Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps, Nonlinear Dynamics, vol.78, issue.3, pp.2261-2276, 2014. ,
A new digital signature scheme based on chaotic maps, Nonlinear dynamics, vol.74, issue.4, pp.1003-1012, 2013. ,
180-2, vol.1, p.72, 2002. ,
standard: Permutation-based hash and extendable-output functions, FIPS PUB, vol.202, p.3 ,
A combined chaotic cryptographic and hashing scheme, Physics letters A, vol.307, issue.5, pp.292-298, 2003. ,
A chaos-based cryptographic hash function for message authentication, International Journal of Bifurcation and Chaos, vol.15, issue.12, pp.4043-4050, 2005. ,
One-way hash function construction based on the chaotic map with changeable-parameter, Chaos, Solitons & Fractals, vol.24, issue.1, pp.65-71, 2005. ,
Hash function based on chaotic tent maps, IEEE Transactions on Circuits and Systems II: Express Briefs, vol.52, issue.6, pp.354-357, 2005. ,
Study of chaos functions for their suitability in generating message authentication codes, Applied Soft Computing, vol.7, issue.3, pp.1064-1071, 2007. ,
One-way hash function construction based on 2d coupled map lattices, Information Sciences, vol.178, issue.5, pp.1391-1406, 2008. ,
Parallel hash function construction based on coupled map lattices, Communications in Nonlinear Science and Numerical Simulation, vol.16, issue.7, pp.2810-2821, 2011. ,
Chaos-based hash function (cbhf) for cryptographic applications, Chaos, Solitons & Fractals, vol.42, issue.2, pp.767-772, 2009. ,
Secure hash function based on chaotic tent map with changeable parameter, High Technol. Lett, vol.18, issue.1, pp.7-12, 2012. ,
A fast new cryptographic hash function based on integer tent mapping system, JCP, vol.7, issue.7, pp.1671-1680, 2012. ,
New hash function based on chaos theory (cha-1), International Journal of Computer Science and Network Security, vol.8, issue.2, pp.20-27, 2008. ,
One-way hash function construction based on iterating a chaotic map, Computational Intelligence and Security Workshops, pp.791-794, 2007. ,
Hash function based on piecewise nonlinear chaotic map, Chaos, Solitons & Fractals, vol.42, issue.2, pp.1046-1053, 2009. ,
One-way hash function construction based on conservative chaotic systems, Information Assurance and Security, 2009. IAS'09. Fifth International Conference on, vol.2, pp.402-405, 2009. ,
Chaotic keyed hash function based on feedforwardfeedback nonlinear digital filter, Physics Letters A, vol.362, issue.5, pp.439-448, 2007. ,
A combined hash and encryption scheme by chaotic neural network, Advances in Neural Networks-ISNN, pp.13-28, 2004. ,
Secure hash function based on neural network, Neurocomputing, vol.69, issue.16, pp.2346-2350, 2006. ,
Hash function based on chaotic neural networks, Circuits and Systems, 2006. ISCAS 2006. Proceedings. 2006 IEEE International Symposium on, p.4, 2006. ,
Hysteresis modeling based on the hysteretic chaotic neural network, Neural Computing and Applications, vol.17, issue.5-6, pp.579-583, 2008. ,
Parallel keyed hash function construction based on chaotic neural network, Neurocomputing, vol.72, issue.10, pp.2288-2296, 2009. ,
A novel combined cryptographic and hash algorithm based on chaotic control character, Communications in Nonlinear Science and Numerical Simulation, vol.14, issue.11, pp.3889-3900, 2009. ,
Analysis and improvement of a chaos-based hash function construction, Communications in Nonlinear Science and Numerical Simulation, vol.15, issue.5, pp.1338-1347, 2010. ,
One-way hash function construction based on chaotic map network, Chaos, Solitons & Fractals, vol.41, issue.5, pp.2566-2574, 2009. ,
Improving the security of a parallel keyed hash function based on chaotic maps, Physics Letters A, vol.373, issue.47, pp.4346-4353, 2009. ,
A novel hash algorithm construction based on chaotic neural network, Neural Computing and Applications, vol.20, issue.1, pp.133-141, 2011. ,
Parallel hash function construction based on chaotic maps with changeable parameters, Neural Computing and Applications, vol.20, issue.8, pp.1305-1312, 2011. ,
Improvement and performance analysis of a novel hash function based on chaotic neural network, Neural Computing and Applications, vol.22, issue.2, pp.391-402, 2013. ,
A method for designing hash function based on chaotic neural network, International Workshop on Cloud Computing and Information Security (CCIS), 2013. ,
A more secure parallel keyed hash function based on chaotic neural network, Communications in Nonlinear Science and Numerical Simulation, vol.16, issue.8, pp.3245-3256, 2011. ,
A topologically simple keyed hash function based on circular chaotic sinusoidal map network, Advanced Communication Technology (ICACT), 2013 15th International Conference on, pp.1089-1094, 2013. ,
Parallel chaotic hash function based on the shuffle-exchange network, Nonlinear Dynamics, vol.81, issue.3, pp.1067-1079, 2015. ,
Hash function based on efficient chaotic neural network, International Conference on Internet Technology and Secured Transactions, pp.32-37, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01250274
Secure hash algorithm based on efficient chaotic neural network, The 11th International Conference on Communications, p.2016, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01294385
A novel keyed parallel hashing scheme based on a new chaotic system, Chaos, Solitons & Fractals, vol.87, pp.216-225, 2016. ,
A novel parallel hash function based on 3d chaotic map, EURASIP Journal on Advances in Signal Processing, vol.2013, issue.1, p.126, 2013. ,
A dynamic chaotic hash function based upon circle chord methods, Sixth International Symposium on, pp.1044-1049, 2012. ,
A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2, Nonlinear Dynamics, vol.83, issue.3, pp.1123-1136, 2016. ,
Parallel keyed hash function construction based on chaotic maps, Physics Letters A, vol.372, issue.26, pp.4682-4688, 2008. ,
Generator of chaotic sequences and corresponding generating system, US Patent, vol.8, p.116, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00801831
Chaos based information hiding and security, Internet Technology And Secured Transactions, 2012 International Conference for, pp.67-72, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00755331
Cryptography and Network Security: Principles and Practice, International Edition: Principles and Practice, 2014. ,
Handbook of applied cryptography, 1996. ,
Local and global structure preserving hashing for fast digital fingerprint tracing, Multimedia Tools and Applications, vol.74, issue.18, pp.8003-8023, 2015. ,
Polyline curvatures based robust vector data hashing, Multimedia tools and applications, vol.73, pp.1913-1942, 2014. ,
File similarity evaluation scheme for multimedia data using partial hash information, Multimedia Tools and Applications, vol.76, issue.19, pp.19649-19663, 2017. ,
Keying hash functions for message authentication, Annual International Cryptology Conference, pp.1-15, 1996. ,
Modern hash function construction ,
Secrecy, authentication, and public key systems, 1979. ,
A design principle for hash functions, Conference on the Theory and Application of Cryptology, pp.416-427, 1989. ,
Design principles for iterated hash functions, IACR Cryptology ePrint Archive, p.253, 2004. ,
, Speeding up the wide-pipe: Secure and fast hashing.," in Indocrypt, vol.6498, pp.144-162, 2010.
A framework for iterative hash functions: Haifa, 2nd NIST Cryptographich Hash Workshop, vol.22, 2006. ,
Sponge functions, ECRYPT hash workshop, 2007. ,
The md5 message-digest algorithm, 1992. ,
Secure hash standard, Public Law, vol.100, p.235, 1995. ,
Generating strong one-way functions with cryptographic algorithm, IBM Technical Disclosure Bulletin, vol.27, pp.5658-5959, 1985. ,
Building hash functions from block ciphers, their security and implementation properties, 2009. ,
Data authentication using modification detection codes based on a public one way encryption function, p.861, 131990-03. ,
New 128-bit hash function, Proc. 4th International Joint Workshop on Computer Communications, pp.279-288, 1989. ,
Hash functions based on block ciphers: A synthetic approach, Crypto, vol.93, pp.368-378, 1993. ,
Confirmation that some hash functions are not collision free, Workshop on the Theory and Application of of Cryptographic Techniques, pp.326-343, 1990. ,
Collision-free hashfunctions based on blockcipher algorithms, Security Technology, 1989. Proceedings. 1989 International Carnahan Conference on, pp.203-210, 1989. ,
Efficient multicore implementation of an advanced generator of discrete chaotic sequences, Internet Technology and Secured Transactions (ICITST), pp.31-36, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01094677
Analysis and design of cryptographic hash functions, 1993. ,
Cryptography and computer privacy, Scienfitic American, vol.228, pp.15-23, 1973. ,
Hash functions: Theory, attacks, and applications, 2005. ,
Preimage attacks on one-block md4, 63-step md5 and more, International Workshop on Selected Areas in Cryptography, pp.103-119, 2008. ,
Birthday paradox, coupon collectors, caching algorithms and self-organizing search, Discrete Applied Mathematics, vol.39, issue.3, pp.207-229, 1992. ,
URL : https://hal.archives-ouvertes.fr/inria-00075832
How to swindle rabin, Cryptologia, vol.3, issue.3, pp.187-191, 1979. ,
Cryptographic hash functions: A survey, 1995. ,
On the security of two mac algorithms, Advances in CryptologyEUROCRYPT96, pp.19-32, 1996. ,
, Hash length extension attacks -java code geeks -2017
, Md5 length extension attack revisited -v's inner peace
, Stop using unsafe keyed hashes, use hmac -rdist
Improved meet-in-themiddle cryptanalysis of ktantan (poster), Australasian Conference on Information Security and Privacy, pp.433-438, 2011. ,
Meet-in-the-middle preimage attacks against reduced sha-0 and sha-1, Advances in Cryptology-CRYPTO 2009, pp.70-89, 2009. ,
Finding preimages in full md5 faster than exhaustive search, EUROCRYPT, vol.5479, pp.134-152, 2009. ,
Preimages for step-reduced sha-2, ASIACRYPT, vol.5912, pp.578-597, 2009. ,
Advanced meet-in-the-middle preimage attacks: first results on full tiger, and improved results on md4 and sha-2, ASIACRYPT, vol.6477, pp.56-75, 2010. ,
, , vol.5984, pp.332-348, 2009.
Preimage attacks on 3, 4, and 5-pass haval, International Conference on the Theory and Application of Cryptology and Information Security, pp.253-271, 2008. ,
Multicollisions in iterated hash functions. application to cascaded constructions, Annual International Cryptology Conference, pp.306-316, 2004. ,
Second preimages on n-bit hash functions for much less than 2 n work, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.474-490, 2005. ,
Herding hash functions and the nostradamus attack, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.183-200, 2006. ,
One-way hash function construction based on the spatiotemporal chaotic system, Chinese Physics B, vol.21, issue.6, p.60503, 2012. ,
A chaos-based hash function with both modification detection and localization capabilities, Communications in Nonlinear Science and Numerical Simulation, vol.15, issue.9, pp.2254-2261, 2010. ,
Parallel chaotic hash function construction based on cellular neural network, Neural Computing and Applications, vol.21, issue.7, pp.1563-1573, 2012. ,
Keyed hash function based on a dynamic lookup table of functions, Information Sciences, vol.214, pp.56-75, 2012. ,
A novel method for one-way hash function construction based on spatiotemporal chaos, Chaos, Solitons & Fractals, vol.42, issue.4, pp.2014-2022, 2009. ,
Keyed one-way hash function construction based on the chaotic dynamic s-box, 2006. ,
One-way hash function construction based on chaotic coupled map network, Chaos-Fractals Theories and Applications (IWCFTA), pp.193-197, 2011. ,
One way hash function construction based on spatiotemporal chaos, 2005. ,