Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences

SMS Eldin, AAA El-Latif, SA Chelloug, M Ahmad… - IEEE …, 2023 - ieeexplore.ieee.org
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main
aim of this paper is how to increase the security level of the blockchain based on the …

Parallel chaotic hash function based on the shuffle-exchange network

JS Teh, A Samsudin, A Akhavan - Nonlinear Dynamics, 2015 - Springer
In recent years, cryptologists have been delving into chaos theory to design more secure
cryptographic primitives. However, many existing chaos-based algorithms are slow due to …

Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic

JS Teh, M Alawida, JJ Ho - Nonlinear Dynamics, 2020 - Springer
Chaotic maps have various properties that mirror the security requirements of cryptographic
algorithms. As such, researchers have utilized them in the design of algorithms such as hash …

Design and security analysis of two robust keyed hash functions based on chaotic neural networks

N Abdoun, S El Assad, O Deforges, R Assaf… - Journal of Ambient …, 2020 - Springer
In this paper, we designed, implemented, and analyzed the performance, in terms of security
and speed, of two proposed keyed Chaotic Neural Network (CNN) hash functions based on …

Design, implementation and analysis of keyed hash functions based on chaotic maps and neural networks

N Abdoun - 2019 - hal.science
The hash functions are the most useful primitives in cryptography. They play an important
role in data integrity, message authentication, digital signature and authenticated encryption …