One-way hash function construction based on chaotic map network
Author
Abstract
Suggested Citation
DOI: 10.1016/j.chaos.2008.09.056
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Khan, Muhammad Khurram & Zhang, Jiashu & Wang, Xiaomin, 2008. "Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices," Chaos, Solitons & Fractals, Elsevier, vol. 35(3), pages 519-524.
- Nien, H.H. & Huang, C.K. & Changchien, S.K. & Shieh, H.W. & Chen, C.T. & Tuan, Y.Y., 2007. "Digital color image encoding and decoding using a novel chaotic random generator," Chaos, Solitons & Fractals, Elsevier, vol. 32(3), pages 1070-1080.
- Xiao, Di & Liao, Xiaofeng & Deng, Shaojiang, 2005. "One-way Hash function construction based on the chaotic map with changeable-parameter," Chaos, Solitons & Fractals, Elsevier, vol. 24(1), pages 65-71.
- Behnia, S. & Akhshani, A. & Akhavan, A. & Mahmodi, H., 2009. "Applications of tripled chaotic maps in cryptography," Chaos, Solitons & Fractals, Elsevier, vol. 40(1), pages 505-519.
- Zhou, Qing & Wong, Kwok-wo & Liao, Xiaofeng & Xiang, Tao & Hu, Yue, 2008. "Parallel image encryption algorithm based on discretized chaotic map," Chaos, Solitons & Fractals, Elsevier, vol. 38(4), pages 1081-1092.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Akhshani, A. & Behnia, S. & Akhavan, A. & Jafarizadeh, M.A. & Abu Hassan, H. & Hassan, Z., 2009. "Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 42(4), pages 2405-2412.
- Rasool, Masrat & Belhaouari, Samir Brahim, 2023. "From Collatz Conjecture to chaos and hash function," Chaos, Solitons & Fractals, Elsevier, vol. 176(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Akhshani, A. & Behnia, S. & Akhavan, A. & Jafarizadeh, M.A. & Abu Hassan, H. & Hassan, Z., 2009. "Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 42(4), pages 2405-2412.
- Amin, Mohamed & Faragallah, Osama S. & Abd El-Latif, Ahmed A., 2009. "Chaos-based hash function (CBHF) for cryptographic applications," Chaos, Solitons & Fractals, Elsevier, vol. 42(2), pages 767-772.
- Zhao, Liang & Liao, Xiaofeng & Xiao, Di & Xiang, Tao & Zhou, Qing & Duan, Shukai, 2009. "True random number generation from mobile telephone photo based on chaotic cryptography," Chaos, Solitons & Fractals, Elsevier, vol. 42(3), pages 1692-1699.
- Ren, Haijun & Wang, Yong & Xie, Qing & Yang, Huaqian, 2009. "A novel method for one-way hash function construction based on spatiotemporal chaos," Chaos, Solitons & Fractals, Elsevier, vol. 42(4), pages 2014-2022.
- Akhavan, A. & Samsudin, A. & Akhshani, A., 2009. "Hash function based on piecewise nonlinear chaotic map," Chaos, Solitons & Fractals, Elsevier, vol. 42(2), pages 1046-1053.
- Asgari Chenaghlu, Meysam & Jamali, Shahram & Nikzad Khasmakhi, Narjes, 2016. "A novel keyed parallel hashing scheme based on a new chaotic system," Chaos, Solitons & Fractals, Elsevier, vol. 87(C), pages 216-225.
- Mazloom, Sahar & Eftekhari-Moghadam, Amir Masud, 2009. "Color image encryption based on Coupled Nonlinear Chaotic Map," Chaos, Solitons & Fractals, Elsevier, vol. 42(3), pages 1745-1754.
- Mohamed Amine Ferrag & Leandros Maglaras & Abdelouahid Derhab & Helge Janicke, 2020. "Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 73(2), pages 317-348, February.
- Khan, Muhammad Khurram & Zhang, Jiashu & Wang, Xiaomin, 2008. "Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices," Chaos, Solitons & Fractals, Elsevier, vol. 35(3), pages 519-524.
- Wong, Kwok-Wo & Kwok, Bernie Sin-Hung & Yuen, Ching-Hung, 2009. "An efficient diffusion approach for chaos-based image encryption," Chaos, Solitons & Fractals, Elsevier, vol. 41(5), pages 2652-2663.
- Arshad, Usman & Khan, Majid & Shaukat, Sajjad & Amin, Muhammad & Shah, Tariq, 2020. "An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 546(C).
- Zhou, Shuang & Wang, Xingyuan & Wang, Mingxu & Zhang, Yingqian, 2020. "Simple colour image cryptosystem with very high level of security," Chaos, Solitons & Fractals, Elsevier, vol. 141(C).
- Rasool, Masrat & Belhaouari, Samir Brahim, 2023. "From Collatz Conjecture to chaos and hash function," Chaos, Solitons & Fractals, Elsevier, vol. 176(C).
- Han, Song, 2008. "Security of a key agreement protocol based on chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 38(3), pages 764-768.
- Tutueva, Aleksandra V. & Karimov, Artur I. & Moysis, Lazaros & Volos, Christos & Butusov, Denis N., 2020. "Construction of one-way hash functions with increased key space using adaptive chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 141(C).
- Hu, Yue & Liao, Xiaofeng & Wong, Kwok-wo & Zhou, Qing, 2009. "A true random number generator based on mouse movement and chaotic cryptography," Chaos, Solitons & Fractals, Elsevier, vol. 40(5), pages 2286-2293.
- Wang, Yu & Chen, Liquan & Wang, Xingyuan & Wu, Ge & Yu, Kunliang & Lu, Tianyu, 2021. "The design of keyed hash function based on CNN-MD structure," Chaos, Solitons & Fractals, Elsevier, vol. 152(C).
- Shi, Fan-feng & Li, Tao & Hu, Hao-yu & Li, Yi-fei & Shan, Dan & Jiang, Dong, 2024. "Heterogeneous parallel computing based real-time chaotic video encryption and its application to drone-oriented secure communication," Chaos, Solitons & Fractals, Elsevier, vol. 181(C).
- Xiang, Tao & Wong, Kwok-Wo & Liao, Xiaofeng, 2009. "On the security of a novel key agreement protocol based on chaotic maps," Chaos, Solitons & Fractals, Elsevier, vol. 40(2), pages 672-675.
- Xiao, Di & Liao, Xiaofeng & Wei, Pengcheng, 2009. "Analysis and improvement of a chaos-based image encryption algorithm," Chaos, Solitons & Fractals, Elsevier, vol. 40(5), pages 2191-2199.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:chsofr:v:41:y:2009:i:5:p:2566-2574. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Thayer, Thomas R. (email available below). General contact details of provider: https://www.journals.elsevier.com/chaos-solitons-and-fractals .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.