Numerical recipes in C: the art of scientific computing
Numerical recipes in C: the art of scientific computing
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Hi-index | 0.00 |
Cryptographic hash functions and message digests are essential in secure communications because they aid in detecting incidental transmission errors caused by unreliable equipment and noisy environments, but also ensure message integrity in presence ofin truders deliberately mounting cryptanalytic attacks.It is the purpose ofthis contribution to introduce a novel approach for generating cryptographic hashes computed from input data dependent pseudo-random permutations. Essentially, input messages are processed sequentially using bytes ofinput data as keys to discrete chaotic Kolmogorov systems which permute an initial message digest in a cryptographically strong manner heavily depending on the input stream. As will be shown this principle can lead to very efficient and strong message digests.