Archive > Volume 28 Issue 2 > 2005,28(2):74. DOI:10.11835/j.issn.1000-582X.2005.02.020 CSTR:[cstr] Prev Next

Cryptography of Combining Hardware and Software Based On Chaotic Algorithm