Search alternatives:
codings optimization » policy optimization (Expand Search), chimp optimization (Expand Search), dog optimization (Expand Search)
streams optimization » storage optimization (Expand Search), swarm optimization (Expand Search), ahead optimization (Expand Search)
data codings » data hiding (Expand Search)
binary data » binary rat (Expand Search)
codings optimization » policy optimization (Expand Search), chimp optimization (Expand Search), dog optimization (Expand Search)
streams optimization » storage optimization (Expand Search), swarm optimization (Expand Search), ahead optimization (Expand Search)
data codings » data hiding (Expand Search)
binary data » binary rat (Expand Search)
-
1
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”