S. H. Islam, Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps, Nonlinear Dynamics, vol.78, issue.3, pp.2261-2276, 2014.

K. Chain and W. Kuo, A new digital signature scheme based on chaotic maps, Nonlinear dynamics, vol.74, issue.4, pp.1003-1012, 2013.

S. H. Standard and P. Fips, 180-2, vol.1, p.72, 2002.

N. Sha, standard: Permutation-based hash and extendable-output functions, FIPS PUB, vol.202, p.3

K. Wong, A combined chaotic cryptographic and hashing scheme, Physics letters A, vol.307, issue.5, pp.292-298, 2003.

H. S. Kwok and W. K. Tang, A chaos-based cryptographic hash function for message authentication, International Journal of Bifurcation and Chaos, vol.15, issue.12, pp.4043-4050, 2005.

D. Xiao, X. Liao, and S. Deng, One-way hash function construction based on the chaotic map with changeable-parameter, Chaos, Solitons & Fractals, vol.24, issue.1, pp.65-71, 2005.

X. Yi, Hash function based on chaotic tent maps, IEEE Transactions on Circuits and Systems II: Express Briefs, vol.52, issue.6, pp.354-357, 2005.

G. Arumugam, V. L. Praba, and S. Radhakrishnan, Study of chaos functions for their suitability in generating message authentication codes, Applied Soft Computing, vol.7, issue.3, pp.1064-1071, 2007.

Y. Wang, X. Liao, D. Xiao, and K. Wong, One-way hash function construction based on 2d coupled map lattices, Information Sciences, vol.178, issue.5, pp.1391-1406, 2008.

Y. Wang, K. Wong, and D. Xiao, Parallel hash function construction based on coupled map lattices, Communications in Nonlinear Science and Numerical Simulation, vol.16, issue.7, pp.2810-2821, 2011.

M. Amin, O. S. Faragallah, and A. A. El-latif, Chaos-based hash function (cbhf) for cryptographic applications, Chaos, Solitons & Fractals, vol.42, issue.2, pp.767-772, 2009.

Y. Li, D. Xiao, and S. Deng, Secure hash function based on chaotic tent map with changeable parameter, High Technol. Lett, vol.18, issue.1, pp.7-12, 2012.

J. Liu, X. Wang, K. Yang, and C. Zhao, A fast new cryptographic hash function based on integer tent mapping system, JCP, vol.7, issue.7, pp.1671-1680, 2012.

M. Maqableh, A. B. Samsudin, and M. A. Alia, New hash function based on chaos theory (cha-1), International Journal of Computer Science and Network Security, vol.8, issue.2, pp.20-27, 2008.

Y. Wang, M. Du, D. Yang, and H. Yang, One-way hash function construction based on iterating a chaotic map, Computational Intelligence and Security Workshops, pp.791-794, 2007.

A. Akhavan, A. Samsudin, and A. Akhshani, Hash function based on piecewise nonlinear chaotic map, Chaos, Solitons & Fractals, vol.42, issue.2, pp.1046-1053, 2009.

Q. Zhang, H. Zhang, and Z. Li, One-way hash function construction based on conservative chaotic systems, Information Assurance and Security, 2009. IAS'09. Fifth International Conference on, vol.2, pp.402-405, 2009.

J. Zhang, X. Wang, and W. Zhang, Chaotic keyed hash function based on feedforwardfeedback nonlinear digital filter, Physics Letters A, vol.362, issue.5, pp.439-448, 2007.

D. Xiao and X. Liao, A combined hash and encryption scheme by chaotic neural network, Advances in Neural Networks-ISNN, pp.13-28, 2004.

S. Lian, J. Sun, and Z. Wang, Secure hash function based on neural network, Neurocomputing, vol.69, issue.16, pp.2346-2350, 2006.

S. Lian, Z. Liu, Z. Ren, and H. Wang, Hash function based on chaotic neural networks, Circuits and Systems, 2006. ISCAS 2006. Proceedings. 2006 IEEE International Symposium on, p.4, 2006.

X. Liu and C. Xiu, Hysteresis modeling based on the hysteretic chaotic neural network, Neural Computing and Applications, vol.17, issue.5-6, pp.579-583, 2008.

D. Xiao, X. Liao, and Y. Wang, Parallel keyed hash function construction based on chaotic neural network, Neurocomputing, vol.72, issue.10, pp.2288-2296, 2009.

S. Deng, D. Xiao, Y. Li, and W. Peng, A novel combined cryptographic and hash algorithm based on chaotic control character, Communications in Nonlinear Science and Numerical Simulation, vol.14, issue.11, pp.3889-3900, 2009.

S. Deng, Y. Li, and D. Xiao, Analysis and improvement of a chaos-based hash function construction, Communications in Nonlinear Science and Numerical Simulation, vol.15, issue.5, pp.1338-1347, 2010.

H. Yang, K. Wong, X. Liao, Y. Wang, and D. Yang, One-way hash function construction based on chaotic map network, Chaos, Solitons & Fractals, vol.41, issue.5, pp.2566-2574, 2009.

D. Xiao, X. Liao, and Y. Wang, Improving the security of a parallel keyed hash function based on chaotic maps, Physics Letters A, vol.373, issue.47, pp.4346-4353, 2009.

Y. Li, S. Deng, and D. Xiao, A novel hash algorithm construction based on chaotic neural network, Neural Computing and Applications, vol.20, issue.1, pp.133-141, 2011.

Y. Li, D. Xiao, S. Deng, Q. Han, and G. Zhou, Parallel hash function construction based on chaotic maps with changeable parameters, Neural Computing and Applications, vol.20, issue.8, pp.1305-1312, 2011.

Y. Li, D. Xiao, S. Deng, and G. Zhou, Improvement and performance analysis of a novel hash function based on chaotic neural network, Neural Computing and Applications, vol.22, issue.2, pp.391-402, 2013.

B. He, P. Lei, Q. Pu, and Z. Liu, A method for designing hash function based on chaotic neural network, International Workshop on Cloud Computing and Information Security (CCIS), 2013.

Z. Huang, A more secure parallel keyed hash function based on chaotic neural network, Communications in Nonlinear Science and Numerical Simulation, vol.16, issue.8, pp.3245-3256, 2011.

N. Jiteurtragool, P. Ketthong, C. Wannaboon, and W. San-um, A topologically simple keyed hash function based on circular chaotic sinusoidal map network, Advanced Communication Technology (ICACT), 2013 15th International Conference on, pp.1089-1094, 2013.

J. S. Teh, A. Samsudin, and A. Akhavan, Parallel chaotic hash function based on the shuffle-exchange network, Nonlinear Dynamics, vol.81, issue.3, pp.1067-1079, 2015.

N. Abdoun, S. E. Assad, M. A. Taha, R. Assaf, O. Deforges et al., Hash function based on efficient chaotic neural network, International Conference on Internet Technology and Secured Transactions, pp.32-37, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01250274

N. Abdoun, S. E. Assad, M. A. Taha, R. Assaf, O. Déforges et al., Secure hash algorithm based on efficient chaotic neural network, The 11th International Conference on Communications, p.2016, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01294385

M. A. Chenaghlu, S. Jamali, and N. N. Khasmakhi, A novel keyed parallel hashing scheme based on a new chaotic system, Chaos, Solitons & Fractals, vol.87, pp.216-225, 2016.

A. Akhavan, A. Samsudin, and A. Akhshani, A novel parallel hash function based on 3d chaotic map, EURASIP Journal on Advances in Signal Processing, vol.2013, issue.1, p.126, 2013.

M. Nouri, A. Khezeli, A. Ramezani, and A. Ebrahimi, A dynamic chaotic hash function based upon circle chord methods, Sixth International Symposium on, pp.1044-1049, 2012.

R. Guesmi, M. Farah, A. Kachouri, and M. Samet, A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2, Nonlinear Dynamics, vol.83, issue.3, pp.1123-1136, 2016.

D. Xiao, X. Liao, and S. Deng, Parallel keyed hash function construction based on chaotic maps, Physics Letters A, vol.372, issue.26, pp.4682-4688, 2008.

S. E. Assad and H. Noura, Generator of chaotic sequences and corresponding generating system, US Patent, vol.8, p.116, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00801831

S. E. Assad, Chaos based information hiding and security, Internet Technology And Secured Transactions, 2012 International Conference for, pp.67-72, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00755331

W. Stallings, Cryptography and Network Security: Principles and Practice, International Edition: Principles and Practice, 2014.

A. J. Menezes, P. C. Van-oorschot, and S. A. Vanstone, Handbook of applied cryptography, 1996.

C. Liu, H. Ling, F. Zou, Y. Wang, H. Feng et al., Local and global structure preserving hashing for fast digital fingerprint tracing, Multimedia Tools and Applications, vol.74, issue.18, pp.8003-8023, 2015.

S. Lee, W. Hwang, and K. Kwon, Polyline curvatures based robust vector data hashing, Multimedia tools and applications, vol.73, pp.1913-1942, 2014.

B. Kim, S. Oh, S. Jang, and Y. Ko, File similarity evaluation scheme for multimedia data using partial hash information, Multimedia Tools and Applications, vol.76, issue.19, pp.19649-19663, 2017.

M. Bellare, R. Canetti, and H. Krawczyk, Keying hash functions for message authentication, Annual International Cryptology Conference, pp.1-15, 1996.

B. Denton and R. Adhami, Modern hash function construction

R. C. Merkle and R. Charles, Secrecy, authentication, and public key systems, 1979.

I. B. Damgård, A design principle for hash functions, Conference on the Theory and Application of Cryptology, pp.416-427, 1989.

S. Lucks, Design principles for iterated hash functions, IACR Cryptology ePrint Archive, p.253, 2004.

M. Nandi and S. Paul, Speeding up the wide-pipe: Secure and fast hashing.," in Indocrypt, vol.6498, pp.144-162, 2010.

O. Dunkelman and E. Biham, A framework for iterative hash functions: Haifa, 2nd NIST Cryptographich Hash Workshop, vol.22, 2006.

G. Bertoni, J. Daemen, M. Peeters, and G. Van-assche, Sponge functions, ECRYPT hash workshop, 2007.

R. Rivest, The md5 message-digest algorithm, 1992.

F. Pub, Secure hash standard, Public Law, vol.100, p.235, 1995.

S. M. Matyas, Generating strong one-way functions with cryptographic algorithm, IBM Technical Disclosure Bulletin, vol.27, pp.5658-5959, 1985.

T. Bartkewitz, Building hash functions from block ciphers, their security and implementation properties, 2009.

B. O. Brachtl, D. Coppersmith, M. M. Hyden, S. M. Matyas, C. H. Meyer et al., Data authentication using modification detection codes based on a public one way encryption function, p.861, 131990-03.

S. Miyaguchi, M. Iwata, and K. Ohta, New 128-bit hash function, Proc. 4th International Joint Workshop on Computer Communications, pp.279-288, 1989.

B. Preneel, R. Govaerts, and J. Vandewalle, Hash functions based on block ciphers: A synthetic approach, Crypto, vol.93, pp.368-378, 1993.

S. Miyaguchi, K. Ohta, and M. Iwata, Confirmation that some hash functions are not collision free, Workshop on the Theory and Application of of Cryptographic Techniques, pp.326-343, 1990.

B. Prencel, A. Bosselaers, R. Govaerts, and J. Vandewalle, Collision-free hashfunctions based on blockcipher algorithms, Security Technology, 1989. Proceedings. 1989 International Carnahan Conference on, pp.203-210, 1989.

K. Desnos, S. E. Assad, A. Arlicot, M. Pelcat, and D. Menard, Efficient multicore implementation of an advanced generator of discrete chaotic sequences, Internet Technology and Secured Transactions (ICITST), pp.31-36, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01094677

B. Preneel, Analysis and design of cryptographic hash functions, 1993.

H. Feistel, Cryptography and computer privacy, Scienfitic American, vol.228, pp.15-23, 1973.

I. Mironov, Hash functions: Theory, attacks, and applications, 2005.

K. Aoki and Y. Sasaki, Preimage attacks on one-block md4, 63-step md5 and more, International Workshop on Selected Areas in Cryptography, pp.103-119, 2008.

P. Flajolet, D. Gardy, and L. Thimonier, Birthday paradox, coupon collectors, caching algorithms and self-organizing search, Discrete Applied Mathematics, vol.39, issue.3, pp.207-229, 1992.
URL : https://hal.archives-ouvertes.fr/inria-00075832

G. , How to swindle rabin, Cryptologia, vol.3, issue.3, pp.187-191, 1979.

S. Bakhtiari, R. Safavi-naini, and J. Pieprzyk, Cryptographic hash functions: A survey, 1995.

B. Preneel and P. Van-oorschot, On the security of two mac algorithms, Advances in CryptologyEUROCRYPT96, pp.19-32, 1996.

, Hash length extension attacks -java code geeks -2017

, Md5 length extension attack revisited -v's inner peace

, Stop using unsafe keyed hashes, use hmac -rdist

L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang et al., Improved meet-in-themiddle cryptanalysis of ktantan (poster), Australasian Conference on Information Security and Privacy, pp.433-438, 2011.

K. Aoki and Y. Sasaki, Meet-in-the-middle preimage attacks against reduced sha-0 and sha-1, Advances in Cryptology-CRYPTO 2009, pp.70-89, 2009.

Y. Sasaki and K. Aoki, Finding preimages in full md5 faster than exhaustive search, EUROCRYPT, vol.5479, pp.134-152, 2009.

K. Aoki, J. Guo, K. Matusiewicz, Y. Sasaki, and L. Wang, Preimages for step-reduced sha-2, ASIACRYPT, vol.5912, pp.578-597, 2009.

J. Guo, S. Ling, C. Rechberger, and H. Wang, Advanced meet-in-the-middle preimage attacks: first results on full tiger, and improved results on md4 and sha-2, ASIACRYPT, vol.6477, pp.56-75, 2010.

D. Hong, B. Koo, and Y. Sasaki, , vol.5984, pp.332-348, 2009.

Y. Sasaki and K. Aoki, Preimage attacks on 3, 4, and 5-pass haval, International Conference on the Theory and Application of Cryptology and Information Security, pp.253-271, 2008.

A. Joux, Multicollisions in iterated hash functions. application to cascaded constructions, Annual International Cryptology Conference, pp.306-316, 2004.

J. Kelsey and B. Schneier, Second preimages on n-bit hash functions for much less than 2 n work, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.474-490, 2005.

J. Kelsey and T. Kohno, Herding hash functions and the nostradamus attack, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.183-200, 2006.

L. Yu-ling and D. Ming-hui, One-way hash function construction based on the spatiotemporal chaotic system, Chinese Physics B, vol.21, issue.6, p.60503, 2012.

D. Xiao, F. Y. Shih, and X. Liao, A chaos-based hash function with both modification detection and localization capabilities, Communications in Nonlinear Science and Numerical Simulation, vol.15, issue.9, pp.2254-2261, 2010.

Y. Li, D. Xiao, H. Li, and S. Deng, Parallel chaotic hash function construction based on cellular neural network, Neural Computing and Applications, vol.21, issue.7, pp.1563-1573, 2012.

Y. Li, D. Xiao, and S. Deng, Keyed hash function based on a dynamic lookup table of functions, Information Sciences, vol.214, pp.56-75, 2012.

H. Ren, Y. Wang, Q. Xie, and H. Yang, A novel method for one-way hash function construction based on spatiotemporal chaos, Chaos, Solitons & Fractals, vol.42, issue.4, pp.2014-2022, 2009.

X. Guo and J. Zhang, Keyed one-way hash function construction based on the chaotic dynamic s-box, 2006.

H. Yu, Y. Lu, X. Yang, and Z. Zhu, One-way hash function construction based on chaotic coupled map network, Chaos-Fractals Theories and Applications (IWCFTA), pp.193-197, 2011.

H. Zhang, X. Wang, Z. Li, and D. Liu, One way hash function construction based on spatiotemporal chaos, 2005.