2011
DOI: 10.1007/s11235-011-9457-9
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 11 publications
0
9
1
Order By: Relevance
“…With the growing applications of cloud computing and multimedia services, the issue of communication privacy protection has gained more attention. To solve the privacy problem, numerous authentication and key agreement protocols are presented [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. In order to login the server, the users execute the authentication process through session initial protocol (SIP).…”
Section: Introductionmentioning
confidence: 99%
“…With the growing applications of cloud computing and multimedia services, the issue of communication privacy protection has gained more attention. To solve the privacy problem, numerous authentication and key agreement protocols are presented [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. In order to login the server, the users execute the authentication process through session initial protocol (SIP).…”
Section: Introductionmentioning
confidence: 99%
“…However, the quasi-Newton method has the obvious drawback that it consumes a lot of time and memory to store the Hessian matrix, which leads to the limitation in applications of complex problems. Considering the superiority of parallelism mechanism in processing speed, many methods based on parallelism mechanism have arisen to improve the convergence speed of neural network [ 20 , 21 , 22 ]. In this paper, computing parallelism is coupled with the quasi-Newton algorithm to generate the parallel quasi-Newton (PQN) algorithm, which is used in the training process of neural networks.…”
Section: Introductionmentioning
confidence: 99%
“…In the following, we will give the proof that our proposed scheme is secure in the AFP05 model. As known to all, one-way hash function is more efficient than the operation of scalar multiplication and pairings [19][20][21]. Moreover, the pairing operation costs much more than the scalar multiplication operation.…”
Section: Introductionmentioning
confidence: 99%