{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T05:25:22Z","timestamp":1736918722170,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540370154"},{"type":"electronic","value":"9783540370178"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-37017-8_31","type":"book-chapter","created":{"date-parts":[[2007,3,7]],"date-time":"2007-03-07T21:11:25Z","timestamp":1173301885000},"page":"667-685","source":"Crossref","is-referenced-by-count":3,"title":["Application of Chaos-based Pseudo-Random-Bit Generators in Internet-based Online Payments"],"prefix":"10.1007","author":[{"given":"Ping","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Siegfried","family":"Fettinger","sequence":"additional","affiliation":[]},{"given":"Yaobing","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Wolfgang A.","family":"Halang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1_31","doi-asserted-by":"crossref","unstructured":"L. Kocarev, G. Jakimoski, T. Stojanovski, and Ulrich Parlitz. From chaotic maps to encryption schemes. In Proc. IEEE Int. Symposium Circuits and Systems 98: 4(514-517). IEEE, 1998.","DOI":"10.1109\/ISCAS.1998.698968"},{"key":"31_CR2_31","doi-asserted-by":"crossref","unstructured":"G. Alvarez, G. Pastor F. Monotoya, and M. Romera. Chaotic cryptosystems. In Proc. IEEE Int. Carnahan Conf. Security Technology, pages 332-338. IEEE, 1999.","DOI":"10.1109\/CCST.1999.797933"},{"issue":"3","key":"31_CR3_31","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"L. Kocarev. Chaos-based cryptography: A brief overview. IEEE Circuits and Systems Maganize, 1(3):6-21, 2001.","journal-title":"IEEE Circuits and Systems Maganize"},{"issue":"12","key":"31_CR4_31","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/TCSI.2001.972857","volume":"48","author":"F Dachselt","year":"2001","unstructured":"F. Dachselt and W. Schwarz. Chaos and cryptography. IEEE Trans. Circuits and Systems-I, 48(12):1498-1509, 2001.","journal-title":"IEEE Trans. Circuits and Systems-I"},{"key":"31_CR5_31","volume-title":"Analyses and new designs of digital chaotic ciphers","author":"SJ Li","year":"2003","unstructured":"S.J. Li, Analyses and new designs of digital chaotic ciphers, Ph.D. thesis, School of Electronics and Information Engineering, Xi'an Jiaotong University, Xi'an, China, 2003, available online at http:\/\/www.hooklee.com\/pub.html."},{"issue":"3","key":"31_CR6_31","first-page":"243-250","volume":"XIII","author":"DD Wheeler","year":"1989","unstructured":"D.D. Wheeler. Problems with chaotic cryptosystems. Cryptologia, XIII(3):243-250, 1989.","journal-title":"Cryptologia"},{"issue":"10","key":"31_CR7_31","doi-asserted-by":"publisher","first-page":"3063","DOI":"10.1142\/S0218127403008442","volume":"13","author":"SJ Li","year":"2003","unstructured":"S.J Li, X.Q. Mou, B.L. Yang, Z. Ji and J.H. Zhang, Problems with a Probabilistic Encryption Scheme based on Chaotic Systems, International Journal of Bifurcation and Chaos, vol. 13, no. 10, pp. 3063-3077, 2003","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"31_CR8_31","unstructured":"R. Forr\u00b4e. The H\u00b4enon attractor as a keystream generator. In Advances in Cryptology-EuroCrypt\u201991, Lecture Notes in Computer Science 0547, pages 76-81, Berlin, 1991. Spinger-Verlag."},{"issue":"1","key":"31_CR9_31","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1142\/S0218127497000145","volume":"7","author":"H Zhou","year":"1997","unstructured":"H. Zhou and X.T. Ling. Generating chaotic secure sequences with desired statistical properties and high security. Int. J. Bifurcation and Chaos, 7(1):205-213, 1997.","journal-title":"Int. J. Bifurcation and Chaos"},{"issue":"2","key":"31_CR10_31","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1080\/0161-119191865821","volume":"XV","author":"DD Wheeler","year":"1991","unstructured":"D. D. Wheeler and R. Matthews. Supercomputer investigations of a chaotic encryption algorithm. Cryptologia, XV(2):140-151, 1991.","journal-title":"Cryptologia"},{"key":"31_CR11_31","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-45311-3_30","volume":"2247","author":"SJ Li","year":"2001","unstructured":"S.J. Li, X.Q. Mou, and Y.L. Cai. Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography. Progress in Cryptology - INDOCRYPT 2001, Lecture Notes in Computer Science 2247:316-329. Springer-Verlag, Berlin, 2001.","journal-title":"Progress in Cryptology - INDOCRYPT 2001, Lecture Notes in Computer Science"},{"issue":"9","key":"31_CR12_31","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1049\/el:19980680","volume":"34","author":"T Sang","year":"1998","unstructured":"T. Sang, R.L. Wang and Y.X. Yan. Perturbance-based algorithm to expand cycle length of chaotic key stream. Electronics Letters, 34(9):873-874, 1998.","journal-title":"Electronics Letters"},{"issue":"20","key":"31_CR13_31","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1049\/el:19981377","volume":"34","author":"T Sang","year":"1998","unstructured":"T. Sang, R.L. Wang and Y.X. Yan. Clock-controlled chaotic keystream generators. Electronics Letters, 34(20):1932-1934, 1998.","journal-title":"Electronics Letters"},{"issue":"3","key":"31_CR14_31","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1063\/1.1772731","volume":"14","author":"HP Lu","year":"2004","unstructured":"H.P. Lu and S.H. Wang and X.W. Li and G.N. Tang and J.Y. Kuang and W.P. Ye and G. Hu, A new spatiotemporally chaotic cryptosystem and its security and performance analyses, Chaos, 14(3):617-629, 2004.","journal-title":"Chaos"},{"key":"31_CR15_31","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.physleta.2003.09.042","volume":"318","author":"G Tang","year":"2003","unstructured":"G. Tang, S. Wang, H. L\u00c4u, and G. Hu. Chaos-based cryptograph incorporated with S-box algebraic operation. Physics Letters A, 318:388-398, 2003.","journal-title":"Physics Letters A"},{"key":"31_CR16_31","unstructured":"K. Kaneko(ed.). Theory and Application of Coupled Map Lattices, chapter 1. John Wiley and Sons, 1993."},{"key":"31_CR17_31","unstructured":"A. Lasota and M.C. Mackey. Chaos, Fractals, and Noise: stochastic aspects of dynamics. Spinger-Verlag, 1997."},{"issue":"9","key":"31_CR18_31","doi-asserted-by":"publisher","first-page":"056209","DOI":"10.1103\/PhysRevE.65.056209","volume":"65","author":"AM Batista","year":"2002","unstructured":"A.M. Batista and S.E.S. Pinto and R.L. Viana and S.R. Lopes. Lyapunov spectrum and synchronization of piecewise linear map lattiecs with power-law coupling. Physical Review E, 65:056209(9), 2002.","journal-title":"Physical Review E"},{"key":"31_CR19_31","first-page":"127","volume-title":"Lecture Notes in Computer Science","author":"T Habutsu","year":"1991","unstructured":"T. Habutsu, Y. Nishio, I. Sasase, and S. Mori. A secret key cryptosystem by iterating a chaotic map. In D.W. Davies, editor, Lecture Notes in Computer Science, volume 547, pages127-140, Brighton, UK, April 1991. Advances in Cryptology - EUROCRYPT '91: Workshop on the Theory and Application of Cryptographic Techniques, Proceeding, Springer-Verlag, Heidelberg."},{"issue":"1","key":"31_CR20_31","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/81.974872","volume":"49","author":"N Masuda","year":"2002","unstructured":"N. Masuda and K. Aihara. Cryptosystems with discretized chaotic maps. IEEE Trans.Circuits and Systems-I, 49(1):28-40, 2002.","journal-title":"IEEE Trans.Circuits and Systems-I"},{"issue":"3","key":"31_CR21_31","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/81.557386","volume":"44","author":"H Zhou","year":"1997","unstructured":"H. Zhou and X.T. Ling. Problems with the chaotic inverse system encryption approach. IEEE Trans. Circuits and Systems-I, 44(3):268-271, 1997.","journal-title":"IEEE Trans. Circuits and Systems-I"},{"key":"31_CR22_31","first-page":"855","volume":"E76-B","author":"T Kohda","year":"1993","unstructured":"T. Kohda and A. Tsuneda. Pseudonoise sequence by chaotic nonlinear maps and their correlation properties. IEICE Trans. Commun., E76-B:855-862, 1993.","journal-title":"IEICE Trans. Commun."},{"issue":"17-19","key":"31_CR23_31","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1142\/S0217979204025798","volume":"18","author":"SH Wang","year":"2004","unstructured":"S.H. Wang, W.R. Liu, H.P. Lu, J.Y. Kuang, and G. Hu. Periodicity of chaotic trajectories in realizations of finite computer precisions and its implication in chaos communications. International Journal of Modern Physics. B, 18(17-19):2617-2622, 2004.","journal-title":"International Journal of Modern Physics. B"},{"issue":"4","key":"31_CR24_31","doi-asserted-by":"publisher","first-page":"4009","DOI":"10.1103\/PhysRevE.56.4009","volume":"6","author":"MZ Ding","year":"1997","unstructured":"M.Z. Ding and W.M. Yang. Stability of synchronous chaos and on-off intermittency in coupled map lattices. Physical Review E, 6(4):4009-4016, 1997.","journal-title":"Physical Review E"},{"key":"31_CR25_31","doi-asserted-by":"publisher","first-page":"4162","DOI":"10.1103\/PhysRevLett.77.4162","volume":"77","author":"J Xiao","year":"1996","unstructured":"J. Xiao, G. Hu, and Z. Qu. Synchronization of spatiotemporal chaos and its application to multichannel spread spectrum communication. Phys. Rev. Lett., 77:4162-4165, 1996.","journal-title":"Phys. Rev. Lett."},{"key":"31_CR26_31","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.physleta.2005.09.060","volume":"349","author":"P Li","year":"2006","unstructured":"P. Li, Z. Li, W.A. Halang and G.R. Chen, A Multiple Pseudorandom-Bit Generator Based on a Spatiotemporal Chaotic Map, Phys. Lett. A, 349:.467-473, 2006.","journal-title":"Phys. Lett. A"},{"key":"31_CR27_31","unstructured":"P. Li, Z. Li, W.A. Halang and G.R. Chen, Li-Yorke chaos in a spatiotemporal chaotic system, Chaos, Solitons, and Fractals, in press."},{"key":"31_CR28_31","doi-asserted-by":"crossref","unstructured":"A. Menezes, P.V. Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.","DOI":"10.1201\/9781439821916"}],"container-title":["Studies in Computational Intelligence","E-Service Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-37017-8_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T17:19:18Z","timestamp":1736875158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-37017-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540370154","9783540370178"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-37017-8_31","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2007]]}}}