Cryptanalysis of some chaos-based keyed hash functions
By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and s...
Saved in:
Main Authors: | ZHENG Shi-hui1, ZHANG Guo-yan3, YANG Yi-xian1, LI Zhong-xian1 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74419915/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Key storage management scheme based on keyed hash tree with state
by: Xiangyu WANG, et al.
Published: (2018-05-01) -
One-way hash function with chaotic dynamic parameters
by: GUO Wei1, et al.
Published: (2008-01-01) -
Design keyed Hash function based on couple chaotic system
by: WEI Peng-cheng1, et al.
Published: (2006-01-01) -
High efficiency differential chaos shift keying modulation scheme without intra-signal interference
by: Hua YANG, et al.
Published: (2015-06-01) -
Self-healing group key distribution scheme with revocation based on dual directional hash chain
by: DU Chun-lai1, et al.
Published: (2009-01-01)