{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:14:06Z","timestamp":1765354446292,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,1,5]],"date-time":"2016-01-05T00:00:00Z","timestamp":1451952000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["61402380"],"award-info":[{"award-number":["61402380"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s00521-015-2158-7","type":"journal-article","created":{"date-parts":[[2016,1,5]],"date-time":"2016-01-05T06:33:49Z","timestamp":1451975629000},"page":"1405-1415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["A fast and efficient hash function based on generalized chaotic mapping with variable parameters"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7648-5671","authenticated-orcid":false,"given":"Yantao","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiangwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,5]]},"reference":[{"key":"2158_CR1","doi-asserted-by":"crossref","unstructured":"Rompel J (1990) One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the 22th annual ACM symposium on theory of computing, pp 387\u2013394","DOI":"10.1145\/100216.100269"},{"key":"2158_CR2","first-page":"54","volume":"1","author":"N Sklavos","year":"2003","unstructured":"Sklavos N, Alexopoulos E, Koufopavlou O (2003) Networking data integrity: high speed architectures and hardware implementations. Int Arab J Inf Technol 1:54\u201359","journal-title":"Int Arab J Inf Technol"},{"key":"2158_CR3","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/141809.141812","volume":"22","author":"G Tsudik","year":"1992","unstructured":"Tsudik G (1992) Message authentication with one-way hash functions. ACM SIGCOMM Comput Commun Rev 22:29\u201338","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"2158_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-57500-6","volume-title":"Design of hashing algorithms, Lecture Notes in Computer Science","author":"J Pieprzyk","year":"1993","unstructured":"Pieprzyk J, Sadeghiyan B (1993) Design of hashing algorithms, Lecture Notes in Computer Science. Springer, Berlin"},{"key":"2158_CR5","doi-asserted-by":"crossref","first-page":"2524","DOI":"10.1109\/TIT.2002.801402","volume":"48","author":"L Knudsen","year":"2002","unstructured":"Knudsen L, Preneel B (2002) Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Trans Inf Theory 48:2524\u20132539","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"2158_CR6","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1016\/j.chaos.2009.02.001","volume":"42","author":"M Amin","year":"2009","unstructured":"Amin M, Faragallah OS, El-Latif AAA (2009) Chaos based hash function (CBHF) for cryptographic applications. Chaos Solitons Fractals 42(2):767\u2013772","journal-title":"Chaos Solitons Fractals"},{"issue":"1","key":"2158_CR7","first-page":"7","volume":"18","author":"Y Li","year":"2012","unstructured":"Li Y, Xiao D, Deng S (2012) Secure hash function based on chaotic tent map with changeable parameter. High Technol Lett 18(1):7\u201312","journal-title":"High Technol Lett"},{"issue":"7","key":"2158_CR8","first-page":"1671","volume":"7","author":"J Liu","year":"2012","unstructured":"Liu J, Wang X, Yang K, Zhao C (2012) A fast new cryptographic hash function based on integer tent mapping system. J Comput 7(7):1671\u20131680","journal-title":"J Comput"},{"key":"2158_CR9","doi-asserted-by":"crossref","unstructured":"Wang Y, Yang D, Du M, Yang H (2007) One-way hash function construction based on iterating a chaotic map. In: Proceedings-CIS Workshops 2007, 2007 international conference on computational intelligence and security workshops, pp 791\u2013794","DOI":"10.1109\/CISW.2007.4425614"},{"issue":"2","key":"2158_CR10","first-page":"20","volume":"8","author":"M Maqableh","year":"2008","unstructured":"Maqableh M, Samsudin AB, Alia MA (2008) New hash function based on chaos theory (CHA-1). Int J Comput Sci Netw Secur 8(2):20\u201326","journal-title":"Int J Comput Sci Netw Secur"},{"key":"2158_CR11","unstructured":"Jiteurtragool N, Ketthong P, Wannaboon C, San-Um W (2013) A topologically simple keyed hash function based on circular chaotic sinusoidal map network. In: International conference on advanced communication technology, ICACT, pp 1089\u20131094 (2013)"},{"key":"2158_CR12","doi-asserted-by":"crossref","unstructured":"Zhang Q, Zhang H, Li Z (2009) One-way hash function construction based on conservative chaotic systems. In: 5th international conference on information assurance and security, IAS 2009, vol 2, pp 402\u2013405","DOI":"10.1109\/IAS.2009.209"},{"key":"2158_CR13","doi-asserted-by":"crossref","first-page":"1046","DOI":"10.1016\/j.chaos.2009.02.044","volume":"42","author":"A Akhavan","year":"2009","unstructured":"Akhavan A, Samsudin A, Akhshani A (2009) Hash function based on piecewise nonlinear chaotic map. Chaos Solitons Fractals 42:1046\u20131053","journal-title":"Chaos Solitons Fractals"},{"issue":"8","key":"2158_CR14","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1007\/s00521-011-0543-4","volume":"20","author":"Y Li","year":"2011","unstructured":"Li Y, Xiao D, Deng S, Han Q, Zhou G (2011) Parallel hash function construction based on chaotic maps with changeable parameters. Neural Comput Appl 20(8):1305\u20131312","journal-title":"Neural Comput Appl"},{"key":"2158_CR15","doi-asserted-by":"crossref","first-page":"4682","DOI":"10.1016\/j.physleta.2008.04.060","volume":"372","author":"D Xiao","year":"2008","unstructured":"Xiao D, Liao X, Deng S (2008) Parallel keyed hash function construction based on chaotic maps. Phys Lett A 372:4682\u20134688","journal-title":"Phys Lett A"},{"key":"2158_CR16","doi-asserted-by":"crossref","first-page":"4346","DOI":"10.1016\/j.physleta.2009.09.059","volume":"373","author":"D Xiao","year":"2009","unstructured":"Xiao D, Liao X, Wang Y (2009) Improving the security of a parallel keyed hash function based on chaotic maps. Phys Lett A 373:4346\u20134353","journal-title":"Phys Lett A"},{"key":"2158_CR17","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.cnsns.2012.06.019","volume":"18","author":"A Kanso","year":"2013","unstructured":"Kanso A, Ghebleh M (2013) A fast and efficient chaos-based keyed hash function. Commun Nonlinear Sci Numer Simul 18:109\u2013123","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"2158_CR18","doi-asserted-by":"crossref","unstructured":"Nouri M, Khezeli A, Ramezani A, Ebrahimi A (2012) A dynamic chaotic hash function based upon circle chord methods. In: 2012 6th international symposium on telecommunications, IST 2012, pp 1044\u20131049","DOI":"10.1109\/ISTEL.2012.6483140"},{"issue":"1","key":"2158_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-6180-2013-126","volume":"2013","author":"A Akhavan","year":"2013","unstructured":"Akhavan A, Samsudin A, Akshani A (2013) A novel parallel hash function based on 3D chaotic map. EURASIP J Adv Signal Process 2013(1):1\u201312","journal-title":"EURASIP J Adv Signal Process"},{"issue":"5","key":"2158_CR20","doi-asserted-by":"crossref","first-page":"1338","DOI":"10.1016\/j.cnsns.2009.05.065","volume":"15","author":"S Deng","year":"2010","unstructured":"Deng S, Li Y, Xiao D (2010) Analysis and improvement of a chaos-based hash function construction. Commun Nonlinear Sci Numer Simul 15(5):1338\u20131347","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"3","key":"2158_CR21","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.physleta.2004.04.018","volume":"326","author":"G Alvarez","year":"2004","unstructured":"Alvarez G, Montoya F, Romera M, Pastor G (2004) Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys Lett A 326(3):211\u2013218","journal-title":"Phys Lett A"},{"issue":"3","key":"2158_CR22","doi-asserted-by":"crossref","first-page":"1064","DOI":"10.1016\/j.asoc.2006.05.005","volume":"7","author":"G Arumugam","year":"2007","unstructured":"Arumugam G, Lakshmi Praba V, Radhakrishnan S (2007) Study of chaos functions for their suitability in generating message authentication codes. Appl Soft Comput 7(3):1064\u20131071","journal-title":"Appl Soft Comput"},{"issue":"35","key":"2158_CR23","first-page":"133","volume":"43","author":"C Li","year":"2007","unstructured":"Li C, Wang S (2007) A new one-time signature scheme based on improved chaos hash function. Comput Eng Appl 43(35):133\u2013136","journal-title":"Comput Eng Appl"},{"issue":"36","key":"2158_CR24","doi-asserted-by":"crossref","first-page":"3201","DOI":"10.1016\/j.physleta.2009.07.016","volume":"373","author":"W Guo","year":"2009","unstructured":"Guo W, Wang X, He D, Cao Y (2009) Cryptanalysis on a parallel keyed hash function based on chaotic maps. Phys Lett A 373(36):3201\u20133206","journal-title":"Phys Lett A"},{"issue":"10","key":"2158_CR25","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1016\/j.physleta.2010.01.006","volume":"374","author":"D Xiao","year":"2010","unstructured":"Xiao D, Peng W, Liao X, Xiang T (2010) Collision analysis of one kind of chaos-based hash function. Phys Lett A 374(10):1228\u20131231","journal-title":"Phys Lett A"},{"issue":"9","key":"2158_CR26","doi-asserted-by":"crossref","first-page":"090504","DOI":"10.1088\/1674-1056\/20\/9\/090504","volume":"20","author":"S Wang","year":"2011","unstructured":"Wang S, Shan P (2011) Security analysis of a one-way hash function based on spatiotemporal chaos. Chin Phys B 20(9):090504\u2013090507","journal-title":"Chin Phys B"},{"issue":"2","key":"2158_CR27","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1016\/j.cnsns.2011.06.017","volume":"17","author":"S Wang","year":"2012","unstructured":"Wang S, Li D, Zhou H (2012) Collision analysis of a chaos-based hash function with both modification detection and localization capability. Commun Nonlinear Sci Numer Simul 17(2):780\u2013784","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"2158_CR28","doi-asserted-by":"crossref","unstructured":"Bellare M, Ristenpart T, Multi-property-preserving hash domain extension: the EMD transform. In: Proceedings of 2nd NIST cryptographic hash workshop, Corwin Pavilion, UCSB Santa Barbara, CA","DOI":"10.1007\/11935230_20"},{"issue":"11","key":"2158_CR29","doi-asserted-by":"crossref","first-page":"2092","DOI":"10.7498\/aps.50.2092","volume":"50","author":"J Zhang","year":"2001","unstructured":"Zhang J, Xian X (2001) Nonlinear adaptive predictive targeting control of the continuous chaotic system. Acta Phys Sin 50(11):2092\u20132096","journal-title":"Acta Phys Sin"},{"key":"2158_CR30","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.physleta.2006.10.052","volume":"362","author":"J Zhang","year":"2007","unstructured":"Zhang J, Wang X, Zhang W (2007) Chaotic keyed hash function based on feedforward\u2013feedback nonlinear digital filter. Phys Lett A 362:439\u2013448","journal-title":"Phys Lett A"},{"key":"2158_CR31","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.ins.2011.09.008","volume":"186","author":"A Kanso","year":"2012","unstructured":"Kanso A, Yahyaoui H, Almulla M (2012) Keyed hash function based on a chaotic map. Inf Sci 186:249\u2013264","journal-title":"Inf Sci"},{"key":"2158_CR32","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/S0375-9601(02)01770-X","volume":"307","author":"KW Wong","year":"2003","unstructured":"Wong KW (2003) A combined chaotic cryptographic and hashing scheme. Phys Lett A 307:292\u2013298","journal-title":"Phys Lett A"},{"key":"2158_CR33","unstructured":"Yearly Report on Algorithms and Keysizes, D.SPA.17 Rev. 1.0, ICT-2007-216676 ECRYPT II (2011)"},{"key":"2158_CR34","doi-asserted-by":"crossref","unstructured":"Rivest R (1992) The MD5 message-digest algorithm. IETF Network Working Group, RFC 1321","DOI":"10.17487\/rfc1321"},{"key":"2158_CR35","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s11071-015-1970-z","volume":"81","author":"A Kanso","year":"2015","unstructured":"Kanso A, Ghebleh M (2015) A structure-based chaotic hashing scheme. Nonlinear Dyn 81:27\u201340","journal-title":"Nonlinear Dyn"},{"key":"2158_CR36","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s00521-010-0432-2","volume":"20","author":"Y Li","year":"2011","unstructured":"Li Y, Deng S, Xiao D (2011) A novel Hash algorithm construction based on chaotic neural network. Neural Comput Appl 20:133\u2013141","journal-title":"Neural Comput Appl"},{"key":"2158_CR37","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.ins.2012.06.001","volume":"214","author":"Y Li","year":"2012","unstructured":"Li Y, Xiao D, Deng S (2012) Keyed hash function based on a dynamic lookup table of functions. Inf Sci 214:56\u201375","journal-title":"Inf Sci"},{"issue":"4","key":"2158_CR38","doi-asserted-by":"crossref","first-page":"2014","DOI":"10.1016\/j.chaos.2009.03.168","volume":"42","author":"H Ren","year":"2009","unstructured":"Ren H, Wang Y, Xie Q, Yang H (2009) A novel method for one-way hash function construction based on spatiotemporal chaos. Chaos Solitons Fractals 42(4):2014\u20132022","journal-title":"Chaos Solitons Fractals"},{"key":"2158_CR39","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1007\/s11071-015-2049-6","volume":"81","author":"JS Teh","year":"2015","unstructured":"Teh JS, Samsudin A, Akhavan A (2015) Parallel chaotic hash function based on the shuffle-exchange network. Nonlinear Dyn 81:1067\u20131079","journal-title":"Nonlinear Dyn"},{"issue":"5","key":"2158_CR40","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1016\/j.ins.2007.10.008","volume":"178","author":"Y Wang","year":"2008","unstructured":"Wang Y, Liao X, Xiao D, Wong K (2008) One-way hash function construction based on 2D coupled map lattices. Inf Sci 178(5):1391\u20131406","journal-title":"Inf Sci"},{"key":"2158_CR41","doi-asserted-by":"crossref","first-page":"2810","DOI":"10.1016\/j.cnsns.2010.10.001","volume":"16","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong KW, Xiao D (2011) Parallel hash function construction based on coupled map lattices. Commun Nonlinear Sci Number Simul 16:2810\u20132821","journal-title":"Commun Nonlinear Sci Number Simul"},{"key":"2158_CR42","doi-asserted-by":"crossref","first-page":"2288","DOI":"10.1016\/j.neucom.2008.12.031","volume":"72","author":"D Xiao","year":"2009","unstructured":"Xiao D, Liao X, Wang Y (2009) Parallel keyed hash function construction based on chaotic neural network. Neurocomputing 72:2288\u20132296","journal-title":"Neurocomputing"},{"key":"2158_CR43","doi-asserted-by":"crossref","first-page":"2254","DOI":"10.1016\/j.cnsns.2009.10.012","volume":"15","author":"D Xiao","year":"2010","unstructured":"Xiao D, Shih FY, Liao XF (2010) A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simul 15:2254\u20132261","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"2158_CR44","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.physleta.2006.10.052","volume":"362","author":"J Zhang","year":"2007","unstructured":"Zhang J, Wang X, Zhang W (2007) Chaotic keyed hash function based on feedforward\u2013feedback nonlinear digital filter. Phys Lett A 362:439\u2013448","journal-title":"Phys Lett A"},{"key":"2158_CR45","doi-asserted-by":"crossref","first-page":"4006","DOI":"10.7498\/aps.54.4006","volume":"54","author":"H Zhang","year":"2005","unstructured":"Zhang H, Wang X, Li Z, Liu D (2005) One way hash function construction based on spatiotemporal chaos. Acta Phys Sin 54:4006\u20134011","journal-title":"Acta Phys Sin"},{"issue":"6","key":"2158_CR46","doi-asserted-by":"crossref","first-page":"060503","DOI":"10.1088\/1674-1056\/21\/6\/060503","volume":"21","author":"Y Luo","year":"2012","unstructured":"Luo Y, Du M (2012) One-way hash function construction based on the spatiotemporal chaotic system. Chin Phys B 21(6):060503","journal-title":"Chin Phys B"},{"key":"2158_CR47","volume-title":"Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks","author":"Y Li","year":"2011","unstructured":"Li Y, Qi X, Ren Z, Zhou G, Xiao D, Deng S (2011) Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks. IEEE IPCCC, Orlando"},{"key":"2158_CR48","volume-title":"Radiosense: Exploiting wireless communication patterns for body sensor network activity recognition","author":"X Qi","year":"2012","unstructured":"Qi X, Zhou G, Li Y, Peng G (2012) Radiosense: Exploiting wireless communication patterns for body sensor network activity recognition. IEEE RTSS, San Juan, Puerto Rico"},{"key":"2158_CR49","volume-title":"Storage-aware smartphone energy savings","author":"DT Nguyen","year":"2013","unstructured":"Nguyen DT, Zhou G, Qi X, Peng G, Zhao J, Nguyen T, Le D (2013) Storage-aware smartphone energy savings. ACM Ubicomp, Zurich"},{"key":"2158_CR50","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00530-013-0314-4","volume":"20","author":"B Norouzi","year":"2014","unstructured":"Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion process. Multimedia Syst 20:45\u201364","journal-title":"Multimedia Syst"},{"key":"2158_CR51","doi-asserted-by":"crossref","unstructured":"Lo NW, Chiang MC, Hsu CY (2015) Hash-based anonymous secure routing protocol in mobile ad hoc networks. IEEE Asia JCIS","DOI":"10.1109\/AsiaJCIS.2015.27"},{"key":"2158_CR52","doi-asserted-by":"crossref","first-page":"6","DOI":"10.3103\/S1066369X14020029","volume":"58","author":"BE Kanguzhin","year":"2014","unstructured":"Kanguzhin BE, Nurakhmetov DB, Tokmagambetov NE (2014) Laplace operator with \u03b4-like potentials. Russ Math 58:6\u201312","journal-title":"Russ Math"},{"key":"2158_CR53","doi-asserted-by":"crossref","first-page":"3835","DOI":"10.1142\/S0217979211102241","volume":"25","author":"Y Li","year":"2011","unstructured":"Li Y, Xiao D, Deng S (2011) Hash function construction based on the chaotic look-up table with changeable parameter. Int J Mod Phys B 25:3835\u20133851","journal-title":"Int J Mod Phys B"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-015-2158-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-015-2158-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-015-2158-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-015-2158-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T22:08:27Z","timestamp":1654034907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-015-2158-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,5]]},"references-count":53,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["2158"],"URL":"https:\/\/doi.org\/10.1007\/s00521-015-2158-7","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2016,1,5]]}}}