"On the use of chaotic iterations to design keyed hash function."

Zhuosheng Lin et al. (2019)

Details and statistics

DOI: 10.1007/S10586-017-1062-6

access: closed

type: Journal Article

metadata version: 2020-09-29

a service of  Schloss Dagstuhl - Leibniz Center for Informatics