共 15 条
[1]
Secure Hash Standard, (1993)
[2]
Rivest R.L., The MD5 message digest algorithm
[3]
Baptista M.S., Cryptography with chaos, Physics Letters A, 240, 1-2, pp. 50-54, (1998)
[4]
Wong K.W., A combined chaotic cryptographic and hashing scheme, Physics Letters A, 307, 5-6, pp. 292-298, (2003)
[5]
Xiao D., Liao X.F., Deng S.J., One-way Hash function construction based on the chaotic map with changeable-parameter, Chaos, Solitons and Fractals, 24, 1, pp. 65-71, (2005)
[6]
Yi X., Hash function based on chaotic tent maps, IEEE Transactions on Circuits System II-Express Briefs, 52, 6, pp. 354-357, (2005)
[7]
Lian S.G., Sun J.S., Wang Z.Q., Secure hash function based on neural network, Neurocomputing, 69, 16-18, pp. 2346-2350, (2006)
[8]
Zhang J.S., Wang X.M., Zhang W.F., Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter, Physics Letters A, 362, 5-6, pp. 439-448, (2007)
[9]
Wang Y., Liao X.F., Xiao D., Et al., One-way hash function construction based on 2D coupled map lattices, Information Science, 178, 5, pp. 1391-1406, (2008)
[10]
Yang H.Q., Wong K.W., Liao X.F., Et al., One-way hash function construction based on chaotic map network, Chaos, Solitons and Fractals, 41, 5, pp. 2566-2574, (2009)