Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map

P Ayubi, S Setayeshi, AM Rahmani - Chaos, Solitons & Fractals, 2023 - Elsevier
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …

Construction of one-way hash functions with increased key space using adaptive chaotic maps

AV Tutueva, AI Karimov, L Moysis, C Volos… - Chaos, Solitons & …, 2020 - Elsevier
Chaotic hash functions are a prospective branch of modern cryptography. Being compared
with traditional hashing algorithms, an approach based on deterministic chaos allows …

Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic

JS Teh, M Alawida, JJ Ho - Nonlinear Dynamics, 2020 - Springer
Chaotic maps have various properties that mirror the security requirements of cryptographic
algorithms. As such, researchers have utilized them in the design of algorithms such as hash …

Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security

Y Li, G Ge - Multimedia Tools and Applications, 2019 - Springer
Cryptographic hash functions can map data of arbitrary size to data of fixed size (hash
values), which can be used in a wide range of multimedia applications for communication …

Designing two secure keyed hash functions based on sponge construction and the chaotic neural network

N Abdoun, S El Assad, T Manh Hoang, O Deforges… - Entropy, 2020 - mdpi.com
In this paper, we propose, implement, and analyze the structures of two keyed hash
functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …

A simple secure hash function scheme using multiple chaotic maps

M Ahmad, S Khurana, S Singh, HD AlSharari - 3D Research, 2017 - Springer
The chaotic maps posses high parameter sensitivity, random-like behavior and one-way
computations, which favor the construction of cryptographic hash functions. In this paper, we …

An image blocks encryption algorithm based on spatiotemporal chaos

X Wang, L Teng - Nonlinear Dynamics, 2012 - Springer
In this paper, the CML-based spatiotemporal chaos system is used for image blocks
encryption, which gets higher security. The basic idea is to divide the image into blocks, and …

A fast and efficient chaos-based keyed hash function

A Kanso, M Ghebleh - … in nonlinear science and numerical simulation, 2013 - Elsevier
This paper proposes a new chaotic keyed hash function based on a single 4-dimensional
chaotic cat map whose irregular outputs are used to compute a hash value. The suggested …

Chaotic hash function based on the dynamic S-Box with variable parameters

Y Li, G Ge, D Xia - Nonlinear Dynamics, 2016 - Springer
We present a chaotic hash function based on the dynamic S-Box with variable parameters in
this paper. More specifically, we first exploit the piecewise linear chaotic map to obtain four …

Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences

SMS Eldin, AAA El-Latif, SA Chelloug, M Ahmad… - IEEE …, 2023 - ieeexplore.ieee.org
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main
aim of this paper is how to increase the security level of the blockchain based on the …