4 Hits in 5.9 sec

SHAH: Hash Function based on Irregularly Decimated Chaotic Map [article]

Mihaela Todorova, Borislav Stoyanov, Krzysztof Szczypiorski, Krasimir Kordov
2018 arXiv   pre-print
In this paper, we propose a novel hash function based on irregularly decimated chaotic map. The hash function called SHAH is based on two Tinkerbell maps filtered with irregular decimation rule.  ...  The experimental data show that SHAH satisfied admirable level of security.  ...  Proposed Hash Function based on Irregularly Decimated Chaotic Map In this section, we construct a keyed hash function named SHAH based on a irregularly decimated chaotic map.  ... 
arXiv:1808.01956v1 fatcat:o6nnfqfp2baynk675wdlzu3zwe

MATTEX 2020, Conference proceedings

EDITORIAL BOARD: Prof. Vejdi Hasanov, PhD, Prof. Borislav Stoyanov, DSc, Prof. Ivo Michailov, DSc, Prof. Natalia Pavlova, DSc, Assoc. Prof. Radostina Encheva, PhD, Assoc. Prof. Radka Ruseva, PhD, Assoc. Prof. Kornelia Todorova, PhD, Assoc. Prof. Stanimir Zhelezov, PhD, Prof. Krzysztof Szczypiorski, DSc, Poland, Prof. Vasyl Oleksandrovych Shvets, PhD, Ukraine, Prof. Atanas Stefanov, PhD, USA, Prof. Varga Kalantarov, PhD, Turkey
2021 Zenodo  
This volume contains the reports presented on the Scientific Conference with international participation MATTEX 2020 held at Konstantin Preslavsky University of Shumen in October 2020.  ...  SHAH: Hash Function based on Irregularly Decimated Chaotic Map. International Journal of Electronics and Telecommunications, 64(4), 457-465. [11] Kordov, K. (2015).  ...  BentSign: keyed hash algorithm based on bent Boolean function and chaotic attractor. Bulletin of the Polish Academy of Sciences.  ... 
doi:10.5281/zenodo.4449713 fatcat:ztpmoyc2vnbv7ngafvtk6wajxq

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+97 others)
2016 International Journal of Network Security   unpublished
Then a new PPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function.  ...  So, the paper will wipe out the symmetric cryptography , and only use chaotic maps, a secure one-way hash function to construct a provable privacy-protection system (PPS) which can achieve two kinds of  ...  Only RC has its identity ID RC and public key (x, T k (x)) and a secret key k based on Chebyshev chaotic maps and a secure one-way hash function H(·).  ... 

X10 for high-performance scientific computing [article]

Joshua John Milthorpe, University, The Australian National, University, The Australian National
In these methods, the computation required for each portion of the system is different depending on that portion's contribution to the overall result.  ...  While great advances have been made in methods and algorithms for scientific computing, the most commonly used programming models encourage a fragmented view of computation that maps poorly to the underlying  ...  Combinational Logic Simple operations on large data; bit-level parallelism. Hashing; encryption 9.  ... 
doi:10.25911/5d70eed47d478 fatcat:hf4ifyd3fbajpiaf6wbe2w343m