Otwarty dostęp

Data Information Security Algorithm Based on Chaos and Hash Function

   | 02 cze 2023

Zacytuj

Amine, Z., Naima, H. S., & Ali-Pacha, A. (2022). A secure hash function based on sponge construction and chaos-maps. International Journal of Computational Science and Engineering, 25(3), 285-297. Search in Google Scholar

Jabeen, T., Ashraf, H., & Ullah, A. (2021). A survey on healthcare data security in wireless body area networks. Journal of ambient intelligence and humanized computing, 12(10), 9841-9854. Search in Google Scholar

Mei, D. (2022). What does students’ experience of e-portfolios suggest. Applied Mathematics and Nonlinear Sciences, 7(2), 15-20. Search in Google Scholar

Rahaman, H., Kamrul Hasan, M., Ali, A. & Shamsul Alam, M. (2021). Implicit Methods for Numerical Solution of Singular Initial Value Problems. Applied Mathematics and Nonlinear Sciences, 6(1), 1-8. Search in Google Scholar

Liu, H., Wang, X., & Kadir, A. (2021). Constructing chaos-based hash function via parallel impulse perturbation. Soft Computing, 25(16), 11077-11086. Search in Google Scholar

Chai, X., Fu, X., Gan, Z., Zhang, Y., Lu, Y., & Chen, Y. (2020). An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Computing and Applications, 32(9), 4961-4988. Search in Google Scholar

AbdElminaam, D., & Abdullah Ibrahim, M. (2022). FHE-Chaos NHCP: Developing a Novel Secure Framework for Cloud Computing Environment. Journal of Computing and Communication, 1(1), 12-26. Search in Google Scholar

Aouissaoui, I., Bakir, T., & Sakly, A. (2021). Robustly correlated key-medical image for DNA-chaos based encryption. IET Image Processing, 15(12), 2770-2786. Search in Google Scholar

Huang, R., Liao, X., Dong, A., & Sun, S. (2020). Cryptanalysis and security enhancement for a chaos-based color image encryption algorithm. Multimedia Tools and Applications, 79(37), 27483-27509. Search in Google Scholar

Kaur, G., Singh, K., & Gill, H. S. (2021). Chaos-based joint speech encryption scheme using SHA-1. Multimedia tools and applications, 80(7), 10927-10947. Search in Google Scholar

Abdoun, N., El Assad, S., Deforges, O., Assaf, R., & Khalil, M. (2020). Design and security analysis of two robust keyed hash functions based on chaotic neural networks. Journal of Ambient Intelligence and Humanized Computing, 11(5), 2137-2161. Search in Google Scholar

Mishra, D., Obaidat, M. S., Rana, S., Dharminder, D., Mishra, A., & Sadoun, B. (2020). Chaos-based content distribution framework for digital rights management system. IEEE Systems Journal, 15(1), 570-576. Search in Google Scholar

eISSN:
2444-8656
Język:
Angielski
Częstotliwość wydawania:
Volume Open
Dziedziny czasopisma:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics