{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:48:36Z","timestamp":1725554916582},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344827"},{"type":"electronic","value":"9783540344834"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760191_49","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:00:36Z","timestamp":1147356036000},"page":"332-339","source":"Crossref","is-referenced-by-count":0,"title":["Combining RBF Neural Network and Chaotic Map to Construct Hash Function"],"prefix":"10.1007","author":[{"given":"Pengcheng","family":"Wei","sequence":"first","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huaqian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","volume-title":"Applied Cryptography","author":"B. Schneier","year":"2001","unstructured":"Schneier, B.: Applied Cryptography, 3rd edn. China Machine Press, Beijing (2001)","edition":"3"},{"key":"49_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-57500-6","volume-title":"Design of Hashing Algorithm","author":"J. Pieprzyh","year":"1993","unstructured":"Pieprzyh, J.: Design of Hashing Algorithm. Springer, Heidelberg (1993)"},{"issue":"6","key":"49_CR3","first-page":"273","volume":"52","author":"W. Xiaomin","year":"2003","unstructured":"Xiaomin, W., Jianhu, Z., Wenfang, Z.: One Way Hash Function Construction Based on the Extended Chaotic Maps Switch. Acta Physica Sinica\u00a052(6), 273\u2013275 (2003)","journal-title":"Acta Physica Sinica"},{"issue":"3","key":"49_CR4","first-page":"55","volume":"40","author":"L. Junning","year":"2000","unstructured":"Junning, L., Jiecheng, X., Pu, W.: One Way Hash Function Construction Based on Chaotic Mappings. J Tsinghua Univ.\u00a040(3), 55\u201358 (2000)","journal-title":"J Tsinghua Univ."},{"issue":"5","key":"49_CR5","first-page":"460","volume":"26","author":"L. Hongda","year":"2003","unstructured":"Hongda, L., Dengguo, F.: Composite Nonlinear Discrete Chaotic Dynamical Systems and Keyed Hash Functions. Chinese Journal of Computers\u00a026(5), 460\u2013465 (2003)","journal-title":"Chinese Journal of Computers"},{"issue":"8","key":"49_CR6","first-page":"620","volume":"49","author":"S. Tao","year":"2001","unstructured":"Tao, S., Ruli, W., Yixun, Y.: Generating Binary Bernoulli Sequences Based on a Class of Even-Symmetric Chaotic Maps. IEEE Tran. Communications\u00a049(8), 620\u2013623 (2001)","journal-title":"IEEE Tran. Communications"},{"issue":"4","key":"49_CR7","first-page":"73","volume":"24","author":"H. Guojie","year":"2003","unstructured":"Guojie, H., Zhengjin, F.: Theoretical Design for a Class of New Chaotic Stream Cipher. Communications Technology\u00a024(4), 73\u201374 (2003)","journal-title":"Communications Technology"},{"key":"49_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/978-3-540-28648-6_101","volume-title":"Advances in Neural Networks - ISNN 2004","author":"X. Di","year":"2004","unstructured":"Di, X., Xiaofeng, L.: A Combined Hash and Encryption Scheme by Chaotic Neural Network. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004. LNCS, vol.\u00a03174, pp. 633\u2013638. Springer, Heidelberg (2004)"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Di, X., Xiaofeng, L., Guoping, T., Chuandong, L.: Using Chebyshev Chaotic Map to Construct Infinite Length Hash Chains. In: 2004 International Conference on Communications Circuits and Systems, pp. 11\u201312 (2004)","DOI":"10.1109\/ICCCAS.2004.1345928"},{"issue":"10","key":"49_CR10","first-page":"292","volume":"307","author":"W. Kwok-Wo","year":"2003","unstructured":"Kwok-Wo, W.: A Combined Chaotic Cryptographic and Hashing Scheme. Physics Letters A\u00a0307(10), 292\u2013298 (2003)","journal-title":"Physics Letters A"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks - ISNN 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760191_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:35:57Z","timestamp":1558290957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760191_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344827","9783540344834"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11760191_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}