Publication | Open Access
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations
97
Citations
14
References
2007
Year
Hardware SecurityEngineeringCryptanalytic AttackCryptographic TechnologyChaotic Encryption SchemesCryptosystemXor OperationsBlock CipherCircular Bit ShiftCryptographyCryptanalysis
| Year | Citations | |
|---|---|---|
Page 1
Page 1