Author of the publication

Chaos Based Hash Function.

, , and . Chaos-Based Cryptography, volume 354 of Studies in Computational Intelligence, Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient entire chaos-based scheme for deniable authentication, , and . Chaos, Solitons & Fractals, 23 (4): 1327--1331 (February 2005)An improved needle steering model with online parameter estimator., , , , , , and . Int. J. Comput. Assist. Radiol. Surg., 1 (4): 205-212 (2006)First-principles calculation of Z2 topological invariants within the FP-LAPW formalism., , , , and . Comput. Phys. Commun., 183 (9): 1849-1859 (2012)Robust image hashing with tampering recovery capability via low-rank and sparse representation., , , and . Multim. Tools Appl., 75 (13): 7681-7696 (2016)Commutative fragile zero-watermarking and encryption for image integrity protection., , , , and . Multim. Tools Appl., 78 (16): 22727-22742 (2019)QKD-Based Quantum Private Query Protocol in the Single-Photon Interference Communication System., , , , , , and . IEEE Access, (2019)CytoBrain: Cervical Cancer Screening System Based on Deep Learning Technology., , , , , , , and . J. Comput. Sci. Technol., 36 (2): 347-360 (2021)A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption., , , , and . IEEE Access, (2020)Distributed privacy-preserving nested compressed sensing for multiclass data collection with identity authentication., , , and . Signal Process., (2023)Using time-stamp to improve the security of a chaotic maps-based key agreement protocol., , and . Inf. Sci., 178 (6): 1598-1602 (2008)