Cryptanalysis of some chaos-based keyed hash functions
By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and s...
Saved in:
| Main Authors: | ZHENG Shi-hui1, ZHANG Guo-yan3, YANG Yi-xian1, LI Zhong-xian1 |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2011-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails?columnId=74419915&Fpath=home&index=0 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Key storage management scheme based on keyed hash tree with state
by: Xiangyu WANG, et al.
Published: (2018-05-01) -
One-way hash function with chaotic dynamic parameters
by: GUO Wei1, et al.
Published: (2008-01-01) -
One-way hash function with chaotic dynamic parameters
by: GUO Wei1, et al.
Published: (2008-01-01) -
Design keyed Hash function based on couple chaotic system
by: WEI Peng-cheng1, et al.
Published: (2006-01-01) -
Permutation-Based Hash Chains with Application to Password Hashing
by: Charlotte Lefevre, et al.
Published: (2024-12-01)