On the use of chaotic iterations to design keyed hash function
Crossref DOI link: https://doi.org/10.1007/s10586-017-1062-6
Published Online: 2017-07-26
Published Print: 2019-01
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Lin, Zhuosheng
Guyeux, Christophe
Yu, Simin
Wang, Qianxue
Cai, Shuting
Text and Data Mining valid from 2017-07-26
Article History
Received: 2 May 2017
Revised: 12 July 2017
Accepted: 17 July 2017
First Online: 26 July 2017