Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map

P Ayubi, S Setayeshi, AM Rahmani - Chaos, Solitons & Fractals, 2023 - Elsevier
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …

A novel hash function based on a chaotic sponge and DNA sequence

M Alawida, A Samsudin, N Alajarmeh, JS Teh… - IEEE …, 2021 - ieeexplore.ieee.org
Many chaos-based hash functions have convoluted designs that are not based on proper
design principles, complicating the verification of security claims. We address this problem …

[HTML][HTML] From Collatz Conjecture to chaos and hash function

M Rasool, SB Belhaouari - Chaos, Solitons & Fractals, 2023 - Elsevier
The non-linear property of Chaos is a promising approach to information security, and many
accomplishments have been made by combining Chaos with several sub-security domains …

From chaos to pseudorandomness: a case study on the 2-D coupled map lattice

Y Wang, Z Liu, LY Zhang, F Pareschi… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Applying the chaos theory for secure digital communications is promising and it is well
acknowledged that in such applications the underlying chaotic systems should be carefully …

Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic

JS Teh, M Alawida, JJ Ho - Nonlinear Dynamics, 2020 - Springer
Chaotic maps have various properties that mirror the security requirements of cryptographic
algorithms. As such, researchers have utilized them in the design of algorithms such as hash …

Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security

Y Li, G Ge - Multimedia Tools and Applications, 2019 - Springer
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash
values), which can be used in a wide range of multimedia applications for communication …

[HTML][HTML] Designing two secure keyed hash functions based on sponge construction and the chaotic neural network

N Abdoun, S El Assad, T Manh Hoang, O Deforges… - Entropy, 2020 - mdpi.com
In this paper, we propose, implement, and analyze the structures of two keyed hash
functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …

A simple secure hash function scheme using multiple chaotic maps

M Ahmad, S Khurana, S Singh, HD AlSharari - 3D Research, 2017 - Springer
The chaotic maps posses high parameter sensitivity, random-like behavior and one-way
computations, which favor the construction of cryptographic hash functions. In this paper, we …

A fast and efficient chaos-based keyed hash function

A Kanso, M Ghebleh - … in nonlinear science and numerical simulation, 2013 - Elsevier
This paper proposes a new chaotic keyed hash function based on a single 4-dimensional
chaotic cat map whose irregular outputs are used to compute a hash value. The suggested …

A new hash function based on chaotic maps and deterministic finite state automata

M Alawida, JS Teh, DP Oyinloye, M Ahmad… - IEEE …, 2020 - ieeexplore.ieee.org
In this paper, a new chaos-based hash function is proposed based on a recently proposed
structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various …