2013
DOI: 10.1007/s12293-013-0113-7
|View full text |Cite
|
Sign up to set email alerts
|

An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…the lower are the resources, the longer is the execution time, although in general terms the execution time is low. In Figure 5, it is possible to determine that the runtime of the proposed hash function for the mobile device Moto g is related to Equation (16), where x is the duration of the input recording.…”
Section: Computational Costmentioning
confidence: 99%
See 2 more Smart Citations
“…the lower are the resources, the longer is the execution time, although in general terms the execution time is low. In Figure 5, it is possible to determine that the runtime of the proposed hash function for the mobile device Moto g is related to Equation (16), where x is the duration of the input recording.…”
Section: Computational Costmentioning
confidence: 99%
“…y ≈ −1 × 10 −5 x 2 + 0.0303x − 0.0365 (16) It is also possible to determine that the execution time of the proposed hash function for Nexus 5x is related to Equation (17).…”
Section: Computational Costmentioning
confidence: 99%
See 1 more Smart Citation