Login / Signup

Suitability of chaotic iterations schemes using XORshift for security applications.

Jacques M. BahiXiaole FangChristophe GuyeuxQianxue Wang
Published in: J. Netw. Comput. Appl. (2014)
Keyphrases