• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Suitability of chaotic iterations schemes using XORshift for security applications.

Jacques M. BahiXiaole FangChristophe GuyeuxQianxue Wang
Published in: J. Netw. Comput. Appl. (2014)
Keyphrases