{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:23Z","timestamp":1725548303697},"publisher-location":"Berlin, Heidelberg","reference-count":123,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_6","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"91-128","source":"Crossref","is-referenced-by-count":5,"title":["Chaos-Based Information Security"],"prefix":"10.1007","author":[{"given":"Jerzy","family":"Peja\u015b","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adrian","family":"Skrobek","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"S. Li: When chaos meets computers (2004), available at http:\/\/arxiv.org\/abs\/nlin\/0405038v3"},{"key":"6_CR2","unstructured":"S.\u00a0Li: Analyses and new designs of digital chaotic ciphers. Ph.D. Thesis (Xi\u2019an Jiaotong Unversity, Xi\u2019an 2005)"},{"issue":"12","key":"6_CR3","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/TCSI.2001.972857","volume":"48","author":"F. Dachselt","year":"2001","unstructured":"F.\u00a0Dachselt, W.\u00a0Schwarz: Chaos and cryptography, IEEE Trans. Circuits Syst. I 48(12), 1498\u20131509 (2001)","journal-title":"IEEE Trans. Circuits Syst. I"},{"issue":"6","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1695","DOI":"10.1109\/TCSI.2008.916555","volume":"55","author":"G. Mill\u00e9rioux","year":"2008","unstructured":"G.\u00a0Mill\u00e9rioux, J.M.\u00a0Amig\u00f3, J.\u00a0Daafouz: A connection between chaotic and conventional cryptography, IEEE Trans. Circuits Syst. I 55(6), 1695\u20131703 (2008)","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"6_CR5","first-page":"518","volume":"4","author":"F. Dachselt","year":"1998","unstructured":"F.\u00a0Dachselt, K.\u00a0Kelber, W.\u00a0Schwarz, J.\u00a0Vandewalle: Chaotic versus classical stream ciphers \u2013 a comparative study, IEEE Trans. Circuits Syst. 4, 518\u2013521 (1998)","journal-title":"IEEE Trans. Circuits Syst."},{"key":"6_CR6","unstructured":"N.H.\u00a0Ren\u00e9, G.\u00a0Gallagher: Multi-gigahertz encrypted communication using electro-optical chaos cryptography. Ph.D. Thesis (School of Electrical and Computer Engineering, Georgia Institute of Technology 2007)"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","volume":"64","author":"L.M. Pecora","year":"1990","unstructured":"L.M.\u00a0Pecora, T.L.\u00a0Carroll: Synchronization in chaotic systems, Phys. Rev. Lett. 64, 821\u2013824 (1990)","journal-title":"Phys. Rev. Lett."},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1109\/81.633877","volume":"44","author":"H. Nijmeijer","year":"1997","unstructured":"H.\u00a0Nijmeijer, I.M.Y.\u00a0Mareels: An observer looks at synchronization, IEEE Trans. Circuits Syst. I 44, 882\u2013890 (1997)","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/9.21099","volume":"34","author":"T.B. Flower","year":"1989","unstructured":"T.B.\u00a0Flower: Application of stochastic control techniques to chaotic nonlinear systems, IEEE Trans. Auto. Control 34, 201\u2013205 (1989)","journal-title":"IEEE Trans. Auto. Control"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1109\/81.948440","volume":"48","author":"H. Leung","year":"2001","unstructured":"H.\u00a0Leung, Z.\u00a0Zhu: Performance evaluation of EKF based chaotic synchronization, IEEE Trans. Circuits Syst. I 48, 1118\u20131125 (2001)","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J. Fridrich","year":"1998","unstructured":"J.\u00a0Fridrich: Symmetric ciphers based on two-dimensional chaotic maps, Int. J. Bifurc. Chaos 8, 1259\u20131284 (1998)","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"7","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.1142\/S0218127497001230","volume":"7","author":"K.M. Short","year":"1997","unstructured":"K.M.\u00a0Short: Signal extraction from chaotic communications, Int. J. Bifurc. Chaos 7(7), 1579\u20131597 (1997)","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"5","key":"6_CR13","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1109\/81.922466","volume":"48","author":"A.T. Parker","year":"2001","unstructured":"A.T.\u00a0Parker, K.M.\u00a0Short: Reconstructing the keystream from a chaotic encryption scheme, IEEE Trans. Circuits Syst. I 48(5), 624\u2013630 (2001)","journal-title":"IEEE Trans. Circuits Syst. I"},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/TCSI.2002.808207","volume":"50","author":"H. Guojie","year":"2003","unstructured":"H.\u00a0Guojie, F.\u00a0Zhengjin, M.\u00a0Ruiling: Chosen ciphertext attack on chaos communication based on chaotic synchronization, IEEE Trans. Circuits Syst. I 50(2), 275\u2013279 (2003)","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1016\/j.chaos.2006.01.051","volume":"33","author":"X. Wu","year":"2007","unstructured":"X.\u00a0Wu, Z.\u00a0Wang: Estimating parameters of chaotic systems synchronized by external driving signal, Chaos Solitons Fractals 33, 588\u2013594 (2007)","journal-title":"Chaos Solitons Fractals"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.physleta.2004.02.047","volume":"324","author":"L. Liu","year":"2004","unstructured":"L.\u00a0Liu, X.\u00a0Wu, H.\u00a0Hu: Estimating system parameters of Chua\u2019s circuit from synchronizing signal, Phys. Lett. A 324, 36\u201341 (2004)","journal-title":"Phys. Lett. A"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/S0960-0779(02)00377-6","volume":"17","author":"P.G. Vaidya","year":"2003","unstructured":"P.G.\u00a0Vaidya, S.\u00a0Angadi: Decoding chaotic cryptography without access to the superkey, Chaos Solitons Fractals 17, 379\u2013386 (2003)","journal-title":"Chaos Solitons Fractals"},{"key":"6_CR18","series-title":"Information and System Sciences Series","volume-title":"Optimal Filtering","author":"B.D.O. Anderson","year":"1979","unstructured":"B.D.O.\u00a0Anderson, J.B.\u00a0Moore: Optimal Filtering, Information and System Sciences Series (Prentice-Hall, Englewood Cliffs, NJ 1979)"},{"issue":"10","key":"6_CR19","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1109\/81.633891","volume":"44","author":"G. Grassi","year":"1997","unstructured":"G.\u00a0Grassi, S.\u00a0Mascolo: Nonlinear observer design to synchronize hyperchaotic systems via a scalar signal, IEEE Trans. Circuits Syst. 44(10), 1011\u20131014 (1997)","journal-title":"IEEE Trans. Circuits Syst."},{"issue":"5","key":"6_CR20","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1002\/(SICI)1097-007X(199609\/10)24:5<551::AID-CTA936>3.0.CO;2-H","volume":"24","author":"U. Feldmann","year":"1996","unstructured":"U.\u00a0Feldmann, M.\u00a0Hasler, W.\u00a0Schwarz: Communication by chaotic signals: the inverse system approach, Int. J. Circuit Theory Appl. 24(5), 551\u2013579 (1996)","journal-title":"Int. J. Circuit Theory Appl."},{"key":"6_CR21","unstructured":"K.\u00a0Kelber, W.\u00a0Schwarz: General design rules for chaos-based encryption systems, International Symposium on Nonlinear, Theory and its Applications (NOLTA2005) (2005)"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G. Alvarez","year":"2006","unstructured":"G.\u00a0Alvarez, S.\u00a0Li: Some basic cryptographic requirements for chaos-based cryptosystems, Int. J. Bifurc. Chaos 16, 2129\u20132151 (2006)","journal-title":"Int. J. Bifurc. Chaos"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"M.S. Baptista","year":"1998","unstructured":"M.S.\u00a0Baptista: Cryptography with chaos, Phys. Lett. A 240, 50\u201354 (1998)","journal-title":"Phys. Lett. A"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0375-9601(01)00609-0","volume":"289","author":"L. Kocarev","year":"2001","unstructured":"L.\u00a0Kocarev, G.\u00a0Jakimoski: Logistic map as a block encryption algorithm, Phys. Lett. A 289, 199\u2013206 (2001)","journal-title":"Phys. Lett. A"},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S0375-9601(03)00122-1","volume":"309","author":"N.K. Pareek","year":"2003","unstructured":"N.K.\u00a0Pareek, Vinod Patidar, K.K.\u00a0Sud: Discrete chaotic cryptography using external key, Phys. Lett. A 309, 75\u201382 (2003)","journal-title":"Phys. Lett. A"},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-46416-6_11","volume-title":"Advances in Cryptology \u2013 EuroCrypt\u201991","author":"T. Habutsu","year":"1991","unstructured":"T.\u00a0Habutsu, Y.\u00a0Nishio, I.\u00a0Sasase, S.\u00a0Mori: A secret key cryptosystem by iterating a chaotic map. In: Advances in Cryptology \u2013 EuroCrypt\u201991, Lecture Notes in Computer Science, Vol. 0547, ed. by D.W.\u00a0Davies (Springer, Berlin 1991) pp. 127\u2013140"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1007\/3-540-46416-6_49","volume-title":"Advances in Cryptology \u2013 EuroCrypt\u201991","author":"E. Biham","year":"1991","unstructured":"E.\u00a0Biham: Cryptoanalysis of the chaotic-map cryptosystem suggested at EuroCrypt\u201991. In: Advances in Cryptology \u2013 EuroCrypt\u201991, Lecture Notes in Computer Science, Vol. 0547, ed. by D.W.\u00a0Davies (Springer, Berlin 1991) pp. 532\u2013534"},{"issue":"6","key":"6_CR28","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/S0375-9601(01)00771-X","volume":"291","author":"G. Jakimoski","year":"2001","unstructured":"G.\u00a0Jakimoski, L.\u00a0Kocarev: Analysis of some recently proposed chaos-based encryption algorithms, Phys. Lett. A 291(6), 381\u2013384 (2001)","journal-title":"Phys. Lett. A"},{"key":"6_CR29","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/S0375-9601(02)01659-6","volume":"307","author":"S. Li","year":"2003","unstructured":"S.\u00a0Li, X.\u00a0Mou, Z.\u00a0Ji, J.\u00a0Zhang, Y.\u00a0Cai: Performance analysis of Jakimoski\u2013Kocarev attack on a class of chaotic cryptosystems, Phys. Lett. A 307, 22\u201328 (2003)","journal-title":"Phys. Lett. A"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/S0375-9601(03)00469-9","volume":"311","author":"G. \u00c1lvarez","year":"2003","unstructured":"G.\u00a0\u00c1lvarez, F.\u00a0Montoya, M.\u00a0Romera, G.\u00a0Pastor: Cryptanalysis of an ergodic chaotic cipher, Phys. Lett. A 311, 172\u2013179 (2003)","journal-title":"Phys. Lett. A"},{"key":"6_CR31","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.chaos.2004.02.008","volume":"22","author":"H. Hu","year":"2004","unstructured":"H.\u00a0Hu, X.\u00a0Wu, B.\u00a0Zhang: Parameter estimation only from the symbolic sequences generated by chaos system, Chaos Solitons Fractals 22, 359\u2013366 (2004)","journal-title":"Chaos Solitons Fractals"},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.physleta.2007.08.041","volume":"372","author":"A. Skrobek","year":"2008","unstructured":"A.\u00a0Skrobek: Approximation of chaotic orbit as a cryptanalytical method on Baptista\u2019s cipher, Phys. Lett. A 372, 849\u2013859 (2008)","journal-title":"Phys. Lett. A"},{"key":"6_CR33","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.physleta.2004.09.028","volume":"332","author":"S. Li","year":"2004","unstructured":"S.\u00a0Li, G.\u00a0Chen, K.-W.\u00a0Wong, X.\u00a0Mou, Y.\u00a0Cai: Baptista-type chaotic cryptosystems: problems and countermeasures, Phys. Lett. A 332, 368\u2013375 (2004)","journal-title":"Phys. Lett. A"},{"key":"6_CR34","unstructured":"S. Li, G. Chen, K.-W. Wong, X. Mou, C. Yuanlong: Problems of Baptista\u2019s chaotic cryptosystems and countermeasures for enhancement of their overall performances, CoRR, cs.CR\/0402004 (2004)"},{"key":"6_CR35","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/S0010-4655(01)00220-X","volume":"138","author":"W. Wong","year":"2001","unstructured":"W.\u00a0Wong, L.\u00a0Lee, K.\u00a0Wong: A modified chaotic cryptographic method, Comput. Phys. Commun. 138, 234\u2013236 (2001)","journal-title":"Comput. Phys. Commun."},{"key":"6_CR36","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/S0375-9601(02)00431-0","volume":"298","author":"K.W. Wong","year":"2002","unstructured":"K.W.\u00a0Wong: A fast chaotic cryptographic scheme with dynamic look-up table, Phys. Lett. A 298, 238\u2013242 (2002)","journal-title":"Phys. Lett. A"},{"key":"6_CR37","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/S0375-9601(02)01770-X","volume":"307","author":"K.W. Wong","year":"2003","unstructured":"K.W.\u00a0Wong: A combined chaotic cryptographic and hashing scheme, Phys. Lett. A 307, 292\u2013298 (2003)","journal-title":"Phys. Lett. A"},{"key":"6_CR38","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/S0375-9601(03)00259-7","volume":"310","author":"K.W. Wong","year":"2003","unstructured":"K.W.\u00a0Wong, S.W.\u00a0Ho, C.K.\u00a0Yung: A chaotic cryptography scheme for generating short ciphertext, Phys. Lett. A 310, 67\u201373 (2003)","journal-title":"Phys. Lett. A"},{"key":"6_CR39","first-page":"1893","volume":"298","author":"F. Huang","year":"2005","unstructured":"F.\u00a0Huang, Z.-H.\u00a0Guan: A modified method of a class of recently presented cryptosystems, Chaos Solitons Fractals 298, 1893\u20131899 (2005)","journal-title":"Chaos Solitons Fractals"},{"key":"6_CR40","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/S0010-4655(03)00432-6","volume":"156","author":"G. \u00c1lvarez","year":"2004","unstructured":"G.\u00a0\u00c1lvarez, F.\u00a0Montoya, M.\u00a0Romera, G.\u00a0Pastor: Keystream cryptanalysis of a chaotic cryptographic method, Comput. Phys. Commun. 156, 205\u2013207 (2004)","journal-title":"Comput. Phys. Commun."},{"key":"6_CR41","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.physleta.2004.04.018","volume":"326","author":"G. \u00c1lvarez","year":"2004","unstructured":"G.\u00a0\u00c1lvarez, F.\u00a0Montoya, M.\u00a0Romera, G.\u00a0Pastor: Cryptanalysis of dynamic look-up table based chaotic cryptosystems, Phys. Lett. A 326, 211\u2013218 (2004)","journal-title":"Phys. Lett. A"},{"key":"6_CR42","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1016\/S0375-9601(99)00747-1","volume":"263","author":"E. \u00c1lvarez","year":"1999","unstructured":"E.\u00a0\u00c1lvarez, A.\u00a0Fern\u00e1ndez, P.\u00a0Garc\u00eda, J.\u00a0Jim\u00e9nez, A.\u00a0Marcano: New approach to chaotic encryption, Phys. Lett. A 263, 373\u2013375 (1999)","journal-title":"Phys. Lett. A"},{"key":"6_CR43","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0375-9601(00)00642-3","volume":"276","author":"G. Alvarez","year":"2000","unstructured":"G.\u00a0Alvarez, F.\u00a0Montoya, M.\u00a0Romera, G.\u00a0Pastor: Cryptanalysis of a chaotic encryption system, Phys. Lett. A 276, 191\u2013196 (2000)","journal-title":"Phys. Lett. A"},{"issue":"3-4","key":"6_CR44","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0375-9601(01)00612-0","volume":"290","author":"S. Li","year":"2001","unstructured":"S.\u00a0Li, X.\u00a0Mou, Y.\u00a0Cai: Improving security of a chaotic encryption approach, Phys. Lett. A 290(3-4), 127\u2013133 (2001)","journal-title":"Phys. Lett. A"},{"key":"6_CR45","unstructured":"N.S. Philip, K.B. Joseph: Chaos for stream cipher, CoRR, cs.CR\/0102012 (2001)"},{"key":"6_CR46","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.physleta.2006.10.081","volume":"363","author":"A. Skrobek","year":"2007","unstructured":"A.\u00a0Skrobek: Cryptanalysis of chaotic stream cipher, Phys. Lett. A 363, 84\u201390 (2007)","journal-title":"Phys. Lett. A"},{"key":"6_CR47","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.physleta.2003.10.044","volume":"319","author":"G. \u00c1lvarez","year":"2003","unstructured":"G.\u00a0\u00c1lvarez, F.\u00a0Montoya, M.\u00a0Romera, G.\u00a0Pastor: Cryptanalysis of a discrete chaotic cryptosystem using external key, Phys. Lett. A 319, 334\u2013339 (2003)","journal-title":"Phys. Lett. A"},{"key":"6_CR48","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/j.cnsns.2004.03.006","volume":"10","author":"N.K. Pareek","year":"2005","unstructured":"N.K.\u00a0Pareek, V.\u00a0Patidar, K.K.\u00a0Sud: Cryptography using multiple one-dimensional chaotic maps, Commun. Nonlin. Sci. Numer. Simul. 10, 715\u2013723 (2005)","journal-title":"Commun. Nonlin. Sci. Numer. Simul."},{"key":"6_CR49","unstructured":"C. Li, S. Li, G. \u00c1lvarez, G. Chen, K.-T. Lo: Cryptanalysis of a chaotic block cipher with external key and its improved version, ArXiv Nonlinear Sciences e-prints (August 2006)"},{"key":"6_CR50","unstructured":"J.-C.\u00a0Yen, J.-I.\u00a0Guo: A new chaotic key based design for image encryption and decryption, Proceedings IEEE International Conference Circuits and Systems (2000)"},{"key":"6_CR51","series-title":"Proceedings of SPIE","first-page":"149","volume-title":"Real-Time Imaging VI","author":"S. Li","year":"2002","unstructured":"S.\u00a0Li, X.\u00a0Zheng, X.\u00a0Mou, Y.\u00a0Cai: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI, Proceedings of SPIE, Vol. 4666, ed. by N.\u00a0Kehtarnavaz (SPIE, Bellingham 2002) pp. 149\u2013160"},{"key":"6_CR52","unstructured":"T.\u00a0Zhou, X.\u00a0Liao, Y.\u00a0Chen: A novel symmetric cryptography based on chaotic signal generator and a\u00a0clipped neural network, ISNN (2) (2004) pp. 639\u2013644"},{"key":"6_CR53","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S. Lian","year":"2005","unstructured":"S.\u00a0Lian, J.\u00a0Sun, Z.\u00a0Wang: A block cipher based on a suitable use of the chaotic standard map, Chaos Solitons Fractals 26, 117\u2013129 (2005)","journal-title":"Chaos Solitons Fractals"},{"key":"6_CR54","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1016\/j.imavis.2007.09.005","volume":"26","author":"X. Tong","year":"2008","unstructured":"X.\u00a0Tong, M.\u00a0Cui: Image encryption with compound chaotic sequence cipher shifting dynamically, Image Vis. Comput. 26, 843\u2013850 (2008)","journal-title":"Image Vis. Comput."},{"key":"6_CR55","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S. Behnia","year":"2008","unstructured":"S.\u00a0Behnia, A.\u00a0Akhshani, H.\u00a0Mahmodi, A.\u00a0Akhavan: A novel algorithm for image encryption based on mixture of chaotic maps, Chaos Solitons Fractals 35, 408\u2013419 (2008)","journal-title":"Chaos Solitons Fractals"},{"key":"6_CR56","unstructured":"K.M. Roskin, J.B. Casper: From chaos to cryptography, available at http:\/\/xcrypt.theory.org\/ (1998)"},{"key":"6_CR57","unstructured":"G. Alvarez, S. Li: Cryptographic requirements for chaotic secure communications, ArXiv Nonlinear Sciences e-prints (2003)"},{"key":"6_CR58","unstructured":"P. Cvitanovic: Classical and quantum chaos, version 7.0.1, available at http:\/\/www.nbi.dk\/ChaosBook (Niels Bohr Institute, August 2000)"},{"key":"6_CR59","volume-title":"An Introduction to Chaotic Dynamical Systems","author":"R.L. Devaney","year":"2003","unstructured":"R.L.\u00a0Devaney: An Introduction to Chaotic Dynamical Systems, 2nd edn. (Westview Press, Boulder 2003)","edition":"2"},{"key":"6_CR60","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511754050","volume-title":"Nonlinear Dynamics: a Primer","author":"A. Medino","year":"2001","unstructured":"A.\u00a0Medino, M.\u00a0Lines: Nonlinear Dynamics: a\u00a0Primer (Cambridge University Press, Cambridge 2001)"},{"key":"6_CR61","volume-title":"Chaos in Dynamical Systems","author":"E. Ott","year":"1993","unstructured":"E.\u00a0Ott: Chaos in Dynamical Systems (Cambridge University Press, Cambridge 1993)"},{"key":"6_CR62","volume-title":"Fractals for the Classroom","author":"H.-O. Peitgen","year":"1992","unstructured":"H.-O.\u00a0Peitgen, H.\u00a0Jurgens, D.\u00a0Saupe: Fractals for the Classroom (Springer, New York 1992)"},{"key":"6_CR63","volume-title":"Statistical Mechanics: Entropy, Order Parameters and Complexity","author":"J.P. Sethna","year":"2006","unstructured":"J.P.\u00a0Sethna: Statistical Mechanics: Entropy, Order Parameters and Complexity (Oxford University Press, Oxford 2006)"},{"key":"6_CR64","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1142\/S021812740100305X","volume":"11","author":"J.C. Sprott","year":"2001","unstructured":"J.C.\u00a0Sprott, G.\u00a0Rowlands: Improved correlation dimension calculation, Int. J. Bifurc. Chaos 11, 1865\u20131880 (2001)","journal-title":"Int. J. Bifurc. Chaos"},{"key":"6_CR65","unstructured":"Z. Kotulski, J. Szczepa\u00f1ski, K. G\u00f3rski, A. G\u00f3rska, A.\u00a0Paszkiewicz: On constructive approach to chaotic pseudorandom number generators, CIS Solutions for an enlarged NATO (RCMIS, 2000)"},{"issue":"2","key":"6_CR66","first-page":"21","volume":"3","author":"Q. Xu","year":"2004","unstructured":"Q.\u00a0Xu, S.\u00a0Dai, W.\u00a0Pei, L.\u00a0Yang, Z.\u00a0He: A chaotic map based on scaling transformation of nonlinear function, Neural Inf. Process. Lett. Rev. 3(2), 21\u201329 (2004)","journal-title":"Neural Inf. Process. Lett. Rev."},{"key":"6_CR67","doi-asserted-by":"crossref","unstructured":"J.A. Gonzalez, A.J. Moreno, L.E. Guerrero: Non-invertible transformations and spatiotemporal randomness (2006)","DOI":"10.1142\/S0218127406016859"},{"key":"6_CR68","first-page":"9","volume":"2","author":"H. Zhou","year":"1997","unstructured":"H.\u00a0Zhou, X.-T.\u00a0Ling, J.\u00a0Yu: Secure communication via one-dimensional chaotic inverse systems, IEEE Int. Sympos. Circuits Syst. 2, 9\u201312 (1997)","journal-title":"IEEE Int. Sympos. Circuits Syst."},{"key":"6_CR69","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/S0016-0032(00)00087-9","volume":"338","author":"R. Schmitz","year":"2001","unstructured":"R.\u00a0Schmitz: Use of chaotic dynamical systems in cryptography, J. Franklin Inst. 338, 429\u2013441 (2001)","journal-title":"J. Franklin Inst."},{"key":"6_CR70","series-title":"Lecture Notes in Computer Science","first-page":"316","volume-title":"INDOCRYPT 2001","author":"S. Li","year":"2001","unstructured":"S.\u00a0Li, X.\u00a0Mou, Y.\u00a0Cai: Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography. In: INDOCRYPT 2001, Lecture Notes in Computer Science, Vol. 2247, ed. by C.\u00a0Pandu Rangan, C.\u00a0Ding (Springer, Berlin 2001) pp. 316\u2013329"},{"key":"6_CR71","unstructured":"T. Hiraoka, Y. Nishio: Analysis of a cryptosystem using a chaotic map extended to two dimensions, International Workshop on Nonlinear Circuit and Signal Processing (2004)"},{"key":"6_CR72","unstructured":"G.\u00a0Alvarez, F.\u00a0Montoya, M.\u00a0Romera, G.\u00a0Pastor: Cryptanalytic methods in chaotic cryptosystems, International Conference on Information Systems, Analysis and Synthesis (2001)"},{"key":"6_CR73","unstructured":"M.J.B. Robshaw: Stream ciphers, technical Report TR-701 (RSA Labs, July 1994)"},{"key":"6_CR74","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"A.\u00a0Menezes, P.\u00a0van Oorschot, S.\u00a0Vanstone: Handbook of Applied Cryptography (CRC Press, Boca Raton 1997)"},{"key":"6_CR75","volume-title":"Stream Ciphers and Number Theory","author":"T.W. Cusick","year":"1998","unstructured":"T.W.\u00a0Cusick, C.\u00a0Ding, A.\u00a0Renvall: Stream Ciphers and Number Theory (Elsevier, Amsterdam 1998)"},{"key":"6_CR76","volume-title":"Randomized encryption techniques","author":"R.L. Rivest","year":"1983","unstructured":"R.L. Rivest, A.T. Sherman: Randomized encryption techniques, technical report MIT\/LCS\/TM-234 (Massachusetts Institute of Technology, Laboratory for Computer Science, Cambridge, MA, USA, 1983)"},{"key":"6_CR77","unstructured":"V. Poulin, H. Touchette: On a generalization of the logistic map (2000)"},{"key":"6_CR78","volume-title":"Practical Cryptography","author":"N. Ferguson","year":"2003","unstructured":"N.\u00a0Ferguson, B.\u00a0Schneier: Practical Cryptography (John Wiley and Sons, New York 2003)"},{"key":"6_CR79","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"B.\u00a0Schneier: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. (John Wiley and Sons, New York 1996)","edition":"2"},{"key":"6_CR80","unstructured":"A. Rukhin et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22, 2002"},{"key":"6_CR81","unstructured":"G. Rose, P. Hawkes: On the applicability of distinguishing attacks against stream ciphers, Cryptology ePrint Archive, Report 2002\/142 (2002)"},{"key":"6_CR82","unstructured":"J. Daemen, P. Kitsos: Submission to encrypt call for stream ciphers: the self-synchronizing stream cipher mosquito (2005)"},{"key":"6_CR83","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-540-39887-5_23","volume-title":"Fast Software Encryption (FSE\u201903)","author":"M. Boesgaard","year":"2003","unstructured":"M.\u00a0Boesgaard, M.\u00a0Vesterager, T.\u00a0Pedersen, J.\u00a0Christiansen, O.\u00a0Scavenius: Rabbit: A new high-performance stream cipher. In: Fast Software Encryption (FSE\u201903), Lecture Notes in Computer Science, Vol. 2887, ed. by T.\u00a0Johansson (Springer, Berlin 2003) pp. 307\u2013329"},{"key":"6_CR84","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/11535409","volume-title":"Fast Software Encryption (FSE\u201904)","author":"H. Wu","year":"2005","unstructured":"H.\u00a0Wu: A new stream cipher hC-256. In: Fast Software Encryption (FSE\u201904), Lecture Notes in Computer Science, Vol. 3017, ed. by B.\u00a0Roy, W.\u00a0Meier (Springer, Berlin 2005), 226\u2013244"},{"key":"6_CR85","unstructured":"L. An-Ping: A new stream cipher: Dicing, Cryptology ePrint Archive ( http:\/\/eprint.iacr.org\/ ), Report 2006\/354 (2006)"},{"key":"6_CR86","unstructured":"S. Wang, H. Lv, G. Hu: A new self-synchronizing stream cipher (2005)"},{"key":"6_CR87","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/11496618_5","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"K. Chen","year":"2005","unstructured":"K.\u00a0Chen, M.\u00a0Henricksen, W.\u00a0Millan, J.\u00a0Fuller, L.\u00a0Simpson, E.\u00a0Dawson, H.\u00a0Lee, S.\u00a0Moon: Dragon: A fast word based stream cipher. In: Information Security and Cryptology \u2013 ICISC 2004, Lecture Notes in Computer Science, Vol. 3506, ed. by C.\u00a0Park, S.\u00a0Chee (Springer, Berlin 2005) pp. 33\u201350"},{"key":"6_CR88","unstructured":"A. Biryukov: A new 128-bit key stream cipher LEX, Katholieke Universiteit Leuven, Dept. ESAT\/SCD-COSIC, Kasteelpark Arenberg, Heverlee, Belgium"},{"key":"6_CR89","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.physleta.2005.02.083","volume":"349","author":"T. Xiang","year":"2006","unstructured":"T.\u00a0Xiang, X.\u00a0Liao, G.\u00a0Tang, Y.\u00a0Chen, K.-W.\u00a0Wong: A novel block cryptosystem based on iterating a\u00a0chaotic map, Phys. Lett. A 349, 109\u2013115 (2006)","journal-title":"Phys. Lett. A"},{"key":"6_CR90","unstructured":"Z.\u00a0Kotulski, J.\u00a0Szczepa\u00f1ski: On the application of discrete chaotic dynamical systems to cryptography. DCC method, Biuletyn WAT, Rok XLVIII 10(566), 111\u2013123 (1999)"},{"key":"6_CR91","doi-asserted-by":"crossref","unstructured":"B. Preneel et al.: New trends in cryptology, technical report, STORK (2003)","DOI":"10.1007\/978-3-322-84982-3_5"},{"issue":"3","key":"6_CR92","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L. Kocarev","year":"2001","unstructured":"L.\u00a0Kocarev: Chaos-based cryptography: a brief overview, IEEE Circuits Syst. Mag. 1(3), 6\u201321 (2001)","journal-title":"IEEE Circuits Syst. Mag."},{"key":"6_CR93","volume-title":"A study on the construction and analysis of substitution boxes for symmetric cryptosystems","author":"K. Kwangjo","year":"1990","unstructured":"K.\u00a0Kwangjo: A study on the construction and analysis of substitution boxes for symmetric cryptosystems. Ph.D. Thesis (Division of Electrical and Computer Engineering of Yokohama National University, Yokohama 1990)"},{"key":"6_CR94","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"C.E.\u00a0Shannon: Communication theory of secrecy systems, Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"issue":"6","key":"6_CR95","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1109\/TCSI.2006.874181","volume":"53","author":"L. Kocarev","year":"2006","unstructured":"L.\u00a0Kocarev, J.\u00a0Szczepanski, J.M.\u00a0Amigo, I.\u00a0Tomovski: Discrete chaos \u2013 I: theory, IEEE Trans. Circuits Syst. I 53(6), 1300\u20131309 (2006)","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"6_CR96","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/S0375-9601(02)00382-1","volume":"298","author":"P. Garc\u00eda","year":"2002","unstructured":"P.\u00a0Garc\u00eda, J.\u00a0Jim\u00e9nez: Communication through chaotic map systems, Phys. Lett. A 298, 35\u201340 (2002)","journal-title":"Phys. Lett. A"},{"key":"6_CR97","volume-title":"Cellular Automata and Cooperative Phenomena","author":"H. Gutowitz","year":"1993","unstructured":"H.\u00a0Gutowitz: Cryptography with dynamical systems. In: Cellular Automata and Cooperative Phenomena, ed. by E.\u00a0Goles, N.\u00a0Boccara (Kluwer Academic Press, Boston 1993)"},{"key":"6_CR98","unstructured":"IA-32 Intel Architecture Software Developer\u2019s Manual, Volume 1: Basic Architecture, Intel, Order Number: 253665-015 (April 2005)"},{"issue":"1","key":"6_CR99","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/TCSI.2002.804549","volume":"50","author":"G. Jakimoski","year":"2003","unstructured":"G.\u00a0Jakimoski, L.\u00a0Kocarev: Differential and linear probabilities of a block-encryption cipher, IEEE Trans. Circuits Syst. I 50(1), 121\u2013123 (2003)","journal-title":"IEEE Trans. Circuits Syst. I"},{"issue":"2","key":"6_CR100","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G. Jakimoski","year":"2001","unstructured":"G.\u00a0Jakimoski, L.\u00a0Kocarev: Chaos and cryptography: block encryption ciphers based on chaotic maps, IEEE Trans. Circuits Syst. I 48(2), 163\u2013169 (2001)","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"6_CR101","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.physleta.2003.09.042","volume":"318","author":"G. Tang","year":"2003","unstructured":"G.\u00a0Tang, S.\u00a0Wang, H.\u00a0L\u00fc, G.\u00a0Hu: Chaos-based cryptograph incorporated with S-box algebraic operation, Phys. Lett. A 318, 388\u2013398 (2003)","journal-title":"Phys. Lett. A"},{"key":"6_CR102","doi-asserted-by":"publisher","first-page":"066210","DOI":"10.1103\/PhysRevE.69.066210","volume":"69","author":"S.-J. Baek","year":"2004","unstructured":"S.-J.\u00a0Baek, E.\u00a0Ott: Onset of synchronization in systems of globally coupled chaotic maps, Phys. Rev. E 69, 066210 (2004)","journal-title":"Phys. Rev. E"},{"key":"6_CR103","doi-asserted-by":"publisher","first-page":"2745","DOI":"10.1142\/S0218127497001850","volume":"7","author":"R. Carretero-Gonzalez","year":"1997","unstructured":"R.\u00a0Carretero-Gonzalez: Low dimensional travelling interfaces in coupled map lattices, Int. J. Bifurc. Chaos 7, 2745 (1997)","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"6","key":"6_CR104","doi-asserted-by":"publisher","first-page":"065202","DOI":"10.1103\/PhysRevE.66.065202","volume":"66","author":"S. Wang","year":"2002","unstructured":"S.\u00a0Wang, J.\u00a0Kuang, J.\u00a0Li, Y.\u00a0Luo, H.\u00a0Lu, G.\u00a0Hu: Chaos-based secure communications in a large community, Phys. Rev. E 66(6), 065202 (2002)","journal-title":"Phys. Rev. E"},{"key":"6_CR105","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1063\/1.1633492","volume":"14","author":"X. Wang","year":"2004","unstructured":"X.\u00a0Wang, M.\u00a0Zhan, C.-H.\u00a0Lai, H.\u00a0Gang: Error function attack of chaos synchronization based encryption schemes, Chaos 14, 128\u2013137 (2004)","journal-title":"Chaos"},{"key":"6_CR106","unstructured":"J. Zhou, W. Pei, J. Huang, A. Song, Z. He: Differential-like chosen cipher attack on a spatiotemporally chaotic cryptosystem, ArXiv Nonlinear Sciences e-prints (2005)"},{"key":"6_CR107","volume-title":"An Introduction to Symbolic Dynamics and Coding","author":"D. Lind","year":"2003","unstructured":"D.\u00a0Lind, B.\u00a0Marcus: An Introduction to Symbolic Dynamics and Coding (Cambridge University Press, Cambridge 2003)"},{"issue":"3","key":"6_CR108","doi-asserted-by":"publisher","first-page":"034105","DOI":"10.1103\/PhysRevLett.96.034105","volume":"96","author":"S.D. Pethel","year":"2006","unstructured":"S.D.\u00a0Pethel, N.J.\u00a0Corron, E.\u00a0Bollt: Symbolic dynamics of coupled map lattices, Phys. Rev. Lett. 96(3), 034105 (2006)","journal-title":"Phys. Rev. Lett."},{"key":"6_CR109","unstructured":"F.H. Willeboordse, K. Kaneko: Pattern dynamics of a coupled map lattice for open flow, eprint arXiv:chao-dyn\/9407001 (1994)"},{"key":"6_CR110","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.chaos.2005.10.022","volume":"31","author":"G. Chen","year":"2007","unstructured":"G.\u00a0Chen, Y.\u00a0Chen, X.\u00a0Liao: An extended method for obtaining S-boxes based on three-dimensional chaotic baker maps, Chaos Solitons Fractals 31, 571\u2013579 (2007)","journal-title":"Chaos Solitons Fractals"},{"key":"6_CR111","doi-asserted-by":"crossref","first-page":"1901","DOI":"10.1016\/S0960-0779(04)00454-0","volume":"23","author":"G. Tang","year":"2005","unstructured":"G.\u00a0Tang, X.\u00a0Liao: A method for designing dynamical S-boxes based on discretized chaotic map, Chaos Solitons Fractals 23, 1901\u20131909 (2005)","journal-title":"Chaos Solitons Fractals"},{"key":"6_CR112","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/S0960-0779(04)00456-4","volume":"24","author":"D. Xiao","year":"2005","unstructured":"D.\u00a0Xiao, X.\u00a0Liao, S.\u00a0Deng: One-way Hash function construction based on the chaotic map with changeable-parameter, Chaos Solitons Fractals 24, 65\u201371 (2005)","journal-title":"Chaos Solitons Fractals"},{"issue":"6","key":"6_CR113","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSII.2005.848992","volume":"52","author":"X. Yi","year":"2005","unstructured":"X.\u00a0Yi: Hash function based on chaotic tent maps, IEEE Trans. Circuits Syst. II 52(6), 354\u2013357 (2005)","journal-title":"IEEE Trans. Circuits Syst. II"},{"issue":"4","key":"6_CR114","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1103\/PhysRevLett.90.047903","volume":"90","author":"R. Tenny","year":"2003","unstructured":"R.\u00a0Tenny, L.S.\u00a0Tsimring, L.\u00a0Larson, H.D.I.\u00a0Abarbanel: Using distributed nonlinear dynamics for public key encryption, Phys. Rev. Lett. 90(4), 31 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"6_CR115","unstructured":"L. Kocarev, Z. Tasev, J. Makraduli: Public-key encryption and digital-signature schemes using chaotic maps, 16th European Conference on Circuits Theory and Design, ECCTD\u201903, Krak\u00f3w, 1\u20134 September 2003, Poland"},{"key":"6_CR116","doi-asserted-by":"crossref","unstructured":"L. Kocarev, Z. Tasev: Public key encryption based on Chebyshev maps, Proc. 2003 IEEE Symposium on Circuits and Systems, Vol. 3, Bangkok, TH, pp. 28\u201331","DOI":"10.1109\/ISCAS.2003.1204947"},{"key":"6_CR117","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1016\/S0960-0779(04)00387-X","volume":"23","author":"D. Xiao","year":"2005","unstructured":"D.\u00a0Xiao, X.\u00a0Liao, K.\u00a0Wong: An efficient entire chaos-based scheme for deniable authentication, Chaos Solitons Fractals 23, 1327\u20131331 (2005)","journal-title":"Chaos Solitons Fractals"},{"key":"6_CR118","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P. Bergamo","year":"2005","unstructured":"P.\u00a0Bergamo, P.\u00a0D\u2019Arco, A.\u00a0Santis, L.\u00a0Kocarev: Security of public key cryptosystems based on Chebyshev polynomials, IEEE Trans. Circuits Syst. I 52, 1382\u20131393 (2005)","journal-title":"IEEE Trans. Circuits Syst. I"},{"key":"6_CR119","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.chaos.2004.12.023","volume":"26","author":"G. Alvarez","year":"2005","unstructured":"G.\u00a0Alvarez: Security problems with a chaos-based deniable authentication scheme, Chaos Solitons Fractals 26, 7\u201311 (2005)","journal-title":"Chaos Solitons Fractals"},{"key":"6_CR120","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1016\/j.ins.2006.07.026","volume":"177","author":"D. Xiao","year":"2007","unstructured":"D.\u00a0Xiao, X.\u00a0Liao, S.\u00a0Deng: A novel key agreement protocol based on chaotic maps, Inf. Sci. 177, 1136\u20131142 (2007)","journal-title":"Inf. Sci"},{"key":"6_CR121","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.cpc.2004.04.001","volume":"160","author":"P.-H. Lee","year":"2004","unstructured":"P.-H.\u00a0Lee: Evidence of the correlation between positive Lyapunov exponents and good chaotic random number sequences, Comput. Phys. Commun. 160, 187\u2013203 (2004)","journal-title":"Comput. Phys. Commun."},{"key":"6_CR122","first-page":"559","volume":"41","author":"S.-C. Pei","year":"2003","unstructured":"S.-C.\u00a0Pei: Generating chaotic stream ciphers using chaotic systems, Chin. J. Phys. 41, 559\u2013581 (2003)","journal-title":"Chin. J. Phys."},{"key":"6_CR123","unstructured":"X. Zhang, et al.: A chaotic cipher mmohocc and its randomness evaluation, 6th International Conference on Complex Systems (ICCS), Boston, June 25\u201330, 2006"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:39:30Z","timestamp":1606185570000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":123,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_6","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}