{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:47:08Z","timestamp":1725482828971},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540449096"},{"type":"electronic","value":"9783540449102"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-44910-2_15","type":"book-chapter","created":{"date-parts":[[2007,4,17]],"date-time":"2007-04-17T21:04:30Z","timestamp":1176843870000},"page":"307-332","source":"Crossref","is-referenced-by-count":1,"title":["A Chip Performing Chaotic Stream Encryption"],"prefix":"10.1007","author":[{"given":"Yaobin","family":"Mao","sequence":"first","affiliation":[]},{"given":"Wenbo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wolfgang A.","family":"Halang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"15_CR1_Ref","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1142\/S021797929800051X","volume":"12","author":"M Andrecut","year":"1998","unstructured":"Andrecut M (1998) Logistic Map as a Random Number Generator. Int Journal of Modern Physics B 12 (9): 921-930","journal-title":"Int Journal of Modern Physics B"},{"key":"15_CR2_Ref","unstructured":"Ashenden JP (1997) The Designer \u2019s Guide to VHDL, 2nd edn. Morgan Kauf-mann Publishers"},{"key":"15_CR3_Ref","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/0375-9601(96)00179-X","volume":"214","author":"J Cern \u00e1k","year":"1996","unstructured":"Cern \u00e1k J (1996) Digital generators of chaos. Phys Lett A 214: 151-160","journal-title":"Phys Lett A"},{"key":"15_CR4_Ref","doi-asserted-by":"crossref","DOI":"10.1142\/3033","volume-title":"From Chaos to Order: Methodologies, Perspectives and Applications","author":"G Chen","year":"1998","unstructured":"Chen G, Dong X (1998) From Chaos to Order: Methodologies, Perspectives and Applications. World Scientific, Singapore"},{"key":"15_CR5_Ref","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/b79666","volume-title":"Chaos Control: Theory and Applications","author":"G Chen","year":"2003","unstructured":"Chen, G (2003) Chaotification via Feedback: the Discrete Case. In: Chen G, Yu X (eds) Chaos Control: Theory and Applications. Springer, Berlin Heidelberg New York, pp 159-177"},{"key":"15_CR6_Ref","volume-title":"Iterated Maps of the Interval as Dynamical Systems","author":"P Collet","year":"1980","unstructured":"Collet P, Eckmann J-P (1980) Iterated Maps of the Interval as Dynamical Systems. Birkh \u00e4user, Basel"},{"key":"15_CR7_Ref","volume-title":"An Introduction to Chaotic Dynamical Systems","author":"RL Devaney","year":"1989","unstructured":"Devaney RL (1989) An Introduction to Chaotic Dynamical Systems, 2nd edn. Addison-Wesley, Reading, MA","edition":"2"},{"issue":"6","key":"15_CR8_Ref","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric Ciphers based on Two-dimensional Chaotic Maps. Int J Bifurcation and Chaos 8(6): pp 1259-1284","journal-title":"Int J Bifurcation and Chaos"},{"key":"15_CR9_Ref","volume-title":"Shift Register Sequences","author":"SW Golomb","year":"1967","unstructured":"Golomb SW (1967) Shift Register Sequences. Holden-Day, San Francisco"},{"key":"15_CR10_Ref","unstructured":"Knuth DE (1998) The Art of Computer Programming, vol 2: Seminumerical Al- gorithms. Addison-Wesley"},{"key":"15_CR11_Ref","unstructured":"Kotulski Z, Szczepan\u02d8ski J (2000) On Constructive Approach to Chaotic Pseudo-random Number Generator. In: Proc Regional Conf on Military Communication and Information Systems, CIS Solutions for an Enlarged NATO, pp 191-203"},{"key":"15_CR12_Ref","unstructured":"Li S, Mou X, Cai Y (2006) Chaotic Crypography in Digital World: State-of-the-art, Problems and Solutions. \n                    http:\/\/www.hooklee.com"},{"key":"15_CR13_Ref","doi-asserted-by":"crossref","unstructured":"Mao Y, Chen G (2005) Chaos-based Image Encryption. In: Bayro E (ed) Hand-book of Computational Geometry for Pattern Recognition, Computer Vision, Neurocomputing and Robotics, Springer, pp 231-265","DOI":"10.1007\/3-540-28247-5_8"},{"issue":"1","key":"15_CR14_Ref","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/81.974872","volume":"49","author":"N Masuda","year":"2002","unstructured":"Masuda N, Aihara K (2002) Cryptosystems with Discretized Chaotic Maps. IEEE Trans Circuits and Systems-I 49(1): 28-40","journal-title":"IEEE Trans Circuits and Systems-I"},{"issue":"1","key":"15_CR15_Ref","first-page":"29","volume":"XIII","author":"R Matthews","year":"1989","unstructured":"Matthews R (1989) On the Derivation of a \u2018Chaotic\u2019 Encryption Algorithm. Cryp- tologia, XIII (1): 29-41","journal-title":"Cryp- tologia"},{"key":"15_CR16_Ref","unstructured":"National Institute of Standards and Technology (2001) Security Require- ments for Cryptographic Modules. FIPS PUB 140-2. \n                    http:\/\/csrc.nist.gov\/\n                    \n                   publications\/fips\/fips140- 2\/fips1402.pdf"},{"key":"15_CR17_Ref","unstructured":"Pichler F, Scharinger J (1995) Ciphering by Bernoulli-shifts in Finite Abelian groups. In: Kaiser HK, Muller WB, Pilz GF (eds) Contributions to General Al-gebra 9: 249-256"},{"key":"15_CR18_Ref","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/S0016-0032(00)00087-9","volume":"338","author":"R Schmitz","year":"2001","unstructured":"Schmitz R (2001) Use of Chaotic Dynamical Systems in Cryptography. J Franklin Institute 338: 429-441","journal-title":"J Franklin Institute"},{"key":"15_CR19_Ref","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1995","unstructured":"Schneier B (1995) Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York","edition":"2"},{"key":"15_CR20_Ref","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication Theory of Secrecy System. Bell System Tech- nical Journal 28: 656-715","journal-title":"Bell System Tech- nical Journal"},{"issue":"3","key":"15_CR21_Ref","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/81.915385","volume":"48","author":"T Stojanovski","year":"2001","unstructured":"Stojanovski T, Kocarev L (2001) Chaos-based Random Number Generators \u2014 Part I: Analysis. IEEE Trans Circuits and Systems I: Fundamental Theory and Applications 48 (3): 281-288","journal-title":"IEEE Trans Circuits and Systems I: Fundamental Theory and Applications"},{"issue":"3","key":"15_CR22_Ref","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1109\/81.915396","volume":"48","author":"T Stojanovski","year":"2001","unstructured":"Stojanovski T, Pihl J, Kocarev L (2001) Chaos-based Random Number Generators \u2014 Part II: Practical Realization. IEEE Trans Circuits and Systems I: Fundamental Theory and Applications 48 (3): 382-385","journal-title":"IEEE Trans Circuits and Systems I: Fundamental Theory and Applications"},{"key":"15_CR23_Ref","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1023\/A:1009652616706","volume":"7","author":"J Szczepanski","year":"2000","unstructured":"Szczepanski J, Kotulski Z (2000) Chaotic Pseudorandom Numbers Generators based on Chaotic Dynamical Systems. Open Sys And Information Dyn 7: 1-10","journal-title":"Open Sys And Information Dyn"},{"key":"15_CR24_Ref","doi-asserted-by":"crossref","unstructured":"Walters P (1982) An Introduction to Ergodic Theory. Springer","DOI":"10.1007\/978-1-4612-5775-2"}],"container-title":["Studies in Computational Intelligence","Contributions to Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-44910-2_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:37:26Z","timestamp":1620013046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-44910-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540449096","9783540449102"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-44910-2_15","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2007]]}}}