G Ye, K Jiao, C Pan, X Huang - Security and Communication …, 2018 - Wiley Online Library
In this paper, an effective framework for chaotic encryption based on a three‐dimensional
logistic map is presented together with secure hash algorithm‐3 (SHA‐3) and …