0
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Design and security analysis of two robust keyed hash functions based on chaotic neural networks

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references1

          • Record: found
          • Abstract: not found
          • Book: not found

          Handbook of applied cryptography

          AJ Menezes (1996)
            Bookmark

            Author and article information

            Contributors
            Journal
            Journal of Ambient Intelligence and Humanized Computing
            J Ambient Intell Human Comput
            Springer Science and Business Media LLC
            1868-5137
            1868-5145
            May 2020
            February 22 2019
            May 2020
            : 11
            : 5
            : 2137-2161
            Article
            10.1007/s12652-019-01244-y
            e027c618-0429-4633-b534-46f6dcd37c66
            © 2020

            http://www.springer.com/tdm

            History

            Comments

            Comment on this article