Hashing technique based on SHA-3 using chaotic maps1
https://doi.org/10.37661/1816-0301-2020-17-1-109-118
Abstract
About the Authors
A. V. SidorenkoRussian Federation
Alevtina V. Sidorenko, Dr. Sci. (Eng.), Professor of Department of Physics and Aerospace Technology, Faculty of Radiophisics and Computer Technology
M. S. Shishko
Maksim S. Shishko, Postgraduate Student of Department of Physics and Aerospace Technology, Faculty of Radiophisics and Computer Technology
References
1. Bayindir L. A review of swarm robotics tasks. Neurocomputing, 2016, vol. 172, pp. 292–321.
2. Navarro I., Matia F. An introduction to swarm robotics. ISRN Robotics, 2013, vol. 2013, pp. 1–10.
3. Higgins F., Tomlinson A., Martin K. M. Survey on security challenges for swarm robotics. Fifth International Conference on Autonomic and Autonomous Systems, 20–25 April 2009, Valencia, Spain. Valencia, 2009, pp. 307–312.
4. Priyadarshini I. Cyber Security Risks in Robotics, 2017. Available at: https://www.researchgate.net/publication/319354229_Cyber_security_risks_in_Robotics (accessed 21.07.2019).
5. Shah R. Security Landscape for Robotics, 2019. Available at: https://arxiv.org/abs/1904.03033v1 (accessed 21.07.2019).
6. Nakamoto S. Bitcoin: a Peer-to-Peer Electronic Cash System, 2008, Available at: https://bitcoin.org/bitcoin.pdf (accessed 21.07.2019).
7. Lopes V., Alexandre L. A. An Overview of Blockchain Integration with Robotics and Artificial Intelligence, 2018. Available at: https://arxiv.org/abs/1810.00329v1 (accessed 21.07.2019).
8. Ferrer E. C. The Blockchain: a New Framework for Robotic Swarm Systems, 2017. Available at: https://arxiv.org/abs/1608.00695v4 (accessed 21.07.2019).
9. Chi L., Zhu X. Hashing techniques: a survey and taxonomy. ACM Computing Surveys, 2017, vol. 50, no. 1, pр. 1–36. https://doi.org/10.1145/3047307
10. Bertoni G., Daemen J., Peeters M., Assche van G. The Keccak Reference, 2011. Available at: https://keccak.team/files/Keccak-reference-3.0.pdf (accessed 21.07.2019).
Review
For citations:
Sidorenko A.V., Shishko M.S. Hashing technique based on SHA-3 using chaotic maps1. Informatics. 2020;17(1):109-118. (In Russ.) https://doi.org/10.37661/1816-0301-2020-17-1-109-118