News
The methodology is to use two rounds of encryption with two different pseudorandom ... The first part is based on iterating a recently proposed chaotic-based parallel keyed hash function which is used ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results