Abstract: Many chaos-based cryptosystems suffer from vulnerabilities and attacks arising from the numerical methods used in their design, which limits their ability to secure communications ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results