Cryptanalysis of some chaos-based keyed hash functions

By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and s...

Descripció completa

Dades bibliogràfiques
Autors principals: ZHENG Shi-hui1, ZHANG Guo-yan3, YANG Yi-xian1, LI Zhong-xian1
Format: Article
Idioma:zho
Publicat: Editorial Department of Journal on Communications 2011-01-01
Col·lecció:Tongxin xuebao
Matèries:
Accés en línia:http://www.joconline.com.cn/zh/article/74419915/