A Chaos-Based Cryptographic Hash Function for Message Authentication.
Hong Sze KwokWallace Kit-Sang TangPublished in: Int. J. Bifurc. Chaos (2005)
Keyphrases
- hash functions
- authentication protocol
- secret key
- authentication scheme
- similarity search
- provably secure
- public key cryptography
- hashing algorithm
- image encryption
- chaotic map
- locality sensitive hashing
- user authentication
- hash table
- hamming distance
- key distribution
- encryption scheme
- data distribution
- block cipher
- security analysis
- secure communication
- nearest neighbor search
- stream cipher
- encryption algorithm
- hashing methods
- private key
- binary codes
- high security
- integer wavelet transform