On the use of chaotic iterations to design keyed hash function

Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang, Shuting Cai. On the use of chaotic iterations to design keyed hash function. Cluster Computing, 22(Suppl 1):905-919, 2019. [doi]

Abstract

Abstract is missing.