[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

"On the use of chaotic iterations to design keyed hash function."

Zhuosheng Lin et al. (2019)

Details and statistics

DOI: 10.1007/S10586-017-1062-6

access: closed

type: Journal Article

metadata version: 2020-09-29