A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims.
Moatsum Alawida +5 more
doaj +2 more sources
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata
In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward and parameter permutation variant,
Moatsum Alawida +5 more
doaj +2 more sources
Finding Bugs in Cryptographic Hash Function Implementations. [PDF]
Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test them can be particularly difficult, and bugs can remain unnoticed for many years. We revisit the
Mouha N, Raunak MS, Kuhn DR, Kacker R.
europepmc +2 more sources
Controlled Alternate Quantum Walks based Quantum Hash Function. [PDF]
Through introducing controlled alternate quantum walks, we present controlled alternate quantum walks (CAQW) based quantum hash function. CAQW based quantum hash function have excellent security, outstanding statistical performance and splendid ...
Li D, Yang YG, Bi JL, Yuan JB, Xu J.
europepmc +3 more sources
Quantum hash function based on controlled alternate lively quantum walks [PDF]
Quantum hash function is an important area of interest in the field of quantum cryptography. Quantum hash function based on controlled alternate quantum walk is a mainstream branch of quantum hash functions by virtue of high efficiency and flexibility ...
Penglin Hou +4 more
doaj +2 more sources
Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3 [PDF]
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang +7 more
doaj +2 more sources
Keyed Hash Function Using Hyper Chaotic System With Time-Varying Parameters Perturbation
Secure hash function plays an important role in cryptography. This paper constructs a hash algorithm using the hyperchaotic Lorenz system, which serves as a sponge function to absorb input message via multiple parameters time-varying perturbation. First,
Hongjun Liu, Abdurahman Kadir, Jian Liu
doaj +2 more sources
A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security [PDF]
The design of cryptographic hash functions is crucial for ensuring the security of digital information. In this context, cellular automata (CAs) have emerged as a promising tool due to their inherent parallelism, determinism, and simplicity.
Qianyun Wang +5 more
doaj +2 more sources
New hash function based on C-MD structure and chaotic neural network
In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile ...
Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA
doaj +3 more sources
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
We propose a new hash function Reinforced Concrete, which is the first generic purpose hash that is fast both for a zero-knowledge prover and in native x86 computations.
Lorenzo Grassi +5 more
semanticscholar +1 more source

