{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T12:52:29Z","timestamp":1771073549807,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319238289","type":"print"},{"value":"9783319238296","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23829-6_27","type":"book-chapter","created":{"date-parts":[[2015,11,7]],"date-time":"2015-11-07T11:06:53Z","timestamp":1446894413000},"page":"395-404","source":"Crossref","is-referenced-by-count":2,"title":["Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal Chaos"],"prefix":"10.1007","author":[{"given":"Yuling","family":"Luo","sequence":"first","affiliation":[]},{"given":"Junxiu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lvchen","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Jinjie","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Senhui","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,8]]},"reference":[{"key":"27_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., et al.: Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/3-540-38424-3_22","volume-title":"Advances in Cryptology - CRYPTO \u201890","author":"RL Rivest","year":"1991","unstructured":"Rivest, R.L.: The MD4 message digest algorithm. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 303\u2013311. Springer, Heidelberg (1991)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 message-digest algorithm. In: RFC 1321 (1992)","DOI":"10.17487\/rfc1321"},{"key":"27_CR4","unstructured":"Barreto, P.S.L.M., Rijmen, V.: The whirlpool hashing function. In: First open NESSIE Workshop, pp. 1\u201320 (2000)"},{"issue":"2\u20133","key":"27_CR5","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10623-010-9391-y","volume":"56","author":"P Barreto","year":"2010","unstructured":"Barreto, P., Nikov, V., Nikova, S., et al.: Whirlwind: a new cryptographic hash function. Des. Codes Crypt. 56 (2\u20133), 141\u2013162 (2010)","journal-title":"Des. Codes Crypt."},{"key":"27_CR6","unstructured":"Wang, X., Feng, D., Lai, X., Yu, H.: \u201cCollisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD\u201d, Cryptology ePrint Archive: Report, vol. 5, pp. 5\u20138 (2004)"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 1\u201318 (2005)","DOI":"10.1007\/11426639_1"},{"issue":"5","key":"27_CR8","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1088\/1674-1056\/17\/5\/025","volume":"17","author":"F Zheng","year":"2008","unstructured":"Zheng, F., Tian, X., Li, X., Wu, B.: Hash function based on the generalized Henon map. Chin. Phys. B 17 (5), 1685\u20131690 (2008)","journal-title":"Chin. Phys. B"},{"issue":"7","key":"27_CR9","doi-asserted-by":"publisher","first-page":"2388","DOI":"10.1088\/1674-1056\/17\/7\/011","volume":"17","author":"Q Yang","year":"2008","unstructured":"Yang, Q., Gao, T.: One-way hash function based on hyper-chaotic cellular neural network. Chin. Phys. B 17 (7), 2388\u20132393 (2008)","journal-title":"Chin. Phys. B"},{"issue":"10","key":"27_CR10","doi-asserted-by":"publisher","first-page":"3588","DOI":"10.1088\/1674-1056\/17\/10\/010","volume":"17","author":"M Long","year":"2008","unstructured":"Long, M., Peng, F., Chen, G.: Constructing a one-way hash function based on the unified chaotic system. Chin. Phys. B 17 (10), 3588\u20133595 (2008)","journal-title":"Chin. Phys. B"},{"issue":"10\u201312","key":"27_CR11","doi-asserted-by":"publisher","first-page":"2288","DOI":"10.1016\/j.neucom.2008.12.031","volume":"72","author":"D Xiao","year":"2009","unstructured":"Xiao, D., Liao, X., Wang, Y.: Parallel keyed hash function construction based on chaotic neural network. Neurocomputing 72 (10\u201312), 2288\u20132296 (2009)","journal-title":"Neurocomputing"},{"issue":"16\u201318","key":"27_CR12","doi-asserted-by":"publisher","first-page":"3224","DOI":"10.1016\/j.neucom.2010.05.011","volume":"73","author":"X Wang","year":"2010","unstructured":"Wang, X., Zhao, J.: Cryptanalysis on a parallel keyed hash function based on chaotic neural network. Neurocomputing 73 (16\u201318), 3224\u20133228 (2010)","journal-title":"Neurocomputing"},{"issue":"8","key":"27_CR13","doi-asserted-by":"publisher","first-page":"1305","DOI":"10.1007\/s00521-011-0543-4","volume":"20","author":"Y Li","year":"2011","unstructured":"Li, Y., Xiao, D., Deng, S., Han, Q., Zhou, G.: Parallel hash function construction based on chaotic maps with changeable parameters. Neural Comput. Appl. 20 (8), 1305\u20131312 (2011)","journal-title":"Neural Comput. Appl."},{"issue":"7","key":"27_CR14","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.1016\/j.cnsns.2010.10.001","volume":"16","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Wong, K.-W., Xiao, D.: Parallel hash function construction based on coupled map lattices. Commun. Nonlinear Sci. Numer. Simul. 16 (7), 2810\u20132821 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"5","key":"27_CR15","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1142\/S0218127405012806","volume":"15","author":"R Caponetto","year":"2005","unstructured":"Caponetto, R., Di Mauro, A., Fortuna, L., Frasca, M.: Field programmable analog arrays to implement programmable chua\u2019s circuit. Int. J. Bifurcat. Chaos 15 (5), 1829\u20131836 (2005)","journal-title":"Int. J. Bifurcat. Chaos"},{"issue":"8","key":"27_CR16","doi-asserted-by":"crossref","first-page":"4738","DOI":"10.7498\/aps.57.4738","volume":"57","author":"W Zhou","year":"2008","unstructured":"Zhou, W., Yu, S.: Design and implementation of chaotic generators based on IEEE-754 standard and field programmable gate array technology. Acta Physica Sinaca 57 (8), 4738\u20134747 (2008)","journal-title":"Acta Physica Sinaca"},{"issue":"1","key":"27_CR17","doi-asserted-by":"crossref","first-page":"113","DOI":"10.7498\/aps.58.113","volume":"58","author":"W Zhou","year":"2009","unstructured":"Zhou, W., Yu, S.: Chaotic digital communication system based on field programmable gate array technology - Design and implementation. Acta Physica Sinaca 58 (1), 113\u2013119 (2009)","journal-title":"Acta Physica Sinaca"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Luo, Y., Yu, S., Liu, J.: Design and implementation of image chaotic communication via FPGA embedded ethernet transmission. In: International Workshop on Chaos-Fractals Theories and Applications, pp. 148\u2013152 (2009)","DOI":"10.1109\/IWCFTA.2009.38"},{"issue":"6","key":"27_CR19","doi-asserted-by":"publisher","first-page":"060503","DOI":"10.1088\/1674-1056\/21\/6\/060503","volume":"21","author":"Y Luo","year":"2012","unstructured":"Luo, Y., Du, M.: One-way hash function construction based on the spatiotemporal chaotic system. Chin. Phys. B 21 (6), 060503\u2013060510 (2012)","journal-title":"Chin. Phys. B"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Nouri, M., Khezeli, A., Ramezani, A., Ebrahimi, A.: A dynamic chaotic hash function based upon circle chord methods. In: 6th International Symposium on Telecommunications (IST), pp. 1044\u20131049 (2012)","DOI":"10.1109\/ISTEL.2012.6483140"},{"issue":"6","key":"27_CR21","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSII.2005.848992","volume":"52","author":"X Yi","year":"2005","unstructured":"Yi, X.: Hash function based on chaotic tent maps. IEEE Trans. Circuits Syst. II Express Briefs 52 (6), 354\u2013357 (2005)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Deepakumara, J., Heys, H.M., Venkatesan, R.: FPGA Implementation of MD5 Hash Algorithm. In: Canadian Conference on Electrical and Computer Engineering, no. 81, pp. 919\u2013924 (2001)","DOI":"10.1109\/CCECE.2001.933564"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","International Conference on Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23829-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T10:26:14Z","timestamp":1748687174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23829-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238289","9783319238296"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23829-6_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}