-
33644670737
-
A chaos-based cryptographic hash function for message authentication
-
Kwok H., Tang W. A chaos-based cryptographic hash function for message authentication. Int J Bifurcat Chaos 2005, 15:4043-4050.
-
(2005)
Int J Bifurcat Chaos
, vol.15
, pp. 4043-4050
-
-
Kwok, H.1
Tang, W.2
-
14
-
-
22244444503
-
Hash function based on chaotic tent maps
-
Yi X. Hash function based on chaotic tent maps. IEEE Trans Circuits Syst - II 2005, 52(6):354-357.
-
(2005)
IEEE Trans Circuits Syst - II
, vol.52
, Issue.6
, pp. 354-357
-
-
Yi, X.1
-
15
-
-
9644303109
-
One-way hash function construction based on the chaotic map with changeable-parameter
-
Xiao D., Liao X., Deng S. One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fract 2005, 24(386):65-71.
-
(2005)
Chaos Solitons Fract
, vol.24
, Issue.386
, pp. 65-71
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
16
-
-
24744456105
-
One way hash function construction based on spatiotemporal chaos
-
Zhang H., Wang X., Li Z., Liu D. One way hash function construction based on spatiotemporal chaos. Acta Phys Sinica 2005, 54(9):4006-4011.
-
(2005)
Acta Phys Sinica
, vol.54
, Issue.9
, pp. 4006-4011
-
-
Zhang, H.1
Wang, X.2
Li, Z.3
Liu, D.4
-
17
-
-
34547342744
-
Hash function based on chaotic neural networks
-
Lian S, Liu Z, Ren Z, Wang H. Hash function based on chaotic neural networks, In: Proceedings of International Symposium on Circuits and Systems, 2006, p. 237-240.
-
(2006)
In: Proceedings of International Symposium on Circuits and Systems
, pp. 237-240
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
18
-
-
33846348219
-
Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
-
Zhang J., Wang X., Zhang W. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Phys Lett A 2007, 362:439-448.
-
(2007)
Phys Lett A
, vol.362
, pp. 439-448
-
-
Zhang, J.1
Wang, X.2
Zhang, W.3
-
19
-
-
37249092682
-
One-way hash function construction based on 2D coupled map lattices
-
Wang Y., Liao X., Xiao D., Wong K. One-way hash function construction based on 2D coupled map lattices. Inform Sci 2008, 178:1391-1406.
-
(2008)
Inform Sci
, vol.178
, pp. 1391-1406
-
-
Wang, Y.1
Liao, X.2
Xiao, D.3
Wong, K.4
-
20
-
-
44449128947
-
Parallel keyed hash function construction based on chaotic maps
-
Xiao D., Liao X., Deng S. Parallel keyed hash function construction based on chaotic maps. Phys Lett A 2008, 372:4682-4688.
-
(2008)
Phys Lett A
, vol.372
, pp. 4682-4688
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
21
-
-
67349180690
-
Parallel keyed hash function construction based on chaotic neural network
-
Xiao D., Liao X., Wang Y. Parallel keyed hash function construction based on chaotic neural network. Neurocomputing 2009, 72:2288-2296.
-
(2009)
Neurocomputing
, vol.72
, pp. 2288-2296
-
-
Xiao, D.1
Liao, X.2
Wang, Y.3
-
22
-
-
67650995788
-
A novel method for one-way hash function construction based on spatiotemporal chaos
-
Ren H., Wang Y., Xie Q., Yang H. A novel method for one-way hash function construction based on spatiotemporal chaos. Chaos Solitons Fract 2009, 42(4):2014-2022.
-
(2009)
Chaos Solitons Fract
, vol.42
, Issue.4
, pp. 2014-2022
-
-
Ren, H.1
Wang, Y.2
Xie, Q.3
Yang, H.4
-
23
-
-
67650071037
-
Hash function based on piecewise nonlinear chaotic map
-
Akhavan A., Samsudin A., Akhshani A. Hash function based on piecewise nonlinear chaotic map. Chaos Solitons Fract 2009, 42(2):1046-1053.
-
(2009)
Chaos Solitons Fract
, vol.42
, Issue.2
, pp. 1046-1053
-
-
Akhavan, A.1
Samsudin, A.2
Akhshani, A.3
-
24
-
-
67349196408
-
A novel combined cryptographic and hash algorithm based on chaotic control character
-
Deng S., Xiao D., Li Y., Peng W. A novel combined cryptographic and hash algorithm based on chaotic control character. Commun Nonlinear Sci Numer Simul 2009, 14:3889-3900.
-
(2009)
Commun Nonlinear Sci Numer Simul
, vol.14
, pp. 3889-3900
-
-
Deng, S.1
Xiao, D.2
Li, Y.3
Peng, W.4
-
25
-
-
71249163712
-
Improving the security of a parallel keyed hash function based on chaotic maps
-
Xiao D., Liao X., Wang Y. Improving the security of a parallel keyed hash function based on chaotic maps. Phys Lett A 2009, 373:4346-4353.
-
(2009)
Phys Lett A
, vol.373
, pp. 4346-4353
-
-
Xiao, D.1
Liao, X.2
Wang, Y.3
-
26
-
-
67650995839
-
Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps
-
Akhshani A., Behnia S., Akhavan A., Jafarizadeh M., Abu Hassan H., Hassan Z. Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps. Chaos Soliton Fract 2009, 42:2405-2412.
-
(2009)
Chaos Soliton Fract
, vol.42
, pp. 2405-2412
-
-
Akhshani, A.1
Behnia, S.2
Akhavan, A.3
Jafarizadeh, M.4
Abu Hassan, H.5
Hassan, Z.6
-
27
-
-
67649867159
-
Chaos-based hash function (CBHF) for cryptographic applications
-
Amin M., Faragallah O., El-Latif A. Chaos-based hash function (CBHF) for cryptographic applications. Chaos Soliton Fract 2009, 42:767-772.
-
(2009)
Chaos Soliton Fract
, vol.42
, pp. 767-772
-
-
Amin, M.1
Faragallah, O.2
El-Latif, A.3
-
28
-
-
70449124689
-
Analysis and improvement of a chaos-based hash function construction
-
Deng S., Li Y., Xiao D. Analysis and improvement of a chaos-based hash function construction. Commun Nonlinear Sci Numer Simul 2010, 15(5):1338-1347.
-
(2010)
Commun Nonlinear Sci Numer Simul
, vol.15
, Issue.5
, pp. 1338-1347
-
-
Deng, S.1
Li, Y.2
Xiao, D.3
-
29
-
-
77949485060
-
A chaos-based hash function with both modification detection and localization capabilities
-
Xiao D., Shih F., Liao X. A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simul 2010, 15(9):2254-2261.
-
(2010)
Commun Nonlinear Sci Numer Simul
, vol.15
, Issue.9
, pp. 2254-2261
-
-
Xiao, D.1
Shih, F.2
Liao, X.3
-
30
-
-
79951576549
-
Parallel hash function construction based on coupled map lattices
-
Wang Y., Wong K., Xiao D. Parallel hash function construction based on coupled map lattices. Commun Nonlinear Sci Numer Simul 2011, 16(7):2810-2821.
-
(2011)
Commun Nonlinear Sci Numer Simul
, vol.16
, Issue.7
, pp. 2810-2821
-
-
Wang, Y.1
Wong, K.2
Xiao, D.3
-
31
-
-
79952538941
-
A more secure parallel keyed hash function based on chaotic neural network
-
Huang Z. A more secure parallel keyed hash function based on chaotic neural network. Commun Nonlinear Sci Numer Simul 2011, 16:3245-3256.
-
(2011)
Commun Nonlinear Sci Numer Simul
, vol.16
, pp. 3245-3256
-
-
Huang, Z.1
-
32
-
-
2442662577
-
Cryptanalysis of dynamic look-up table based chaotic cryptosystems
-
Alvarez G., Montoya F., Romera M., Pastor G. Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys Lett A 2004, 326:211-218.
-
(2004)
Phys Lett A
, vol.326
, pp. 211-218
-
-
Alvarez, G.1
Montoya, F.2
Romera, M.3
Pastor, G.4
-
33
-
-
34047273584
-
Study of chaos functions for their suitability in generating message authentication codes
-
Arumugam G., Lakshmi Praba V., Radhakrishana S. Study of chaos functions for their suitability in generating message authentication codes. Appl Soft Comput 2007, 7(3):1064-1071.
-
(2007)
Appl Soft Comput
, vol.7
, Issue.3
, pp. 1064-1071
-
-
Arumugam, G.1
Lakshmi Praba, V.2
Radhakrishana, S.3
-
34
-
-
68349095081
-
Cryptanalysis on a parallel keyed hash function based on chaotic maps
-
Guo W., Wang X., He D., Cao Y. Cryptanalysis on a parallel keyed hash function based on chaotic maps. Phys Lett A 2009, 373:2306-3201.
-
(2009)
Phys Lett A
, vol.373
, pp. 2306-3201
-
-
Guo, W.1
Wang, X.2
He, D.3
Cao, Y.4
-
35
-
-
74449091174
-
Collision analysis of one kind of chaos-based hash function
-
Xiao D., Peng W., Liao X., Xiang T. Collision analysis of one kind of chaos-based hash function. Phys Lett A 2010, 374:1228-1231.
-
(2010)
Phys Lett A
, vol.374
, pp. 1228-1231
-
-
Xiao, D.1
Peng, W.2
Liao, X.3
Xiang, T.4
-
36
-
-
80053127262
-
Security analysis of a one-way hash function based on spatiotemporal chaos
-
Wang S., Shan P. Security analysis of a one-way hash function based on spatiotemporal chaos. Chin Phys B 2011, 20:90504-90507.
-
(2011)
Chin Phys B
, vol.20
, pp. 90504-90507
-
-
Wang, S.1
Shan, P.2
-
37
-
-
80052361673
-
Collision analysis of a chaos-based hash function with both modification detection and localization capability
-
Wang S., Li D., Zhou H. Collision analysis of a chaos-based hash function with both modification detection and localization capability. Commun Nonlinear Sci Numer Simul 2012, 17(2):780-7844.
-
(2012)
Commun Nonlinear Sci Numer Simul
, vol.17
, Issue.2
, pp. 780-7844
-
-
Wang, S.1
Li, D.2
Zhou, H.3
-
38
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
Chen G., Mao Y., Chui C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fract 2004, 21:749-761.
-
(2004)
Chaos Solitons Fract
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.3
-
40
-
-
85196211273
-
-
NIST Special Publication 800-22 rev1, A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, 2008, online document.
-
NIST Special Publication 800-22 rev1, A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, 2008, online document. http://csrc.nist.gov/groups/ST/toolkit/rng/documentationsoftware.html.
-
-
-
-
41
-
-
84937461306
-
One way hash functions and DES
-
Springer-Verlag, Advances in cryptology-crypto proceedings 89
-
Merkle R. One way hash functions and DES. Lecture notes in computer science 1989, 435:428-446. Springer-Verlag.
-
(1989)
Lecture notes in computer science
, vol.435
, pp. 428-446
-
-
Merkle, R.1
-
42
-
-
84981199109
-
A design principle for hash functions
-
Springer-Verlag, Advances in cryptology-crypto 89 proceedings
-
Damgard I. A design principle for hash functions. Lecture notes in computer science 1989, 435:416-427. Springer-Verlag.
-
(1989)
Lecture notes in computer science
, vol.435
, pp. 416-427
-
-
Damgard, I.1
|