2020
DOI: 10.1016/j.chaos.2020.110344
|View full text |Cite
|
Sign up to set email alerts
|

Construction of one-way hash functions with increased key space using adaptive chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 35 publications
0
20
0
Order By: Relevance
“…Since the precision is set to 10 14 in our experiment, the key space is approximately 2 622 . Hence our proposed approach offers larger key space than schemes reported in [29,30]. A bigger space repels all key-based attacks.…”
Section: Key Space Analysismentioning
confidence: 89%
See 1 more Smart Citation
“…Since the precision is set to 10 14 in our experiment, the key space is approximately 2 622 . Hence our proposed approach offers larger key space than schemes reported in [29,30]. A bigger space repels all key-based attacks.…”
Section: Key Space Analysismentioning
confidence: 89%
“…This scheme achieved larger key space. Tutueva [30] et al again utilized adaptive chatic maps to create hash function. This novel approach effectively counters birthday attack.…”
Section: Related Workmentioning
confidence: 99%
“…C) Reconfigurable structure Feeder reconfiguration is considered as a precious tool in the interconnected microgrids for changing the power flow and enhancing the objective functions. Nevertheless, it is always preferred to keep the radial structure of the system and get benefits of the radial protection and thus the simple coordination of the protection relays as in (27)- (33). The total number of loops is calculated at any time in the grid by (27).…”
Section: B) Operation Constraintsmentioning
confidence: 99%
“…Therefore, the critical feature of the blockchain is that it does not need any central unit for the control of the data, a feature that enhances the deep information security. Moreover, a cryptography approach based on hash function is deployed in this method to avoid data access by unauthorized parties in the case of hacking penetration [33]. In a hash system, the input data with a random length is converted into an output bit string with a fixed length.…”
Section: Secured Framework Based On Blockchainmentioning
confidence: 99%
“…Recently, digital chaos has been used in hash function constructions due to many similarities between the requirements of hash functions and the properties of chaotic maps. Various chaotic maps adopted in hash function algorithms include simple 1D chaotic maps [51]- [53], 2D nonlinear piecewise linear chaotic maps [54], MD chaotic maps [55]- [57], coupled map lattice [58], hyperchaos [15]. Chaotic neural networks [59] and chaos-based S-Boxes [60] have also been used in hash function designs.…”
Section: Introductionmentioning
confidence: 99%