News

The methodology is to use two rounds of encryption with two different pseudorandom ... The first part is based on iterating a recently proposed chaotic-based parallel keyed hash function which is used ...