{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:47:10Z","timestamp":1725482830701},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540449096"},{"type":"electronic","value":"9783540449102"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-44910-2_14","type":"book-chapter","created":{"date-parts":[[2007,4,17]],"date-time":"2007-04-17T21:04:30Z","timestamp":1176843870000},"page":"285-306","source":"Crossref","is-referenced-by-count":0,"title":["Securing Communication by Chaos-based Encryption"],"prefix":"10.1007","author":[{"given":"Ping","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wolfgang A.","family":"Halang","sequence":"additional","affiliation":[]},{"given":"Guanrong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1_Ref","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1999","unstructured":"Baptista MS (1999) Cryptography with Chaos. Phys Lett A 240: 50-54","journal-title":"Phys Lett A"},{"issue":"6","key":"14_CR2_Ref","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1142\/S0218127495001198","volume":"5","author":"A Baranovsky","year":"1995","unstructured":"Baranovsky A, Daems D (1995) Design of One-dimensional Chaotic Maps with Prescribed Statistical Properties. Int J Bifurcation and Chaos 5 (6): 1585-1598","journal-title":"Int J Bifurcation and Chaos"},{"issue":"9","key":"14_CR3_Ref","doi-asserted-by":"publisher","first-page":"056209","DOI":"10.1103\/PhysRevE.65.056209","volume":"65","author":"AM Batista","year":"2002","unstructured":"Batista AM, de S. Pinto SE, Viana RL, Lopes SR (2002) Lyapunov Spectrum and Synchronization of Piecewise Linear Map Lattices with Power-law Coupling. Physical Review E, 65:056209(9)","journal-title":"Physical Review E"},{"key":"14_CR4_Ref","doi-asserted-by":"publisher","first-page":"045201","DOI":"10.1103\/PhysRevE.65.045201","volume":"65","author":"P Garcia","year":"2002","unstructured":"Garcia P, Parravano A, Cosenza MG, Jimenez J, Marcano A (2002) Coupled Map Networks as Communication Schemes. Physical Review E, 65:045201","journal-title":"Physical Review E"},{"key":"14_CR5_Ref","first-page":"127","volume":"547","author":"T Habutsu","year":"1991","unstructured":"Habutsu T, Nishio Y, Sasase I, Mori S (1991) A Secret Key Cryptosystem by Iter-ating a Chaotic Map. LNCS 547: 127-140","journal-title":"LNCS"},{"key":"14_CR6_Ref","unstructured":"Kaneko K (ed) (2003) Theory and Application of Coupled Map Lattices, Ch. 1. John Wiley and Sons"},{"issue":"3","key":"14_CR7_Ref","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev L (2001) Chaos-based Cryptography: A Brief Overview. IEEE Circuits and Systems Magazine 1 (3): 6-21","journal-title":"IEEE Circuits and Systems Magazine"},{"key":"14_CR8_Ref","first-page":"855","volume":"E76-B","author":"T Kohda","year":"1993","unstructured":"Kohda T, Tsuneda A (1993) Pseudonoise Sequence by Chaotic Nonlinear Maps and Their Correlation Properties. IEICE Trans Commun E76-B: 855-862","journal-title":"IEICE Trans Commun"},{"key":"14_CR9_Ref","volume-title":"Chaos, Fractals and Noise: Stochastic Aspects of Dynamics","author":"A Lasota","year":"1997","unstructured":"Lasota A, Mackey MC (1997) Chaos, Fractals and Noise: Stochastic Aspects of Dynamics. Springer, New York"},{"key":"14_CR10_Ref","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.physleta.2005.09.060","volume":"349","author":"P Li","year":"2006","unstructured":"Li P, Li Z, Halang WA, Chen GR (2006) A Multiple Pseudo-random-bit Generator based on a Spatiotemporal Chaotic Map. Phys Lett A 349: 467-473","journal-title":"Phys Lett A"},{"key":"14_CR11_Ref","doi-asserted-by":"crossref","unstructured":"Li P, Li Z, Halang WA, Chen GR (2006) Analysis of a Multiple Output Pseudo-random-bit Generator based on a Spatiotemporal Chaotic System. Int J Bifurca-tion and Chaos, 16 (10)","DOI":"10.1142\/S0218127406016574"},{"key":"14_CR12_Ref","doi-asserted-by":"crossref","unstructured":"Li P, Li Z, Halang WA, Chen GR (2006) A Stream Cipher based on a Spatiotem-poral Chaotic System. Chaos, Solitons and Fractals. To appear","DOI":"10.1142\/9789812774118_0022"},{"key":"14_CR13_Ref","unstructured":"Li SJ (2003) Analysis and New Designs of Digital Chaotic Ciphers. PhD thesis, School of Electronics and Information Engineering, Xi\u2019an Jiaotong University. http:\/\/www.hooklee.com\/pub.html"},{"key":"14_CR14_Ref","first-page":"316","volume":"2247","author":"SJ Li","year":"2001","unstructured":"Li SJ, Mou XQ, Cai YL (2001) Pseudo-random Bit Generator based on Coupled Chaotic Systems and its Application in Stream-ciphers Cryptography. LNCS 2247: 316-329","journal-title":"LNCS"},{"issue":"1","key":"14_CR15_Ref","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/S0010-4655(02)00875-5","volume":"153","author":"SJ Li","year":"2003","unstructured":"Li SJ, Mou XQ, Cai YL, Ji Z, Zhang JH (2003) On the Security of a Chaotic Encryp-tion Scheme: Problems with Computerized Chaos in Finite Computing Precision. Computer Physics Communications 153 (1): 52-58","journal-title":"Computer Physics Communications"},{"issue":"3","key":"14_CR16_Ref","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1063\/1.1772731","volume":"14","author":"HP Lu","year":"2004","unstructured":"Lu HP, Wang SH, Li XW, Tang GN, Kuang JY, Ye WP, Hu G (2004) A New Spa-tiotemporally Chaotic Cryptosystem and its Security and Performance Analyses. Chaos 14 (3): 617-629","journal-title":"Chaos"},{"key":"14_CR17_Ref","unstructured":"Luekepohl H (1998) Handbook of Matrices. John Wiley and Sons"},{"issue":"1","key":"14_CR18_Ref","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/81.974872","volume":"49","author":"N Masuda","year":"2002","unstructured":"Masuda N, Aihara K (2002) Cryptosystems with Discretized Chaotic Maps. IEEE Trans Circuits and Systems-I 49 (1): 28-40","journal-title":"IEEE Trans Circuits and Systems-I"},{"key":"14_CR19_Ref","unstructured":"National Institute of Standards and Technology (2001) Security Require- ments for Cryptographic Modules. FIPS PUB 140-2. http:\/\/csrc.nist.gov\/publications\/fips\/fips140- 2\/fips1402.pdf"},{"key":"14_CR20_Ref","unstructured":"Protopopescu VA, Santoro RT, JS Tollover (1995) Fast and Secure Encryp-tion\/Decryption Method based on Chaotic Dynamics. US Patent No 5479513"},{"key":"14_CR21_Ref","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1049\/el:19980680","volume":"34","author":"T Sang","year":"1998","unstructured":"Sang T, Wang R, Yan Y (1998) Perturbance-based Algorithm to Expand Cycle Length of Chaotic Key Stream. Electronics Letters 34: 873-874","journal-title":"Electronics Letters"},{"issue":"7","key":"14_CR22_Ref","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.1142\/S0218127497001230","volume":"7","author":"KM Short","year":"1997","unstructured":"Short KM (1997) Signal Extraction from Chaotic Communication. Int J Bifurca-tion and Chaos 7 (7): 1579-1597","journal-title":"Int J Bifurca-tion and Chaos"},{"key":"14_CR23_Ref","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.physleta.2003.09.042","volume":"318","author":"G Tang","year":"2003","unstructured":"Tang G, Wang S, Lu\u00a8 H, Hu G (2003) Chaos-based Cryptograph Incorporated with S-box Algebraic Operation. Phys Lett A 318: 388-398","journal-title":"Phys Lett A"},{"issue":"17-19","key":"14_CR24_Ref","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1142\/S0217979204025798","volume":"18","author":"SH Wang","year":"2004","unstructured":"Wang SH, Liu WR, Lu HP, Kuang JY, Hu G (2004) Periodicity of Chaotic Trajec-tories in Realizations of Finite Computer Precisions and its Implication in Chaos Communications. Int J of Modern Physics B 18 (17-19): 2617-2622","journal-title":"Int J of Modern Physics B"},{"issue":"3","key":"14_CR25_Ref","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1080\/0161-118991863934","volume":"XIII","author":"DD Wheeler","year":"1989","unstructured":"Wheeler DD (1989) Problems with Chaotic Cryptosystems. Cryptologia XIII (3): 243-250","journal-title":"Cryptologia"},{"issue":"2","key":"14_CR26_Ref","first-page":"81","volume":"2","author":"T Yang","year":"2004","unstructured":"Yang T (2004) A Survey of Chaotic Secure Communication Systems. Int J of Com-putational Cognition 2 (2): 81-130","journal-title":"Int J of Com-putational Cognition"},{"key":"14_CR27_Ref","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1016\/S0375-9601(98)00425-3","volume":"245","author":"T Yang","year":"1998","unstructured":"Yang T, Yang LB, Yang CM (1998) Cryptanalyzing Chaotic Secure Communica-tions Using Return Maps. Phys Lett A 245: pp 495-510","journal-title":"Phys Lett A"},{"key":"14_CR28_Ref","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1142\/S0218126602000379","volume":"11","author":"H Zhang","year":"2002","unstructured":"Zhang H, Wang H, Chen W (2002) Oversampled Chaotic Binary Sequences with Good Security. J Circuits, Systems and Computers 11: 173-185","journal-title":"J Circuits, Systems and Computers"},{"issue":"3","key":"14_CR29_Ref","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/81.557386","volume":"44","author":"H Zhou","year":"1997","unstructured":"Zhou H, Ling XT (1997) Problems with the Chaotic Inverse System Encryption Approach. IEEE Trans Circuits and Systems-I 44 (3): 268-271.","journal-title":"IEEE Trans Circuits and Systems-I"}],"container-title":["Studies in Computational Intelligence","Contributions to Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-44910-2_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:37:26Z","timestamp":1620013046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-44910-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540449096","9783540449102"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-44910-2_14","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2007]]}}}