Cryptanalysis of some chaos-based keyed hash functions
By employing the methods including statistic analysis,birthday attacks,and so on,the forging attacks and equivalent-key recovering attacks towards a categories keyed hash functions that are based on chaos systems were pro-posed.Meanwhile,the reasons for that these attacks succeed were analyzed and s...
Autors principals: | , , , |
---|---|
Format: | Article |
Idioma: | zho |
Publicat: |
Editorial Department of Journal on Communications
2011-01-01
|
Col·lecció: | Tongxin xuebao |
Matèries: | |
Accés en línia: | http://www.joconline.com.cn/zh/article/74419915/ |