2018
DOI: 10.1007/s10586-018-2870-z
|View full text |Cite
|
Sign up to set email alerts
|

A chaos-based keyed hash function based on fixed point representation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 45 publications
(22 citation statements)
references
References 26 publications
0
22
0
Order By: Relevance
“…e following statistics are used to test the performance of the hash algorithm. Here, len is the length of the hash value, N is the number of tests, B i denotes the number of different bits between the hash values obtained in the i-th test, B min denotes the minimum number of different bits, B max denotes the maximum number of different bits, B denotes the mean changed bit number, P denotes the mean changed probability, ΔB denotes the standard deviation of numbers of changed bits, and ΔP denotes the standard deviation [13].…”
Section: Statistical Analysis Of Confusion and Diffusionmentioning
confidence: 99%
See 1 more Smart Citation
“…e following statistics are used to test the performance of the hash algorithm. Here, len is the length of the hash value, N is the number of tests, B i denotes the number of different bits between the hash values obtained in the i-th test, B min denotes the minimum number of different bits, B max denotes the maximum number of different bits, B denotes the mean changed bit number, P denotes the mean changed probability, ΔB denotes the standard deviation of numbers of changed bits, and ΔP denotes the standard deviation [13].…”
Section: Statistical Analysis Of Confusion and Diffusionmentioning
confidence: 99%
“…Liu et al [12] proposed a keyed hash function using a hyperchaotic system with time-varying parameter perturbation, which is flexible and has a larger key space. Teh et al [13] designed a keyed hash function based on the logistic map with fixed point representation. Li et al designed four 128-bit parallel hash functions based on cross-coupled map lattices [14], tent map [15], circular shifts [16], and dynamic S-box [17] with varying parameters.…”
Section: Introductionmentioning
confidence: 99%
“…The partial breaking of families of SHA2 and SHA3 proves the structural flaw was not due to RO and Sponge design principles [17]. JS Teh et al proposed chaotic hash function based on fixed point representation [18]. JS Teh work outperformed the other fixed point chaotic hash functions.…”
Section: Related Workmentioning
confidence: 99%
“…Akhavan et al have proposed a chaotic hash function based on piecewise nonlinear chaotic map and a 1D chaotic map in parallel mode [24] whereas Teh et al have proposed a keyed hash function based on logistic map realized with fixed point representation [30]. Li et al have proposed a new chaotic hash function based on circular shifts and variable parameters, piecewise linear chaotic map and one-way coupled map lattice [31].…”
Section: Introductionmentioning
confidence: 99%