Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Cryptanalysis of a key agreement protocol based on chaotic Hash
Debiao He; Muhammad Khurram Khan
International Journal of Electronic Security and Digital Forensics (IJESDF), 2013 Vol.5 No.3/4, pp.172 - 177
9 + 12 =

Thank you for your feedback.