Abstract | ||
---|---|---|
Hash functions are commonly used in checksums, check digits, fingerprints, randomization functions, error-correcting codes, and ciphers. In this paper, we give a family of hash functions on the basis of chaotic tent maps and the sponge construction, where input is absorbed into the hash state at a given rate, then an output hash is squeezed from it at the same rate. The family include four types of hash functions, which are designed to facilitate the implementation on 8-bit, 16-bit, 32-bit and 64-bit processors, respectively. Our experiments have shown that the family meet security criteria for design of hash functions and the performance of our hash functions is comparable to SHA-3. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1007/978-3-319-40253-6_20 | ACISP |
Keywords | Field | DocType |
Hash function, Chaotic tent map, Sponge construction, Collusion resistant | SHA-2,Double hashing,Computer science,Cryptographic hash function,Collision resistance,Theoretical computer science,Hash buster,Hash function,Security of cryptographic hash functions,Hash chain | Conference |
Volume | ISSN | Citations |
9722 | 0302-9743 | 0 |
PageRank | References | Authors |
0.34 | 2 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xun Yi | 1 | 813 | 91.07 |
Xuechao Yang | 2 | 9 | 5.25 |
Yong Feng | 3 | 0 | 1.35 |
Fengling Han | 4 | 419 | 35.93 |
Ron van Schyndel | 5 | 48 | 8.81 |