{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:20:59Z","timestamp":1725549659679},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642107061"},{"type":"electronic","value":"9783642107078"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-10707-8_9","type":"book-chapter","created":{"date-parts":[[2010,3,10]],"date-time":"2010-03-10T08:13:59Z","timestamp":1268208839000},"page":"293-328","source":"Crossref","is-referenced-by-count":0,"title":["Cryptography Based on Spatiotemporal Chaotic Systems"],"prefix":"10.1007","author":[{"given":"Ping","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wolfgang A.","family":"Halang","sequence":"additional","affiliation":[]},{"given":"Guanrong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1142\/S0218127495001198","volume":"5","author":"A. Baranovsky","year":"1995","unstructured":"Baranovsky, A., Daems, D.: Design of one-dimensional chaotic maps with prescribed statistical properties. Int. J. Bifurcat Chaos Appl. Sci. Eng. 5, 1585\u20131598 (1995)","journal-title":"Int. J. Bifurcat Chaos Appl. Sci. Eng."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Batista, A.M., Pinto, S.E., Viana, R.L., Lopes, S.R.: Lyapunov spectrum and synchronization of piecewise linear map lattiecs with power-law coupling. Phys. Rev. E 65 (2002)","DOI":"10.1103\/PhysRevE.65.056209"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"M.S. Baptista","year":"1999","unstructured":"Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240, 50\u201354 (1999)","journal-title":"Phys. Lett. A"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G. Chen","year":"2003","unstructured":"Chen, G., Mao, Y., Chui, C.: A symmetric image encryption scheme based on 3rd chaotic cat maps. Chaos, Solitons & Fractals 21, 749\u2013761 (2003)","journal-title":"Chaos, Solitons & Fractals"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1103\/PhysRevE.65.045201","volume":"65","author":"P. Garcia","year":"2002","unstructured":"Garcia, P., Parravano, A., Cosenza, M., Jimenez, J., Marcano, A.: Coupled map networks as communication schemes. Phys. Rev. E 65, 195\u2013201 (2002)","journal-title":"Phys. Rev. E"},{"issue":"10","key":"9_CR6","doi-asserted-by":"publisher","first-page":"963","DOI":"10.1109\/81.633885","volume":"44","author":"M. Gotz","year":"1997","unstructured":"Gotz, M., Kelber, K., Schwarz, W.: Discrete-time chaotic encryption systems-part i: Statistical design approach. IEEE Trans. Circ. Syst. Fund. Theor. Appl. 44(10), 963\u2013970 (1997)","journal-title":"IEEE Trans. Circ. Syst. Fund. Theor. Appl."},{"key":"9_CR7","volume-title":"Theory and Application of Coupled Map Lattices","author":"K. Kaneko","year":"1993","unstructured":"Kaneko, K.: Theory and Application of Coupled Map Lattices. John Wiley and Sons, New York(1993)"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/TCSI.2002.804550","volume":"50","author":"L. Kocarev","year":"2003","unstructured":"Kocarev, L., Jakimoski, G.: Pseudorandom bits generated by chaotic maps. IEEE Trans. Circ. Syst. Fund. Theor. Appl. 50, 123\u2013126 (2003)","journal-title":"IEEE Trans. Circ. Syst. Fund. Theor. Appl."},{"key":"9_CR9","first-page":"855","volume":"E76-B","author":"T. Kohda","year":"1993","unstructured":"Kohda, T., Tsuneda, A.: Pseudonoise sequence by chaotic nonlinear maps and their correlation properties. IEICE Trans. Commun. E76-B, 855\u2013862 (1993)","journal-title":"IEICE Trans. Commun"},{"key":"9_CR10","volume-title":"Chaos, Fractals, and Noise: stochastic aspects of dynamics","author":"A. Lasota","year":"1997","unstructured":"Lasota, A., Mackey, M.C.: Chaos, Fractals, and Noise: stochastic aspects of dynamics. Springer, New York (1997)"},{"issue":"10","key":"9_CR11","doi-asserted-by":"publisher","first-page":"2949","DOI":"10.1142\/S0218127406016574","volume":"16","author":"P. Li","year":"2006","unstructured":"Li, P., Li, Z., Halang, W.A., Chen, G.R.: Analysis of a multiple output pseudo-randombit generator based on a spatiotemporal chaotic system. Int. J. Bifurcat Chaos Appl. Sci. Eng. 16(10), 2949\u20132963 (2006)","journal-title":"Int. J. Bifurcat Chaos Appl. Sci. Eng."},{"issue":"5","key":"9_CR12","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1016\/j.chaos.2005.12.021","volume":"32","author":"P. Li","year":"2007","unstructured":"Li, P., Li, Z., Halang, W.A., Chen, G.R.: A stream cipher based on a spatiotemporal chaotic system. Chaos, Solitons & Fractals 32(5), 1867\u20131876 (2007)","journal-title":"Chaos, Solitons & Fractals"},{"key":"9_CR13","volume-title":"Ph.D thesis","author":"S.J. Li","year":"2003","unstructured":"Li, S.J.: Analyses and New Designs of Digital Chaotic Ciphers. Ph.D thesis, School of Electronics and Information Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, China (2003)"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-45311-3_30","volume-title":"INDOCRYPT 2001. LNCs","author":"L. Shujun","year":"2001","unstructured":"Shujun, L., Xuanqin, M., Yuanlong, C.: Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. In: Pandu Rangan, C., Ding, C. (nteds.) INDOCRYPT 2001. LNCs, vol. 2247, pp. 316\u2013329. Springer, Heidelberg (2001)"},{"issue":"10","key":"9_CR15","doi-asserted-by":"publisher","first-page":"3119","DOI":"10.1142\/S0218127405014052","volume":"15","author":"S.J. Li","year":"2005","unstructured":"Li, S.J., Chen, G.R., Qin, M.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurcat Chaos Appl. Sci. Eng. 15(10), 3119\u20133151 (2005)","journal-title":"Int. J. Bifurcat Chaos Appl. Sci. Eng."},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.chaos.2004.09.077","volume":"25","author":"S. Li","year":"2005","unstructured":"Li, S., \u00c1 lvarez, G., Chen, G.R.: Breaking a chaos-based secure communication scheme designed by an improved modulation method. Chaos, Soliton & Fractals 25, 109\u2013120 (2005)","journal-title":"Chaos, Soliton & Fractals"},{"issue":"3","key":"9_CR17","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1063\/1.1772731","volume":"14","author":"H. Lu","year":"2004","unstructured":"Lu, H., Wang, S., Li, X., Tang, G., Kuang, J., Ye, W., Hu, G.: A new spatiotemporally chaotic cryptosystem and its security and performance analyses. Chaos 14(3), 617\u2013629 (2004)","journal-title":"Chaos"},{"issue":"1","key":"9_CR18","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/81.974872","volume":"49","author":"N. Masuda","year":"2002","unstructured":"Masuda, N., Aihara, K.: Cryptosystems with discretized chaotic maps. IEEE Trans. Circ. Syst. Fund. Theor. Appl. 49(1), 28\u201340 (2002)","journal-title":"IEEE Trans. Circ. Syst. Fund. Theor. Appl."},{"key":"9_CR19","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"9_CR20","unstructured":"NIST, Security requirements for cryptographic modules (FIPS pub 140-2) (2001), http:\/\/csrc.nist.gov\/publications\/fips\/fips140-2"},{"issue":"20","key":"9_CR21","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1049\/el:19981377","volume":"34","author":"T. Sang","year":"1998","unstructured":"Sang, T., Wang, R., Yan, Y.: Clock-controlled chaotic keystream generators. Electronics Letters 34(20), 1932\u20131934 (1998)","journal-title":"Electronics Letters"},{"key":"9_CR22","volume-title":"Applied Cryptography: Protocols, algorithms, and source code","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: Protocols, algorithms, and source code in C. John Wiley and Sons, New York (1996)"},{"key":"9_CR23","doi-asserted-by":"publisher","DOI":"10.1002\/3527607455","volume-title":"Handbook of Chaos Control","author":"H.G. Schuster","year":"1999","unstructured":"Schuster, H.G.: Handbook of Chaos Control. WILEY-VCH, Weinheim (1999)"},{"key":"9_CR24","unstructured":"Soto, J.: Statistical testing of random number generators (1999), http:\/\/csrc.nist.gov\/rng\/rng5.html"},{"issue":"3","key":"9_CR25","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/81.915385","volume":"48","author":"T. Stojanovski","year":"2001","unstructured":"Stojanovski, T., Kocarev, L.: Chaos-based random number generators-part i: Analysis. IEEE Trans. Circ. Syst. Fund. Theor. Appl. 48(3), 281\u2013288 (2001)","journal-title":"IEEE Trans. Circ. Syst. Fund. Theor. Appl."},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.physleta.2003.09.042","volume":"318","author":"G. Tang","year":"2003","unstructured":"Tang, G., Wang, S., Lu, H., Hu, G.: Chaos-based cryptograph incorporated with S-box algebraic operation. Phys. Lett. A 318, 388\u2013398 (2003)","journal-title":"Phys. Lett. A"},{"issue":"17-19","key":"9_CR27","doi-asserted-by":"publisher","first-page":"2617","DOI":"10.1142\/S0217979204025798","volume":"18","author":"S. Wang","year":"2004","unstructured":"Wang, S., Liu, W., Lu, H., Kuang, J., Hu, G.: Periodicity of chaotic trajectories in realizations of finite computer precisions and its implication in chaos communications. Int. J. Mod. Phys. B 18(17-19), 2617\u20132622 (2004)","journal-title":"Int. J. Mod. Phys. B"},{"key":"9_CR28","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1088\/0253-6102\/40\/1\/57","volume":"40","author":"S. Wang","year":"2003","unstructured":"Wang, S., Ye, W., Lu, H., Kuang, J., Li, J., Luo, Y., Hu, G.: A spatiotemporal-chaosbased encryption having overall properties considerably better than advanced encryption standard. Comm. Theor. Phys. 40, 57\u201360 (2003)","journal-title":"Comm. Theor. Phys."},{"key":"9_CR29","unstructured":"Wikipedia (2006) Chi Test, http:\/\/en.wikipedia.org\/wiki\/Pearson%7s-chi-square-test"},{"issue":"2","key":"9_CR30","first-page":"81","volume":"2","author":"T. Yang","year":"2004","unstructured":"Yang, T.: A survey of chaotic secure communication systems. International Journal of Computational Cognition 2(2), 81\u2013130 (2004)","journal-title":"International Journal of Computational Cognition"},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physleta.2004.07.048","volume":"330","author":"W. Ye","year":"2004","unstructured":"Ye, W., Dai, Q., Wang, S., Lu, H., Kuang, J., Zhao, Z., Zhu, X., Tang, G., Huang, R., Hu, G.: Experimental realization of a highly secure chaos communication under strong channel noise. Phys. Lett. A 330, 75\u201384 (2004)","journal-title":"Phys. Lett. A"},{"key":"9_CR32","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1142\/S0218126602000379","volume":"11","author":"H. Zhang","year":"2002","unstructured":"Zhang, H., Wang, H., Chen, W.: Oversampled chaotic binary sequences with good security. J. Circ. Syst. Comput. 11, 173\u2013185 (2002)","journal-title":"J. Circ. Syst. Comput."},{"issue":"3","key":"9_CR33","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/81.557386","volume":"44","author":"H. Zhou","year":"1997","unstructured":"Zhou, H., Ling, X.: Problems with the chaotic inverse system encryption approach. IEEE Trans. Circ. Syst. Fund. Theor. Appl. 44(3), 268\u2013271 (1997)","journal-title":"IEEE Trans. Circ. Syst. Fund. Theor. Appl."}],"container-title":["Studies in Computational Intelligence","Evolutionary Algorithms and Chaotic Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10707-8_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:34:20Z","timestamp":1606185260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10707-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642107061","9783642107078"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10707-8_9","relation":{},"ISSN":["1860-949X"],"issn-type":[{"type":"print","value":"1860-949X"}],"subject":[],"published":{"date-parts":[[2010]]}}}