Login / Signup
Design and security analysis of two robust keyed hash functions based on chaotic neural networks.
Nabil Abdoun
Safwan El Assad
Olivier Déforges
Rima Assaf
Mohamad Khalil
Published in:
J. Ambient Intell. Humaniz. Comput. (2020)
Keyphrases
</>
security analysis
hash functions
software architecture
data mining
database
neural network
artificial neural networks
public key
encryption scheme
authentication protocol
chaotic neural network
high security