{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:06:38Z","timestamp":1743145598944,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319402529"},{"type":"electronic","value":"9783319402536"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40253-6_20","type":"book-chapter","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T19:00:31Z","timestamp":1467226831000},"page":"329-342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps"],"prefix":"10.1007","author":[{"given":"Xun","family":"Yi","sequence":"first","affiliation":[]},{"given":"Xuechao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Fengling","family":"Han","sequence":"additional","affiliation":[]},{"given":"Ron","family":"van Schyndel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,30]]},"reference":[{"issue":"2","key":"20_CR1","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.1016\/j.chaos.2009.02.044","volume":"42","author":"A Akhavan","year":"2009","unstructured":"Akhavan, A., Samsudin, A., Akhshani, A.: Hash function based on piecewise nonlinear chaotic map. Chaos Solitons Fract. 42(2), 1046\u20131053 (2009)","journal-title":"Chaos Solitons Fract."},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.physleta.2004.04.018","volume":"326","author":"G Alvarez","year":"2004","unstructured":"Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of dynamic look-up table based chaotic cryptosystems. Phys. Lett. A 326, 211\u2013218 (2004)","journal-title":"Phys. Lett. A"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.chaos.2009.02.001","volume":"42","author":"M Amin","year":"2009","unstructured":"Amin, M., Faragallah, O., El-Latif, A.: Chaos-based hash function (CBHF) for cryptographic applications. Chaos Solitons Fract. 42, 767\u2013772 (2009)","journal-title":"Chaos Solitons Fract."},{"issue":"1\/2","key":"20_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240(1\/2), 50\u201354 (1998)","journal-title":"Phys. Lett. A"},{"key":"20_CR5","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: The Keccak sponge function family. http:\/\/keccak.noekeon.org\/"},{"key":"20_CR6","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V., Keer, R.V.: Implementation overview version 3.2. http:\/\/keccak.noekeon.org\/Keccak-implementation-3.2.pdf"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"2306","DOI":"10.1016\/j.physleta.2009.04.056","volume":"373","author":"W Guo","year":"2009","unstructured":"Guo, W., Wang, X., He, D., Cao, Y.: Cryptanalysis on a parallel keyed hash function based on chaotic maps. Phys. Lett. A 373, 2306\u20133201 (2009)","journal-title":"Phys. Lett. A"},{"key":"20_CR8","unstructured":"Guo, X., Huang, S, Nazhandali, L., Schaumont, P.: Fair and comprehensive performance evaluation of 14 second round sha-3 ASIC implementations. In: NIST 2nd SHA-3 Candidate Conference (2010)"},{"issue":"1","key":"20_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.cnsns.2012.06.019","volume":"18","author":"A Kanso","year":"2013","unstructured":"Kanso, A., Ghebleh, M.: A fast and efficient chaos-based keyed hash function. Commun. Nonlinear Sci. Numer. Simul. 18(1), 109\u2013123 (2013)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"20_CR10","unstructured":"NIST Special Publication 800-22 rev1, A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications (2008)"},{"key":"20_CR11","unstructured":"NIST selects winner of secure hash algorithm (SHA-3) competition. http:\/\/www.nist.gov\/itl\/csd\/sha-100212.cfm"},{"issue":"4","key":"20_CR12","doi-asserted-by":"publisher","first-page":"2014","DOI":"10.1016\/j.chaos.2009.03.168","volume":"42","author":"H Ren","year":"2009","unstructured":"Ren, H., Wang, Y., Xie, Q., Yang, H.: A novel method for one-way hash function construction based on spatio temporal chaos. Chaos Solitons Fract. 42(4), 2014\u20132022 (2009)","journal-title":"Chaos Solitons Fract."},{"issue":"3","key":"20_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/81.915385","volume":"48","author":"T Stojanovski","year":"2001","unstructured":"Stojanovski, T., Kocarev, L.: Chaos-based random number generators - part I: analysis. IEEE Trans. Circu. Syst. I Fundam. Theor. Appl. 48(3), 281\u2013288 (2001)","journal-title":"IEEE Trans. Circu. Syst. I Fundam. Theor. Appl."},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/S0375-9601(02)01770-X","volume":"307","author":"KW Wong","year":"2003","unstructured":"Wong, K.W.: A combined chaotic cryptographic and hashing scheme. Phys. Lett. A 307, 292\u2013298 (2003)","journal-title":"Phys. Lett. A"},{"key":"20_CR15","doi-asserted-by":"publisher","first-page":"4682","DOI":"10.1016\/j.physleta.2008.04.060","volume":"372","author":"D Xiao","year":"2008","unstructured":"Xiao, D., Liao, X., Deng, S.: Parallel keyed hash function construction based on chaotic maps. Phys. Lett. A 372, 4682\u20134688 (2008)","journal-title":"Phys. Lett. A"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"1228","DOI":"10.1016\/j.physleta.2010.01.006","volume":"374","author":"D Xiao","year":"2010","unstructured":"Xiao, D., Peng, W., Liao, X., Xiang, T.: Collision analysis of one kind of chaos-based hash function. Phys. Lett. A 374, 1228\u20131231 (2010)","journal-title":"Phys. Lett. A"},{"issue":"6","key":"20_CR17","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSII.2005.848992","volume":"52","author":"X Yi","year":"2005","unstructured":"Yi, X.: Hash function based on chaotic tent maps. IEEE Trans. Circ. Syst. II Express Brief 52(6), 354\u2013357 (2005)","journal-title":"IEEE Trans. Circ. Syst. II Express Brief"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.physleta.2006.10.052","volume":"362","author":"J Zhang","year":"2007","unstructured":"Zhang, J., Wang, X., Zhang, W.: Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Phys. Lett. A 362, 439\u2013448 (2007)","journal-title":"Phys. Lett. A"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40253-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T04:49:54Z","timestamp":1608007794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40253-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319402529","9783319402536"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40253-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"30 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}