论文部分内容阅读
It is based on complexity that chaos can be used in secure communication. The chaos cryptology begins so short that some important problems are not solved yet. The security and performance of most chaos-based cipher algorithm can not be analyzed according
The is based on complexity that chaos can be used in secure communication. The chaos cryptology begins so short that some important problems are not solved yet. The security and performance of most chaos-based cipher algorithm can not be analyzed according