Cargando…
Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network
In this paper, we propose, implement, and analyze the structures of two keyed hash functions using the Chaotic Neural Network (CNN). These structures are based on Sponge construction, and they produce two variants of hash value lengths, i.e., 256 and 512 bits. The first structure is composed of two-...
Autores principales: | Abdoun, Nabil, El Assad, Safwan, Manh Hoang, Thang, Deforges, Olivier, Assaf, Rima, Khalil, Mohamad |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7597085/ https://www.ncbi.nlm.nih.gov/pubmed/33286780 http://dx.doi.org/10.3390/e22091012 |
Ejemplares similares
-
Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
por: Battikh, Dalia, et al.
Publicado: (2019) -
Novel Models of Image Permutation and Diffusion Based on Perturbed Digital Chaos
por: Hoang, Thang Manh, et al.
Publicado: (2020) -
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
por: Hakeem, Shimaa A. Abdel, et al.
Publicado: (2021) -
Construction of high-dimensional cyclic symmetric chaotic map with one-dimensional chaotic map and its security application
por: Zhang, Yingpeng, et al.
Publicado: (2022) -
ntHash: recursive nucleotide hashing
por: Mohamadi, Hamid, et al.
Publicado: (2016)