[1] |
LIN Z , GUYEUX C , YU S ,et al. On the use of chaotic iterations to design keyed hash function[J]. Cluster Computing, 2019,22(1).
|
[2] |
ISLAM S H . Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps[J]. Nonlinear Dynamics, 2014,78(3).
|
[3] |
CHAIN K , KUO W . A new digital signature scheme based on chaotic maps[J]. Nonlinear dynamics, 2013,74(4): 1003-1012.
|
[4] |
DATCU O , MACOVEI C , HOBINCU R . Chaos based cryptographic pseudo-random number generator template with dynamic state change[J]. Applied Sciences. 2020,10(2).
|
[5] |
WANG M , WANG X , ZHAO T ,et al. Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme[J]. Information Sciences, 2021,544: 1-24.
|
[6] |
WANG Y , LIAO X , XIAO D ,et al. One-way hash function construction based on 2D coupled map lattices[J]. Information Sciences. 2008,178(5): 1391-1406.
|
[7] |
WANG X , YU H . How to break MD5 and other hash functions[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2005. 19-35.
|
[8] |
WANG X , YIN Y L , YU H . Finding collisions in the full SHA-1[C]// Annual International Cryptology Conference. 2005. 17-36.
|
[9] |
GILBERT H , HANDSCHUH H . Security analysis of SHA-256 and sisters[C]// International Workshop on Selected Areas in Cryptography. 2003. 175-193.
|
[10] |
HAWKES P , PADDON M , ROSE G G . On corrective patterns for the SHA-2 family[J]. IACR Cryptol.ePrint Arch.2004, 2004:207.
|
[11] |
TUTUEVA A V , KARIMOV A I , MOYSIS L ,et al. Construction of one-way hash functions with increased key space using adaptive chaotic maps[J]. Chaos,Solitons & Fractals, 2020,141:110344.
|
[12] |
LI Y , XIAO D , DENG S ,et al. Parallel Hash function construction based on chaotic maps with changeable parameters[J]. Neural Computing and Applications. 2011,20(8): 1305-1312.
|
[13] |
HE B , LEI P , PU Q ,et al. A method for designing hash function based on chaotic neural network[C]// International Workshop on Cloud Computing and Information Security (CCIS). 2013.
|
[14] |
ROSENBLATT F . The perceptron:a probabilistic model for information storage and organization in the brain[J]. Psychological Review. 1958,65(6): 386.
|
[15] |
LORENZ E N . Deterministic nonperiodic flow[J]. Journal of Atmospheric Sciences, 1963,20(2): 130-141.
|
[16] |
HILBORN R C . Chaos and nonlinear dynamics:an introduction for scientists and engineers[M]. Oxford University Press on Demand, 2000.
|
[17] |
DACHSELT F , SCHWARZ W . Chaos and cryptography[J]. IEEE Transactions on Circuits and Systems I:Fundamental Theory and Applications. 2001,48(12): 1498-1509.
|
[18] |
TEH J S , SAMSUDIN A , AKHAVAN A . Parallel chaotic hash function based on the shuffle-exchange network[J]. Nonlinear Dynamics. 2015,81(3): 1067-1079.
|
[19] |
XIAO D , LIAO X . A combined hash and encryption scheme by chaotic neural network[C]// International Symposium on Neural Networks. Springer, 2004. 633-638.
|
[20] |
LIAN S , SUN J , WANG Z . Secure hash function based on neural network[J]. Neurocomputing, 2006,69(16-18): 2346-2350.
|
[21] |
LIAN S , LIU Z , REN Z ,et al. Hash function based on chaotic neural networks[C]// 2006 IEEE International Symposium on Circuits and Systems. 2006.4.
|
[22] |
YANG H , WONG K , LIAO X ,et al. One-way hash function construction based on chaotic map network[J]. Chaos,Solitons &Fractals. 2009,41(5): 2566-2574.
|
[23] |
HUANG Z . A more secure parallel keyed hash function based on chaotic neural network[J]. Communications in Nonlinear Science and Numerical Simulation. 2011,16(8): 3245-3256.
|
[24] |
ABDOUN N . Design,implementation and analysis of keyed hash functions based on chaotic maps and neural networks[R]. 2019.
|
[25] |
KANEKO K . Pattern dynamics in spatiotemporal chaos:Pattern selection,diffusion of defect and pattern competition intermittency[J]. Physica D:Nonlinear Phenomena. 1989,34(1-2): 1-41.
|
[26] |
CORON J , DODIS Y , MALINAUD C ,et al. Merkle-damg?rd revisited:how to construct a hash function[C]// Annual International Cryptology Conference. 2005. 430-448.
|
[27] |
MERKLE R C . Secrecy,authentication,and public key systems[R]. Stanford University, 1979.
|
[28] |
SHANNON C E . Communication theory of secrecy systems[J]. The Bell System Technical Journal. 1949,28(4): 656-715.
|
[29] |
FEISTEL H . Cryptography and computer privacy[J]. Scientific American. 1973,228(5): 15-23.
|
[30] |
LI Y , GE G , XIA D . Chaotic hash function based on the dynamic S-box with variable parameters[J]. Nonlinear Dynamics. 2016,84(4): 2387-2402.
|
[31] |
XIAO D , LIAO X , DENG S . One-way hash function construction based on the chaotic map with changeable-parameter[J]. Chaos,Solitons & Fractals. 2005,24(1): 65-71.
|
[32] |
TEH J S , ALAWIDA M , HO J J . Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic[J]. Nonlinear Dynamics. 2020,100(1): 713-729.
|
[33] |
TEH J S , TAN K , ALAWIDA M . A chaos-based keyed hash function based on fixed point representation[J]. Cluster Computing. 2019,22(2): 649-660.
|
[34] |
XIAO D , LIAO X , DENG S . Parallel keyed hash function construction based on chaotic maps[J]. Physics Letters A. 2008,372(26): 4682-4688.
|
[35] |
HUANG W , WANG L . A hash function based on sponge structure with chaotic map for spinal codes[C]// 2019 International Conference on Computer,Information and Telecommunication Systems (CITS). IEEE, 2019. 1-5.
|
[36] |
ABDOUN N , EL ASSAD S , DEFORGES O ,et al. Design and security analysis of two robust keyed hash functions based on chaotic neural networks[J]. Journal of Ambient Intelligence and Humanized Computing, 2020,11(5): 2137-2161.
|
[37] |
ALAWIDA M , SAMSUDIN A , ALAJARMEH N ,et al. A novel hash function based on a chaotic sponge and DNA sequence[J]. IEEE Access, 2021,9: 17882-17897.
|
[38] |
ABDOUN N , EL ASSAD S , MANH HOANG T ,et al. Designing two secure keyed hash functions based on sponge construction and the chaotic neural network[J]. Entropy, 2020,22(9): 1012.
|
[39] |
JOUX A . Multicollisions in iterated hash functions.Application to cascaded constructions[C]// Annual International Cryptology Conference. 2004: 306-316.
|
[40] |
LUO Y L , DU M H . One-way hash function construction based on the spatiotemporal chaotic system[J]. Chinese Physics B. 2012,21(6): 60503.
|
[41] |
LIU H , KADIR A , LIU J . Keyed hash function using hyper chaotic system with time-varying parameters perturbation[J]. IEEE Access. 2019,7: 37211-37219.
|
[42] |
AHMAD M , KHURANA S , SINGH S ,et al. A simple secure hash function scheme using multiple chaotic maps[J]. 3D Research. 2017,8(2): 13.
|