Search alternatives:
multi target » multi targeting (Expand Search), multi agent (Expand Search)
Showing 1 - 2 results of 2 for search 'multi target encryption algorithm', query time: 0.03s Refine Results
  1. 1
  2. 2

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…<p>The non-linear property of Chaos is a promising approach to information security, and many accomplishments have been made by combining Chaos with several sub-security domains, including chaos-based stream ciphers, block ciphers, image encryption, and hash functions. Most Chaos-based hash functions are insecure or inefficient due to their dependence on complex, attacked multi-dimensional maps or uncertain, weak one-dimensional maps like logistic and tent. …”