On the use of chaotic iterations to design keyed hash function

Zhuosheng Lin, Christophe Guyeux, Simin Yu, Qianxue Wang, Shuting Cai. On the use of chaotic iterations to design keyed hash function. Cluster Computing, 22(Suppl 1):905-919, 2019. [doi]

Authors

Zhuosheng Lin

This author has not been identified. Look up 'Zhuosheng Lin' in Google

Christophe Guyeux

This author has not been identified. Look up 'Christophe Guyeux' in Google

Simin Yu

This author has not been identified. Look up 'Simin Yu' in Google

Qianxue Wang

This author has not been identified. Look up 'Qianxue Wang' in Google

Shuting Cai

This author has not been identified. Look up 'Shuting Cai' in Google