Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Design and analysis of new version of cryptographic hash function based on improved chaotic maps with induced DNA sequences
SMS Eldin, AAA El-Latif, SA Chelloug, M Ahmad… - IEEE …, 2023 - ieeexplore.ieee.org
One of the first and most used hashing algorithms in blockchains is SHA-256 so the main
aim of this paper is how to increase the security level of the blockchain based on the …
aim of this paper is how to increase the security level of the blockchain based on the …
Parallel chaotic hash function based on the shuffle-exchange network
In recent years, cryptologists have been delving into chaos theory to design more secure
cryptographic primitives. However, many existing chaos-based algorithms are slow due to …
cryptographic primitives. However, many existing chaos-based algorithms are slow due to …
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
Chaotic maps have various properties that mirror the security requirements of cryptographic
algorithms. As such, researchers have utilized them in the design of algorithms such as hash …
algorithms. As such, researchers have utilized them in the design of algorithms such as hash …
[HTML][HTML] Designing two secure keyed hash functions based on sponge construction and the chaotic neural network
In this paper, we propose, implement, and analyze the structures of two keyed hash
functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …
functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …
Design and security analysis of two robust keyed hash functions based on chaotic neural networks
In this paper, we designed, implemented, and analyzed the performance, in terms of security
and speed, of two proposed keyed Chaotic Neural Network (CNN) hash functions based on …
and speed, of two proposed keyed Chaotic Neural Network (CNN) hash functions based on …
Design, implementation and analysis of keyed hash functions based on chaotic maps and neural networks
N Abdoun - 2019 - hal.science
The hash functions are the most useful primitives in cryptography. They play an important
role in data integrity, message authentication, digital signature and authenticated encryption …
role in data integrity, message authentication, digital signature and authenticated encryption …