ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A chaos-based keyed hash function based on fixed point representation
Cluster Computing
◽
10.1007/s10586-018-2870-z
◽
2018
◽
Vol 22
(2)
◽
pp. 649-660
◽
Cited By ~ 14
Author(s):
Je Sen Teh
◽
Kaijun Tan
◽
Moatsum Alawida
Keyword(s):
Fixed Point
◽
Hash Function
◽
Point Representation
◽
Keyed Hash Function
Download Full-text
Related Documents
Cited By
References
Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter
Physics Letters A
◽
10.1016/j.physleta.2006.10.052
◽
2007
◽
Vol 362
(5-6)
◽
pp. 439-448
◽
Cited By ~ 81
Author(s):
Jiashu Zhang
◽
Xiaomin Wang
◽
Wenfang Zhang
Keyword(s):
Digital Filter
◽
Hash Function
◽
Keyed Hash Function
Download Full-text
fixed-point representation
Computer Science and Communications Dictionary
◽
10.1007/1-4020-0613-6_7253
◽
2000
◽
pp. 615-615
Author(s):
Martin H. Weik
Keyword(s):
Fixed Point
◽
Point Representation
Download Full-text
On the use of chaotic iterations to design keyed hash function
Cluster Computing
◽
10.1007/s10586-017-1062-6
◽
2017
◽
Vol 22
(S1)
◽
pp. 905-919
◽
Cited By ~ 11
Author(s):
Zhuosheng Lin
◽
Christophe Guyeux
◽
Simin Yu
◽
Qianxue Wang
◽
Shuting Cai
Keyword(s):
Hash Function
◽
Chaotic Iterations
◽
Keyed Hash Function
Download Full-text
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
Nonlinear Dynamics
◽
10.1007/s11071-020-05504-x
◽
2020
◽
Vol 100
(1)
◽
pp. 713-729
◽
Cited By ~ 3
Author(s):
Je Sen Teh
◽
Moatsum Alawida
◽
Jia Jie Ho
Keyword(s):
Fixed Point
◽
Hash Function
◽
Fixed Point Arithmetic
◽
Point Arithmetic
Download Full-text
Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation
IEEE Access
◽
10.1109/access.2019.2896661
◽
2019
◽
Vol 7
◽
pp. 37211-37219
◽
Cited By ~ 12
Author(s):
Hongjun Liu
◽
Abdurahman Kadir
◽
Jian Liu
Keyword(s):
Chaotic System
◽
Hash Function
◽
Time Varying
◽
Varying Parameters
◽
Time Varying Parameters
◽
Keyed Hash Function
◽
Parameters Perturbation
Download Full-text
Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher
2020 IEEE Symposium on Computers and Communications (ISCC)
◽
10.1109/iscc50000.2020.9219737
◽
2020
◽
Author(s):
Hassan Noura
◽
Ola Salman
◽
Ali Chehab
◽
Raphael Couturier
Keyword(s):
Hash Function
◽
Stream Cipher
◽
Keyed Hash Function
◽
Rc4 Stream Cipher
Download Full-text
A chaos-based keyed hash function for secure protocol and messege authentication in mobile ad hoc wireless networks
2015 Science and Information Conference (SAI)
◽
10.1109/sai.2015.7237319
◽
2015
◽
Cited By ~ 4
Author(s):
Winai Chankasame
◽
Wimol San-Um
Keyword(s):
Wireless Networks
◽
Hash Function
◽
Ad Hoc
◽
Ad Hoc Wireless Networks
◽
Secure Protocol
◽
Mobile Ad Hoc
◽
Keyed Hash Function
Download Full-text
A fixed-point representation of the generalized complementarity problem
Journal of Optimization Theory and Applications
◽
10.1007/bf00938441
◽
1985
◽
Vol 45
(3)
◽
pp. 375-381
Author(s):
S. C. Fang
◽
E. L. Peterson
Keyword(s):
Fixed Point
◽
Complementarity Problem
◽
Generalized Complementarity Problem
◽
Point Representation
Download Full-text
A dynamic fixed-point representation for neuromorphic computing systems
2017 International SoC Design Conference (ISOCC)
◽
10.1109/isocc.2017.8368819
◽
2017
◽
Author(s):
Yongshin Kang
◽
Jaeyong Chung
Keyword(s):
Fixed Point
◽
Neuromorphic Computing
◽
Computing Systems
◽
Point Representation
Download Full-text
Cryptanalysis on a parallel keyed hash function based on chaotic neural network
Neurocomputing
◽
10.1016/j.neucom.2010.05.011
◽
2010
◽
Vol 73
(16-18)
◽
pp. 3224-3228
◽
Cited By ~ 23
Author(s):
Xing-yuan Wang
◽
Jian-feng Zhao
Keyword(s):
Neural Network
◽
Hash Function
◽
Chaotic Neural Network
◽
Keyed Hash Function
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close