Journal of Information Processing Systems Search > Browse Articles > Search



310 Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Journal of Information Processing Systems. 2016;12(2):310-321.   Published online December 31, 2014
DOI: https://doi.org/10.3745/JIPS.03.0021
                              
310 Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map
Journal of Information Processing Systems. 2015;11(2):310-324.   Published online June 1, 2015
DOI: https://doi.org/10.3745/JIPS.02.0024
                              
1 |