{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:13:43Z","timestamp":1725891223886},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642314995"},{"type":"electronic","value":"9783642315008"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31500-8_33","type":"book-chapter","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T15:09:08Z","timestamp":1341328148000},"page":"323-332","source":"Crossref","is-referenced-by-count":2,"title":["Parallelization of the Discrete Chaotic Block Encryption Algorithm"],"prefix":"10.1007","author":[{"given":"Dariusz","family":"Burak","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chudzik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4-5","key":"33_CR1","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0375-9601(01)00609-0","volume":"289","author":"L. Kocarev","year":"2001","unstructured":"Kocarev, L., Jakimoski, G.: Logistic map as a block encryption algorithm. Physics Letters A\u00a0289(4-5), 199\u2013206 (2001)","journal-title":"Physics Letters A"},{"issue":"7","key":"33_CR2","first-page":"1041","volume":"E73","author":"T. Habutsu","year":"1990","unstructured":"Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A Secret Key Cryptosystem Using a Chaotic Map. Trans. IEICE Japan\u00a0E73(7), 1041\u20131044 (1990)","journal-title":"Trans. IEICE Japan"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Block cipher using 1D and 2D chaotic maps. International Journal of Information and Communication Technology\u00a02(3) (2010)","DOI":"10.1504\/IJICT.2010.032412"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Yi, X., Tan, C.H., Siew, C.K.: A new block cipher based on chaotic tent maps. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications\u00a049(12) (2002)","DOI":"10.1109\/TCSI.2002.805714"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Xua, S., Wang, J., Yang, S.: A Novel Block Cipher Based on Chaotic Maps. Congress on Image and Signal Processing\u00a03 (2008)","DOI":"10.1109\/CISP.2008.409"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Kotulski, Z., Szczepa\u0144ski, J.: Discrete chaotic cryptography (DCC). In: Proc. NEEDS 1997 (1997)","DOI":"10.1002\/andp.19975090504"},{"issue":"1","key":"33_CR7","first-page":"125","volume":"5","author":"W. Bielecki","year":"2006","unstructured":"Bielecki, W., Burak, D.: Exploiting Loop-Level Parallelism in the AES Algorithm. WSEAS Transactions on Computers\u00a05(1), 125\u2013133 (2006)","journal-title":"WSEAS Transactions on Computers"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/978-3-540-24685-5_108","volume-title":"Computational Science - ICCS 2004","author":"V. Beletskyy","year":"2004","unstructured":"Beletskyy, V., Burak, D.: Parallelization of the IDEA Algorithm. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol.\u00a03036, pp. 635\u2013638. Springer, Heidelberg (2004)"},{"issue":"1","key":"33_CR9","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S. Lian","year":"2005","unstructured":"Lian, S., Sun, J., Wang, Z.: A Block Cipher Based on a Suitable Use of the Chaotic Standard Map. Chaos, Solitons and Fractals\u00a026(1), 117\u2013129 (2005)","journal-title":"Chaos, Solitons and Fractals"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Peja\u015b, J., Skrobek, A.: Chaos-Based Information Security. In: Handbook of Information and Communication Security, pp. 91\u2013128 (2010)","DOI":"10.1007\/978-3-642-04117-4_6"},{"key":"33_CR11","unstructured":"Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D.: New User Interface for Petit and Other Extensions. User Guide (1996)"},{"key":"33_CR12","unstructured":"The Omega Project: Frameworks and Algorithms for the Analysis and Transformation of Scientific Programs, http:\/\/www.cs.umd.edu\/projects\/omega\/"},{"key":"33_CR13","unstructured":"Chandra, R., Dagum, L., Kohr, D., Maydan, D., McDonald, J., Menon, R.: Parallel Programming in OpenMP. Morgan Kaufmann Publishers, Inc. (2001)"},{"key":"33_CR14","unstructured":"OpenMP C and C++ Application Program Interface. Version 3.0 (2008)"},{"key":"33_CR15","unstructured":"Moldovan, D.I.: Parallel Processing. From Applications to Systems. Morgan Kaufmann Publishers, Inc. (1993)"},{"key":"33_CR16","unstructured":"Muchnick, S.S.: Advanced Compiler Design and Implementation. Morgan Kaufmann Publishers, Inc. (1997)"},{"key":"33_CR17","unstructured":"Allen, R., Kennedy, K.: Optimizing compilers for modern architectures: A Dependencebased Approach. Morgan Kaufmann Publishers, Inc. (2001)"},{"key":"33_CR18","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons (1995)"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Amdahl, G.M.: Validity of the Single-Processor Approach to Achieving Large Scale Computing Capabilities. In: AFIPS Conference Proceedings, pp. 483\u2013485 (1967)","DOI":"10.1145\/1465482.1465560"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation: Methods and Techniques. NIST Special Publication 800-38A (December 2001)","DOI":"10.6028\/NIST.SP.800-38a"}],"container-title":["Lecture Notes in Computer Science","Parallel Processing and Applied Mathematics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31500-8_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T03:26:02Z","timestamp":1642649162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31500-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642314995","9783642315008"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31500-8_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}