dc.contributor.author | El Assad, Safwan | |
dc.contributor.author | Abutaha, Mohammed | |
dc.contributor.author | Farajallah, Mousa | |
dc.contributor.author | Déforges, Olivier | |
dc.date.accessioned | 2020-12-09T09:22:53Z | |
dc.date.accessioned | 2022-05-22T08:27:57Z | |
dc.date.available | 2020-12-09T09:22:53Z | |
dc.date.available | 2022-05-22T08:27:57Z | |
dc.date.issued | 2017 | |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/7871 | |
dc.description.abstract | What is chaos? - How to generate it?chaos? How to generate it? - Chaos & Cryptography - Why using chaos to secure information? - Chaos--based cryptography *Design and realization of an efficient chaos--based stream cipher stream and performance evaluation *Design and realization of efficient an chaos--based cryptosystem and performance evaluation | |
dc.title | Chaos-based Cryptography an Emergent Technology |
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |