{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:08:20Z","timestamp":1743116900753,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642159787"},{"type":"electronic","value":"9783642159794"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15979-4_27","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T12:58:22Z","timestamp":1284901102000},"page":"251-260","source":"Crossref","is-referenced-by-count":5,"title":["Chaotic Cellular Automata with Cryptographic Application"],"prefix":"10.1007","author":[{"given":"Amparo","family":"F\u00faster-Sabater","sequence":"first","affiliation":[]},{"given":"Pino","family":"Caballero-Gil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"27_CR1","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1142\/S0218127496000023","volume":"6","author":"R. Brown","year":"1996","unstructured":"Brown, R., Chua, L.: Clarifying chaos: examples and counterexamples. Int. J. Bifurcat Chaos\u00a06(2), 219\u2013242 (1996)","journal-title":"Int. J. Bifurcat Chaos"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1093\/ietfec\/e89-a.5.1166","volume":"E89-A","author":"P. Caballero-Gil","year":"2006","unstructured":"Caballero-Gil, P., F\u00faster-Sabater, A.: Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator. IEICE Transactions on Fundamentals of Electronics Communications and Computer\u00a0E89-A, 1166\u20131172 (2006)","journal-title":"IEICE Transactions on Fundamentals of Electronics Communications and Computer"},{"issue":"3","key":"27_CR3","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/43.489103","volume":"15","author":"K. Cattell","year":"1996","unstructured":"Cattell, K., Muzio, J.C.: Synthesis of One-Dimensional Linear Hybrid Cellular Automata. IEEE Trans. Computers-Aided Design\u00a015(3), 325\u2013335 (1996)","journal-title":"IEEE Trans. Computers-Aided Design"},{"key":"27_CR4","first-page":"1","volume-title":"Theory and Applications","author":"P. Chaudhuri","year":"1997","unstructured":"Chaudhuri, P., Chowdhury, D., Nandi, S., Chatterjee, S.: Additive Cellular Automata. In: Theory and Applications, p. 1. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-48329-2_3","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"D. Coppersmith","year":"1993","unstructured":"Coppersmith, D., Krawczyk, H., Mansour, Y.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 22\u201339. Springer, Heidelberg (1993)"},{"issue":"12","key":"27_CR6","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/TCSI.2001.972857","volume":"48","author":"F. Dachselt","year":"2001","unstructured":"Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Trans. Circuits Syst.\u00a048(12), 1498\u20131509 (2001)","journal-title":"IEEE Trans. Circuits Syst."},{"issue":"6","key":"27_CR7","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J. Fridrich","year":"1998","unstructured":"Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat Chaos\u00a08(6), 1259\u20131284 (1998)","journal-title":"Int. J. Bifurcat Chaos"},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/11861201_71","volume-title":"Cellular Automata","author":"A. F\u00faster-Sabater","year":"2006","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Cellular Automata in Cryptanalysis of Stream Ciphers. In: El Yacoubi, S., Chopard, B., Bandini, S. (eds.) ACRI 2006. LNCS, vol.\u00a04173, pp. 611\u2013616. Springer, Heidelberg (2006)"},{"issue":"10","key":"27_CR9","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1016\/j.aml.2009.03.018","volume":"22","author":"A. F\u00faster-Sabater","year":"2009","unstructured":"F\u00faster-Sabater, A., Caballero-Gil, P.: Synthesis of Cryptographic Interleaved Sequences by Means of Linear Cellular Automata. Applied Mathematics Letters\u00a022(10), 1518\u20131524 (2009)","journal-title":"Applied Mathematics Letters"},{"key":"27_CR10","volume-title":"Shift-Register Sequences","author":"S. Golomb","year":"1982","unstructured":"Golomb, S.: Shift-Register Sequences. Aegean Park Press, Laguna Hill California (1982)"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.2004.825256","volume":"50","author":"Y. Hu","year":"2004","unstructured":"Hu, Y., Xiao, G.: Generalized Self-Shrinking Generator. IEEE Trans. Inform. Theory\u00a050, 714\u2013719 (2004)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L. Kocarev","year":"2001","unstructured":"Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circ. Syst.\u00a01, 6\u201321 (2001)","journal-title":"IEEE Circ. Syst."},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-46416-6_17","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"W. Meier","year":"1991","unstructured":"Meier, W., Staffelbach, O.: Analysis of Pseudo Random Sequences Generated by Cellular Automata. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 186\u2013199. Springer, Heidelberg (1991)"},{"key":"27_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053436","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"W. Meier","year":"1995","unstructured":"Meier, W., Staffelbach, O.: The Self-Shrinking Generator. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 205\u2013214. Springer, Heidelberg (1995)"},{"issue":"5","key":"27_CR15","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/81.922466","volume":"48","author":"A. Parker","year":"2001","unstructured":"Parker, A., Short, K.: Reconstructing the keystream from a chaotic encryption scheme. IEEE Trans. Circuits Syst. I\u00a048(5), 104\u2013112 (2001)","journal-title":"IEEE Trans. Circuits Syst. I"},{"issue":"3-4","key":"27_CR16","first-page":"321","volume":"58","author":"M. Pradipta","year":"2003","unstructured":"Pradipta, M., Chandrama, S., Niloy, G., Biplab, S., Chaudhuri, P.: Theory and Application of Cellular Automata for Pattern Classification. Fundamenta Informaticae\u00a058(3-4), 321\u2013354 (2003)","journal-title":"Fundamenta Informaticae"},{"key":"27_CR17","first-page":"65","volume-title":"Contemporary Cryptology, The Science of Information","author":"R. Rueppel","year":"1992","unstructured":"Rueppel, R.: Stream Ciphers. In: Simmons, G.J. (ed.) Contemporary Cryptology, The Science of Information, pp. 65\u2013134. IEEE Press, Los Alamitos (1992)"},{"issue":"2","key":"27_CR18","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/S1568-4946(01)00015-1","volume":"1","author":"M. Tomassini","year":"2001","unstructured":"Tomassini, M., Perrenoud, M.: Cryptography with cellular automata. Applied Soft Computing\u00a01(2), 151\u2013160 (2001)","journal-title":"Applied Soft Computing"},{"issue":"3","key":"27_CR19","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1016\/j.asoc.2006.10.003","volume":"7","author":"S.K. Tan","year":"2007","unstructured":"Tan, S.K., Guan, S.U.: Evolving cellular automata to generate nonlinear sequences with desirable properties. Applied Soft Computing\u00a07(3), 1131\u20131134 (2007)","journal-title":"Applied Soft Computing"},{"issue":"4","key":"27_CR20","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1063\/1.166368","volume":"8","author":"J. Ur\u00edas","year":"1998","unstructured":"Ur\u00edas, J., Ugalde, E., Salazar, G.: A cryptosystem based on cellular automata. Chaos\u00a08(4), 819\u2013822 (1998)","journal-title":"Chaos"},{"key":"27_CR21","volume-title":"A New Kind of Science","author":"S. Wolfram","year":"2002","unstructured":"Wolfram, S.: A New Kind of Science. Wolfram Media, Champaign (2002)"},{"key":"27_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","volume-title":"Advances in Cryptology","author":"S. Wolfram","year":"1986","unstructured":"Wolfram, S.: Cryptography with Cellular Automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 429\u2013432. Springer, Heidelberg (1986)"},{"key":"27_CR23","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1103\/PhysRevE.60.320","volume":"60","author":"C. Zhou","year":"1999","unstructured":"Zhou, C., Lai, C.H.: Extracting messages masked by chaotic signals of time-delay systems. Phys. Rev. E\u00a060, 320\u2013323 (1999)","journal-title":"Phys. Rev. E"}],"container-title":["Lecture Notes in Computer Science","Cellular Automata"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15979-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:54:14Z","timestamp":1558292054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15979-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642159787","9783642159794"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15979-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}