2D Sine Logistic modulation map for image encryption

Z Hua, Y Zhou, CM Pun, CLP Chen - Information Sciences, 2015 - Elsevier
Because of the excellent properties of unpredictability, ergodicity and sensitivity to their
parameters and initial values, chaotic maps are widely used in security applications. In this …

Implementation and practical problems of chaos-based cryptography revisited

JS Teh, M Alawida, YC Sii - Journal of Information Security and Applications, 2020 - Elsevier
Chaos-based cryptography, since its inception, has become a widely published subject.
Despite the vast amount of contributions in the area, its applications in real-world scenarios …

Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map

P Ayubi, S Setayeshi, AM Rahmani - Chaos, Solitons & Fractals, 2023 - Elsevier
In the last two decades, the use of chaotic iterative maps in cryptographic systems,
especially chaotic hash functions, has been expanding. Sensitivity to small changes in initial …

2D Logistic-Adjusted-Chebyshev map for visual color image encryption

L Liu, D Jiang, X Wang, X Rong, R Zhang - Journal of Information Security …, 2021 - Elsevier
With the increasing requirements of the performance in secure communication filed based
on chaos, chaotic systems have been gradually developed into higher dimensions. Because …

Constructing chaos-based hash function via parallel impulse perturbation

H Liu, X Wang, A Kadir - Soft Computing, 2021 - Springer
Secure hash functions, such as SHA-2 and SHA-3, play an important role in cryptography;
however, they are unkeyed and cannot produce the specific hash value with a specified …

Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences

SMS Eldin, AAA El-Latif, SA Chelloug, M Ahmad… - IEEE …, 2023 - ieeexplore.ieee.org
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main
aim of this paper is how to increase the security level of the blockchain based on the …

A Nondegenerate n-Dimensional Hyperchaotic Map Model with Application in a Keyed Parallel Hash Function

M Zhao, H Liu - International Journal of Bifurcation and Chaos, 2023 - World Scientific
The construction of multidimensional discrete hyperchaotic maps with ergodicity and larger
Lyapunov exponents is desired in cryptography. Here, we have designed a general n D (n≥ …

A general hybrid model for chaos robust synchronization and degradation reduction

Y Deng, H Hu, N **ong, W **ong, L Liu - Information Sciences, 2015 - Elsevier
This paper focuses on the problem of robust synchronization of uncertain continuous chaos
and dynamical degradation of digital chaos. A hybrid model is established based on the …

Constructing a Nondegenerate 2D Integer-Domain Hyperchaotic Map Over GF() with Application in Parallel Hashing

Y Cao, H Liu, D Xu - International Journal of Bifurcation and Chaos, 2023 - World Scientific
To solve the problem of finite precision effect of existing chaotic maps on digital platform,
first, a nondegenerate 2D integer-domain hyperchaotic map (2D-IDHCM) over GF (2 n) is …

Image block encryption algorithm based on chaotic maps

L Liu, S Hao, J Lin, Z Wang, X Hu… - IET Signal Processing, 2018 - Wiley Online Library
Advanced in unpredictability, ergodicity and sensitivity to initial conditions and parameters,
chaotic maps are widely used in modern image encryption algorithms. In this study, the …