共 10 条
[2]
Chetto M, 2012, INT CONF INTERNET, P40
[3]
Confusion/diffusion capabilities of some robust hash functions
[J].
2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4,
2006,
:1188-1193
[4]
Design and Analyses of Efficient chaotic Generators for Crypto-Systems
[J].
WCECS 2008: ADVANCES IN ELECTRICAL AND ELECTRONICS ENGINEERING - IAENG SPECIAL EDITION OF THE WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, PROCEEDINGS,
2009,
:3-+
[5]
El Assad S., 2011, 6 IEEE INT C INT TEC
[9]
Matthews R., 1989, Cryptologia, V13, P29, DOI DOI 10.1080/0161-118991863745
[10]
Shtewi A.A., 2010, INT J COMPUTER SCI N, V10