{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T14:11:40Z","timestamp":1761487900042},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_30","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"318-331","source":"Crossref","is-referenced-by-count":17,"title":["Cryptanalysis of Cryptosystems based on Remote Chaos Replication"],"prefix":"10.1007","author":[{"given":"Th.","family":"Beth","sequence":"first","affiliation":[]},{"given":"D. E.","family":"Lazic","sequence":"additional","affiliation":[]},{"given":"A.","family":"Mathias","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"30_CR1","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1142\/S0218126693000356","volume":"3","author":"V. N. Belykh","year":"1993","unstructured":"Belykh, V. N., Verichev, N. N., Kocarev, Lj., and Chua, L. O., \u201cOn chaotic synchronization in a linear array of Chua\u2019s circuits\u201d, Journal of Circuits, Systems and Computers, Vol. 3, no. 2, pp. 579\u2013589, 1993.","journal-title":"Journal of Circuits, Systems and Computers"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Chua, L. O., Kocarev, Lj., Eckert, K., and Itoh, M., \u201cExperimental chaos synchronization in Chua\u2019s circuit\u201d, IBID, pp. 705\u2013708, 1992.","DOI":"10.1142\/S0218127492000811"},{"key":"30_CR3","unstructured":"Guckenheimer, L. and Holmes, P., Nonlinear Oscillations, Dynamical Systems and Bifurcations of Vector Fields, Applied Mathematical Sciences, Springer-Verlag, 1990."},{"issue":"3\u20134","key":"30_CR4","first-page":"66","volume":"46","author":"M. P. Kennedy","year":"1992","unstructured":"Kennedy, M. P., \u201cRobust op amp realization of Chua\u2019s circuit\u201d, Frequenz, Vol. 46, no. 3\u20134, pp. 66\u201380, 1992.","journal-title":"Frequenz"},{"issue":"3","key":"30_CR5","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1142\/S0218127492000823","volume":"2","author":"Lj. Kocarev","year":"1992","unstructured":"Kocarev, Lj., Halle, K. S., Eckert, K., Chua, L. O., and Parlitz, U., \u201cExperimental demonstration of secure communications via chaotic synchronization\u201d, International Journal of Bifurcation and Chaos, Vol. 2, no. 3, pp. 709\u2013713, 1992.","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"30_CR6","unstructured":"Lee, Y. W., Statistical Theory of Communication, John Wiley & Sons, 1964."},{"key":"30_CR7","first-page":"117","volume":"IV","author":"A. V. Oppenheim","year":"1992","unstructured":"Oppenheim, A. V., Wornell, G. W., Isabelle, S. H., and Cuomo, K. M., \u201cSignal processing in the context of chaotic signals\u201d, Proc. 1992 IEEE ICASSP, Vol. IV, pp. 117\u2013120, 1992.","journal-title":"Proc. 1992 IEEE ICASSP"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Parker, T. S. and Chua, L. O., Practical Numerical Algorithms for Chaotic Systems, Springer-Verlag, 1989.","DOI":"10.1007\/978-1-4612-3486-9"},{"issue":"8","key":"30_CR9","first-page":"821","volume":"64","author":"L. M. Pecora","year":"1990","unstructured":"Pecora, L. M. and Carroll, T. L., \u201cSynchronization in chaotic systems\u201d, Physical Review, Vol. 64, no. 8, pp. 821\u2013824, 1990.","journal-title":"Physical Review"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"2374","DOI":"10.1103\/PhysRevA.44.2374","volume":"44","author":"L. M. Pecora","year":"1991","unstructured":"Pecora, L. M. and Carroll, T. L., \u201cDriving system with chaotic signals\u201d, Physical Review, Vol. 44, no. 4, pp. 2374\u20132383, 1991.","journal-title":"Physical Review"},{"key":"30_CR11","first-page":"937","volume":"2","author":"U. Parlitz","year":"1992","unstructured":"Parlitz, U., Chua, L. O., Kocarev, Lj., Halle, K. S., and Shang, A., \u201cTransmission of digital signals by chaotic synchronization\u201d, International Journal of Bifurcation and Chaos, Vol. 2, no. 4, pp. 937\u2013977, 1992.","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Perko, L., Differential Equations and Dynamical Systems, Texts in Applied Mathematics, Springer-Verlag, 1991.","DOI":"10.1007\/978-1-4684-0392-3"},{"key":"30_CR13","volume-title":"Deterministic Chaos","author":"H. G. Schuster","year":"1989","unstructured":"Schuster, H. G., Deterministic Chaos, VCH, Germany, 1989."},{"key":"30_CR14","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"Shannon, C. E., \u201cCommunication theory of secrecy systems\u201d, Bell System Technical Journal, Vol. 28, pp. 656\u2013715, 1949.","journal-title":"Bell System Technical Journal"},{"key":"30_CR15","unstructured":"Shannon, C. E., \u201cAnalogue of the Vernam system for continuous time series\u201d, In Sloane, N. J. A. and Wyner, A. D., editors, Claude Elwood Shannon: Collected Papers, Memorandum MM 43-110-44, Bell Laboratories, 1943, pp. 144\u2013147, IEEE Press, 1993."},{"key":"30_CR16","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/BF03028244","volume":"1","author":"G. J. Simmons","year":"1979","unstructured":"Simmons, G. J., \u201cThe mathematics of secure communication\u201d, Math. Intell. 1, pp. 233\u2013246, 1979.","journal-title":"Math. Intell."},{"key":"30_CR17","first-page":"109","volume":"55","author":"G. S. Vernam","year":"1926","unstructured":"Vernam, G. S., \u201cCipher printing telegraph systems for secret wire and radio telegraphic communications\u201d, J. Am. Inst. Elec. Eng., Vol. 55, pp. 109\u2013115, 1926.","journal-title":"J. Am. Inst. Elec. Eng."},{"key":"30_CR18","volume-title":"Detection, Estimation and Modulation Theory","author":"H. L. Trees van","year":"1968","unstructured":"van Trees, H. L., Detection, Estimation and Modulation Theory, Number Part I, II and III, John Wiley and Sons, Inc., New York, 1968, 1971, 1971."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:16:15Z","timestamp":1605647775000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_30","relation":{},"subject":[]}}