{"id":"https://openalex.org/W2045637462","doi":"https://doi.org/10.1109/coginf.2008.4639189","title":"A Double-Piped iterated hash function based on a hybrid of chaotic maps","display_name":"A Double-Piped iterated hash function based on a hybrid of chaotic maps","publication_year":2008,"publication_date":"2008-08-01","ids":{"openalex":"https://openalex.org/W2045637462","doi":"https://doi.org/10.1109/coginf.2008.4639189","mag":"2045637462"},"language":"en","primary_location":{"id":"doi:10.1109/coginf.2008.4639189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/coginf.2008.4639189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 7th IEEE International Conference on Cognitive Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081340968","display_name":"Jun Peng","orcid":"https://orcid.org/0000-0001-6800-0064"},"institutions":[{"id":"https://openalex.org/I43522216","display_name":"California State University, Sacramento","ror":"https://ror.org/03e26wv14","country_code":"US","type":"education","lineage":["https://openalex.org/I43522216"]},{"id":"https://openalex.org/I168337820","display_name":"Chongqing University of Science and Technology","ror":"https://ror.org/03n3v6d52","country_code":"CN","type":"education","lineage":["https://openalex.org/I168337820"]}],"countries":["CN","US"],"is_corresponding":true,"raw_author_name":"Jun Peng","raw_affiliation_strings":["College of Electronic Information Engineering, Chongqing University of Science and Technology, 400050, China","College of Electronic Information Engineering, Chongqing University of Science and Technology, Chongqing, China","Department of Computer Science, California State University, Sacramento, CA, USA"],"affiliations":[{"raw_affiliation_string":"College of Electronic Information Engineering, Chongqing University of Science and Technology, 400050, China","institution_ids":["https://openalex.org/I168337820"]},{"raw_affiliation_string":"College of Electronic Information Engineering, Chongqing University of Science and Technology, Chongqing, China","institution_ids":["https://openalex.org/I168337820"]},{"raw_affiliation_string":"Department of Computer Science, California State University, Sacramento, CA, USA","institution_ids":["https://openalex.org/I43522216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100677748","display_name":"Du Zhang","orcid":"https://orcid.org/0000-0001-8921-5865"},"institutions":[{"id":"https://openalex.org/I43522216","display_name":"California State University, Sacramento","ror":"https://ror.org/03e26wv14","country_code":"US","type":"education","lineage":["https://openalex.org/I43522216"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Du Zhang","raw_affiliation_strings":["Department of Computer Science, California State University, Sacramento, 95819, USA","Department of Computer Science, California State University, Sacramento, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, California State University, Sacramento, 95819, USA","institution_ids":["https://openalex.org/I43522216"]},{"raw_affiliation_string":"Department of Computer Science, California State University, Sacramento, CA, USA","institution_ids":["https://openalex.org/I43522216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009444945","display_name":"Yongguo Liu","orcid":"https://orcid.org/0000-0002-4906-7025"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongguo Liu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China","School of Computer Science and Engineering, University of Electronic Science and Technology, Chengdu, China","National Laboratory on Machine Perception, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"National Laboratory on Machine Perception, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022342592","display_name":"Xiaofeng Liao","orcid":"https://orcid.org/0000-0002-3566-8161"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Liao","raw_affiliation_strings":["Department of Computer Science and Engineering, Chongqing University, 400044, China","Department of Computer Science and Engineering, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Chongqing University, 400044, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081340968"],"corresponding_institution_ids":["https://openalex.org/I168337820","https://openalex.org/I43522216"],"apc_list":null,"apc_paid":null,"fwci":2.4582,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89587867,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"358","last_page":"365"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8082446455955505},{"id":"https://openalex.org/keywords/iterated-function-system","display_name":"Iterated function system","score":0.6706788539886475},{"id":"https://openalex.org/keywords/collision-resistance","display_name":"Collision resistance","score":0.584892988204956},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5726898312568665},{"id":"https://openalex.org/keywords/iterated-function","display_name":"Iterated function","score":0.5707986354827881},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5562049150466919},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5488730669021606},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.5234983563423157},{"id":"https://openalex.org/keywords/piecewise-linear-function","display_name":"Piecewise linear function","score":0.48367056250572205},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4829075336456299},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.47495198249816895},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4722411334514618},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.4439135193824768},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42529892921447754},{"id":"https://openalex.org/keywords/piecewise","display_name":"Piecewise","score":0.41901493072509766},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38700348138809204},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3853764832019806},{"id":"https://openalex.org/keywords/attractor","display_name":"Attractor","score":0.20302152633666992},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09514322876930237},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.08813458681106567}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8082446455955505},{"id":"https://openalex.org/C168460219","wikidata":"https://www.wikidata.org/wiki/Q1502167","display_name":"Iterated function system","level":3,"score":0.6706788539886475},{"id":"https://openalex.org/C150909736","wikidata":"https://www.wikidata.org/wiki/Q1779448","display_name":"Collision resistance","level":5,"score":0.584892988204956},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5726898312568665},{"id":"https://openalex.org/C140479938","wikidata":"https://www.wikidata.org/wiki/Q5254619","display_name":"Iterated function","level":2,"score":0.5707986354827881},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5562049150466919},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5488730669021606},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.5234983563423157},{"id":"https://openalex.org/C17095337","wikidata":"https://www.wikidata.org/wiki/Q2375229","display_name":"Piecewise linear function","level":2,"score":0.48367056250572205},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4829075336456299},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.47495198249816895},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4722411334514618},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.4439135193824768},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42529892921447754},{"id":"https://openalex.org/C164660894","wikidata":"https://www.wikidata.org/wiki/Q2037833","display_name":"Piecewise","level":2,"score":0.41901493072509766},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38700348138809204},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3853764832019806},{"id":"https://openalex.org/C164380108","wikidata":"https://www.wikidata.org/wiki/Q507187","display_name":"Attractor","level":2,"score":0.20302152633666992},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09514322876930237},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.08813458681106567},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/coginf.2008.4639189","is_oa":false,"landing_page_url":"https://doi.org/10.1109/coginf.2008.4639189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 7th IEEE International Conference on Cognitive Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320324805","display_name":"Chongqing Municipal Education Commission","ror":"https://ror.org/031nm5713"},{"id":"https://openalex.org/F4320328771","display_name":"Chongqing University of Science and Technology","ror":"https://ror.org/03n3v6d52"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W182110259","https://openalex.org/W1497295307","https://openalex.org/W1600432225","https://openalex.org/W1660562555","https://openalex.org/W1968971721","https://openalex.org/W1970442252","https://openalex.org/W2001954559","https://openalex.org/W2009292729","https://openalex.org/W2015304581","https://openalex.org/W2020039621","https://openalex.org/W2027324336","https://openalex.org/W2032108249","https://openalex.org/W2033677146","https://openalex.org/W2034523001","https://openalex.org/W2086515950","https://openalex.org/W2093360411","https://openalex.org/W2094544665","https://openalex.org/W2109394932","https://openalex.org/W2113232764","https://openalex.org/W2129332069","https://openalex.org/W2131153956","https://openalex.org/W2132086212","https://openalex.org/W2133252868","https://openalex.org/W2152100192","https://openalex.org/W2152834677","https://openalex.org/W2161285277","https://openalex.org/W2285911715","https://openalex.org/W3031128223","https://openalex.org/W4241280476","https://openalex.org/W4289127653","https://openalex.org/W6629797494","https://openalex.org/W6679632256","https://openalex.org/W6679821486"],"related_works":["https://openalex.org/W3019245231","https://openalex.org/W1546067676","https://openalex.org/W3172393520","https://openalex.org/W2614794641","https://openalex.org/W2988738237","https://openalex.org/W155539136","https://openalex.org/W2604276146","https://openalex.org/W1974544592","https://openalex.org/W2951344700","https://openalex.org/W3084066038"],"abstract_inverted_index":{"A":[0],"novel":[1],"iterated":[2],"hash":[3,37],"function":[4,28,75],"based":[5],"on":[6],"Double-Pipe":[7],"structure":[8],"and":[9,16,61,66],"the":[10,45,50,74],"combination":[11],"of":[12,32,59],"Chebyshev":[13],"chaotic":[14,19],"map":[15,20],"piecewise":[17],"linear":[18],"(PWLCM)":[21],"is":[22],"described":[23],"in":[24],"this":[25],"paper.":[26],"This":[27],"encodes":[29],"a":[30,36,40,83],"message":[31],"arbitrary":[33],"length":[34],"into":[35],"value":[38],"with":[39],"fixed":[41],"128-bit":[42],"length.":[43],"For":[44],"proposed":[46],"function,":[47],"we":[48],"conduct":[49],"following":[51],"performance":[52],"analyses:":[53],"one-way":[54],"property":[55],"analysis,":[56],"statistic":[57],"analysis":[58,65],"diffusion":[60],"confusion,":[62],"attacks":[63],"resistance":[64],"key":[67],"space":[68],"analysis.":[69],"The":[70],"results":[71],"indicate":[72],"that":[73],"has":[76],"desirable":[77],"security":[78],"properties":[79],"which":[80],"make":[81],"it":[82],"suitable":[84],"choice":[85],"for":[86],"data":[87],"integrity":[88],"applications.":[89]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
