A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
SHAH: Hash Function based on Irregularly Decimated Chaotic Map
[article]
2018
arXiv
pre-print
In this paper, we propose a novel hash function based on irregularly decimated chaotic map. The hash function called SHAH is based on two Tinkerbell maps filtered with irregular decimation rule. ...
The experimental data show that SHAH satisfied admirable level of security. ...
Proposed Hash Function based on Irregularly Decimated Chaotic Map In this section, we construct a keyed hash function named SHAH based on a irregularly decimated chaotic map. ...
arXiv:1808.01956v1
fatcat:o6nnfqfp2baynk675wdlzu3zwe
MATTEX 2020, Conference proceedings
2021
Zenodo
This volume contains the reports presented on the Scientific Conference with international participation MATTEX 2020 held at Konstantin Preslavsky University of Shumen in October 2020. ...
SHAH: Hash Function based on Irregularly Decimated Chaotic Map. International Journal of Electronics and Telecommunications, 64(4), 457-465. [11] Kordov, K. (2015). ...
BentSign: keyed hash algorithm based on bent Boolean function and chaotic attractor. Bulletin of the Polish Academy of Sciences. ...
doi:10.5281/zenodo.4449713
fatcat:ztpmoyc2vnbv7ngafvtk6wajxq
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
Then a new PPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function. ...
So, the paper will wipe out the symmetric cryptography , and only use chaotic maps, a secure one-way hash function to construct a provable privacy-protection system (PPS) which can achieve two kinds of ...
Only RC has its identity ID RC and public key (x, T k (x)) and a secret key k based on Chebyshev chaotic maps and a secure one-way hash function H(·). ...
fatcat:3gborlznmrac3ebiwzxjjy5jly
X10 for high-performance scientific computing
[article]
2015
In these methods, the computation required for each portion of the system is different depending on that portion's contribution to the overall result. ...
While great advances have been made in methods and algorithms for scientific computing, the most commonly used programming models encourage a fragmented view of computation that maps poorly to the underlying ...
Combinational Logic Simple operations on large data; bit-level parallelism. Hashing; encryption 9. ...
doi:10.25911/5d70eed47d478
fatcat:hf4ifyd3fbajpiaf6wbe2w343m