Chaotic hash functions are a prospective branch of modern cryptography. Being compared with traditional hashing algorithms, an approach based on deterministic chaos allows …
JS Teh, M Alawida, JJ Ho - Nonlinear Dynamics, 2020 - Springer
Chaotic maps have various properties that mirror the security requirements of cryptographic algorithms. As such, researchers have utilized them in the design of algorithms such as hash …
Y Li, G Ge - Multimedia Tools and Applications, 2019 - Springer
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash values), which can be used in a wide range of multimedia applications for communication …
In this paper, we propose, implement, and analyze the structures of two keyed hash functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …
M Ahmad, S Khurana, S Singh, HD AlSharari - 3D Research, 2017 - Springer
The chaotic maps posses high parameter sensitivity, random-like behavior and one-way computations, which favor the construction of cryptographic hash functions. In this paper, we …
X Wang, L Teng - Nonlinear Dynamics, 2012 - Springer
In this paper, the CML-based spatiotemporal chaos system is used for image blocks encryption, which gets higher security. The basic idea is to divide the image into blocks, and …
A Kanso, M Ghebleh - … in nonlinear science and numerical simulation, 2013 - Elsevier
This paper proposes a new chaotic keyed hash function based on a single 4-dimensional chaotic cat map whose irregular outputs are used to compute a hash value. The suggested …
Y Li, G Ge, D Xia - Nonlinear Dynamics, 2016 - Springer
We present a chaotic hash function based on the dynamic S-Box with variable parameters in this paper. More specifically, we first exploit the piecewise linear chaotic map to obtain four …
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main aim of this paper is how to increase the security level of the blockchain based on the …