Design, implementation and analysis of keyed hash functions based on chaotic maps and neural networks
Les fonctions de hachage sont des primitives les plus utiles en cryptographie. En effet, elles jouent un rôle important dans l’intégrité des données, l’authentification des messages, la signature numérique et le chiffrement authentifié. Ainsi, la conception de fonctions de hachage sécurisées est cru...
Main Author: | Abdoun, Nabil |
---|---|
Other Authors: | Nantes |
Language: | en |
Published: |
2019
|
Subjects: | |
Online Access: | http://www.theses.fr/2019NANT4013/document |
Similar Items
-
Applicability of neural networks to software security
by: Adebiyi, Adetunji B.
Published: (2013) -
Encryption in the presence of key-dependent messages and related-key attacks
by: Davies, Gareth Thomas
Published: (2015) -
Design and implementation of extensible middleware for non-repudiable interactions
by: Robinson, Paul Fletcher
Published: (2006) -
Advanced cryptographic system : design, architecture and FPGA implementation
by: Al-Gailani, Mohammed Falih
Published: (2012) -
Generalised key distribution patterns
by: Novak, Julia
Published: (2012)