{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:38:17Z","timestamp":1743125897816,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651712"},{"type":"electronic","value":"9783319651729"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65172-9_5","type":"book-chapter","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:38:54Z","timestamp":1501547934000},"page":"49-60","source":"Crossref","is-referenced-by-count":1,"title":["Memristor Based Chaotic Neural Network with Application in Nonlinear Cryptosystem"],"prefix":"10.1007","author":[{"given":"N. Varsha","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Sriharini","family":"Tumu","sequence":"additional","affiliation":[]},{"given":"A. Ruhan","family":"Bevi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,2]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Wang, L., Duan, M., Duan, S.: Memristive chebyshev neural network and its applications in function approximation. Mathe. Probl. Eng. 2013 (2013). Article ID 429402. doi:\n10.1155\/2013\/429402","DOI":"10.1155\/2013\/429402"},{"issue":"5","key":"5_CR2","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TCT.1971.1083337","volume":"18","author":"L Chua","year":"1971","unstructured":"Chua, L.: Memristor-the missing circuit element. IEEE Trans. Circuit Theory 18(5), 507\u2013519 (1971)","journal-title":"IEEE Trans. Circuit Theory"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Prodromakis, T., Toumazou, C.: A review on memristive devices and applications. In: 2010 17th IEEE International Conference on Electronics, Circuits, and Systems (ICECS). IEEE (2010)","DOI":"10.1109\/ICECS.2010.5724666"},{"issue":"7","key":"5_CR4","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1016\/j.neunet.2010.05.001","volume":"23","author":"YV Pershin","year":"2010","unstructured":"Pershin, Y.V., Di Ventra, M.: Experimental demonstration of associative memory with memristive neural networks. Neural Netw. 23(7), 881\u2013886 (2010)","journal-title":"Neural Netw."},{"issue":"1","key":"5_CR5","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"R Matthews","year":"1989","unstructured":"Matthews, R.: On the derivation of a encryption algorithm. Cryptologia 13(1), 29\u201342 (1989)","journal-title":"Cryptologia"},{"issue":"8","key":"5_CR6","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","volume":"64","author":"LM Pecora","year":"1990","unstructured":"Pecora, L.M., Carroll, T.L.: Synchronization in chaotic systems. Phys. Rev. Lett. 64(8), 821 (1990)","journal-title":"Phys. Rev. Lett."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Zhen, P., et al.: A survey of chaos-based cryptography. In: 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). IEEE (2014)","DOI":"10.1109\/3PGCIC.2014.69"},{"issue":"5","key":"5_CR8","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MCS.2013.2270410","volume":"33","author":"K-KK Kim","year":"2013","unstructured":"Kim, K.-K.K., et al.: Wiener\u2019s polynomial chaos for the analysis and control of nonlinear dynamical systems with probabilistic uncertainties [historical perspectives]. IEEE Control Syst. 33(5), 58\u201367 (2013)","journal-title":"IEEE Control Syst."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Wahab, H.B.A., Jaber, T.A.: Improve NTRU algorithm based on Chebyshev polynomial. In: 2015 World Congress on Information Technology and Computer Applications Congress (WCITCA). IEEE (2015)","DOI":"10.1109\/WCITCA.2015.7442633"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFb0034838","volume-title":"Advances in Cryptology \u2014 ASIACRYPT \u201996","author":"K Nyberg","year":"1996","unstructured":"Nyberg, K.: Generalized feistel networks. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 91\u2013104. Springer, Heidelberg (1996). doi:\n10.1007\/BFb0034838"},{"issue":"7","key":"5_CR11","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1016\/j.cnsns.2004.03.006","volume":"10","author":"NK Pareek","year":"2005","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10(7), 715\u2013723 (2005)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"06","key":"5_CR12","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(06), 1259\u20131284 (1998)","journal-title":"Int. J. Bifurcat. Chaos"},{"key":"5_CR13","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1016\/j.neucom.2015.03.018","volume":"166","author":"X Shi","year":"2015","unstructured":"Shi, X., et al.: A novel memristive electronic synapse-based Hermite chaotic neural network with application in cryptography. Neurocomputing 166, 487\u2013495 (2015)","journal-title":"Neurocomputing"}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65172-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T13:22:28Z","timestamp":1502198548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65172-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651712","9783319651729"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65172-9_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}