New hash function based on C-MD structure and chaotic neural network

In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low i...

Full description

Saved in:
Bibliographic Details
Main Authors: Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2023-06-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023033
Tags: Add Tag
No Tags, Be the first to tag this record!