Web1 mrt. 2012 · In this paper, we propose a new keyed hash function defined by a single chaotic map and based on a search technique that looks for specific iterations. These … Web22 mei 2024 · The keyed hash function has a larger key space and can generate 224, 256, 384, 512 or longer hash value via parameter switcher. Theoretical analysis and …
A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps …
Web1 mrt. 2012 · A novel parallel chaotic hashing model is proposed that integrates multiple chaotic maps as a single chaotic system to generate an n-bit hash value for a given … Web31 aug. 2009 · A keyed hash algorithm is proposed based on 1-D enhanced quadratic map (EQM) with varying parameter that can generate hash value with different lengths of … grass to glass
Keyed hash function based on a dynamic lookup table of functions
Web1 mrt. 2012 · Secure hash functions play a fundamental role in cryptographic and Web applications. They are mainly used, within digital signature schemes, to verify the … WebHash round functions are implemented by one of the chaotic maps and can work in parallel mode to provide high performance and security. The proposed hash function has a very simple and flexible design, which produces different lengths of keyed hash functions using different chaotic maps. Web3 apr. 2024 · An approach of generating secure hash functions is presented using blended chaotic maps in novel manner. 2. A number of chaotic maps are utilized so as to enlarge the size of the secret key. 3. The proposed approach is designed to hold the property of ease of computation with effective compression. grass to flower bed