Login / Signup

Design and security analysis of two robust keyed hash functions based on chaotic neural networks.

Nabil AbdounSafwan El AssadOlivier DéforgesRima AssafMohamad Khalil
Published in: J. Ambient Intell. Humaniz. Comput. (2020)
Keyphrases
  • security analysis
  • hash functions
  • software architecture
  • data mining
  • database
  • neural network
  • artificial neural networks
  • public key
  • encryption scheme
  • authentication protocol
  • chaotic neural network
  • high security