{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:54:21Z","timestamp":1742975661846,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642551949"},{"type":"electronic","value":"9783642551956"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55195-6_34","type":"book-chapter","created":{"date-parts":[[2014,5,7]],"date-time":"2014-05-07T14:55:32Z","timestamp":1399474532000},"page":"364-373","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Parallelization of Encryption Algorithm Based on Chaos System and Neural Networks"],"prefix":"10.1007","author":[{"given":"Dariusz","family":"Burak","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,8]]},"reference":[{"issue":"7","key":"34_CR1","first-page":"1041","volume":"E73","author":"T Habutsu","year":"1990","unstructured":"Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem using a chaotic map. Trans. IEICE Jpn. E73(7), 1041\u20131044 (1990)","journal-title":"Trans. IEICE Jpn."},{"issue":"6","key":"34_CR2","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259\u20131284 (1998)","journal-title":"Int. J. Bifurcat. Chaos"},{"issue":"2","key":"34_CR3","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1117\/1.482647","volume":"7","author":"J Scharinger","year":"1998","unstructured":"Scharinger, J.: Fast encryption of image data using chaotic Kolmogorov flows. J. Electron. Imaging 7(2), 318\u2013325 (1998)","journal-title":"J. Electron. Imaging"},{"issue":"4\u20135","key":"34_CR4","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0375-9601(01)00609-0","volume":"289","author":"L Kocarev","year":"2001","unstructured":"Kocarev, L., Jakimoski, G.: Logistic map as a block encryption algorithm. Phys. Lett. A 289(4\u20135), 199\u2013206 (2001)","journal-title":"Phys. Lett. A"},{"issue":"12","key":"34_CR5","doi-asserted-by":"publisher","first-page":"1826","DOI":"10.1109\/TCSI.2002.805714","volume":"49","author":"X Yi","year":"2002","unstructured":"Yi, X., Tan, C.H., Siew, C.K.: A new block cipher based on chaotic tent maps. EEE Trans. Circuits Syst. I: Fundam. Theory Appl. 49(12), 1826\u20131829 (2002)","journal-title":"EEE Trans. Circuits Syst. I: Fundam. Theory Appl."},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"12","author":"G Chen","year":"2004","unstructured":"Chen, G., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 12, 749\u2013761 (2004)","journal-title":"Chaos Solitons Fractals"},{"issue":"10","key":"34_CR7","doi-asserted-by":"publisher","first-page":"3613","DOI":"10.1142\/S021812740401151X","volume":"14","author":"YB Mao","year":"2004","unstructured":"Mao, Y.B., Chen, G., Lian, S.G.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurcat. Chaos 14(10), 3613\u20133624 (2004)","journal-title":"Int. J. Bifurcat. Chaos"},{"issue":"1","key":"34_CR8","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S Lian","year":"2005","unstructured":"Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons and Fractals 26(1), 117\u2013129 (2005)","journal-title":"Chaos, Solitons and Fractals"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Xua, S., Wang, J., Yang, S.: A novel block cipher based on chaotic maps. In: Congress on Image and Signal Processing, vol. 3 (2008)","DOI":"10.1109\/CISP.2008.409"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: Block cipher using 1D and 2D chaotic maps. Int. J. Inf. Commun. Technol. 2(3) (2010)","DOI":"10.1504\/IJICT.2010.032412"},{"issue":"1","key":"34_CR11","first-page":"125","volume":"5","author":"W Bielecki","year":"2006","unstructured":"Bielecki, W.: Exploiting loop-level parallelism in the AES algorithm. WSEAS Trans. Comput. 5(1), 125\u2013133 (2006)","journal-title":"WSEAS Trans. Comput."},{"key":"34_CR12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/978-3-540-24685-5_108","volume-title":"ICCS 2004","author":"V Beletskyy","year":"2004","unstructured":"Beletskyy, V., Burak, D.: Parallelization of the IDEA algorithm. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 635\u2013638. Springer, Heidelberg (2004)"},{"key":"34_CR13","series-title":"LNCS","first-page":"323","volume-title":"PPAM 2011, Part II","author":"D Burak","year":"2012","unstructured":"Burak, D., Chudzik, M.: Parallelization of the discrete chaotic block encryption algorithm. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wa\u015bniewski, J. (eds.) PPAM 2011, Part II. LNCS, vol. 7204, pp. 323\u2013332. Springer, Heidelberg (2012)"},{"issue":"7","key":"34_CR14","doi-asserted-by":"publisher","first-page":"4293","DOI":"10.1016\/j.asoc.2010.05.033","volume":"11","author":"S Lian","year":"2011","unstructured":"Lian, S., Chen, X.: Traceable content protection based on chaos and neural networks. Appl. Soft Comput. 11(7), 4293\u20134301 (2011)","journal-title":"Appl. Soft Comput."},{"key":"34_CR15","doi-asserted-by":"crossref","DOI":"10.1142\/5313","volume-title":"Bifurcations and Chaos in Piecewise-smooth Dynamical Systems","author":"ZT Zhusubaliyev","year":"2003","unstructured":"Zhusubaliyev, Z.T., Mosekilde, E.: Bifurcations and Chaos in Piecewise-smooth Dynamical Systems. World Scientific Publishing Co., Pte. Ltd., Singapore (2003)"},{"key":"34_CR16","unstructured":"Kelly, W., Maslov, V., Pugh, W., Rosser, E., Shpeisman, T., Wonnacott, D.: New User Interface for Petit and Other Extensions. User Guide (1996)"},{"key":"34_CR17","unstructured":"The Omega Project: Frameworks and Algorithms for the Analysis and Transformation of Scientific Programs. http:\/\/www.cs.umd.edu\/projects\/omega\/"},{"key":"34_CR18","volume-title":"Using OpenMP - Portable Shared Memory Parallel Programming","author":"B Chapman","year":"2007","unstructured":"Chapman, B., Jost, G., van der Pas, R.: Using OpenMP - Portable Shared Memory Parallel Programming. The MIT Press, Cambridge (2007)"},{"key":"34_CR19","volume-title":"Parallel Programming in OpenMP","author":"R Chandra","year":"2001","unstructured":"Chandra, R., Dagum, L., Kohr, D., Maydan, D., McDonald, J., Menon, R.: Parallel Programming in OpenMP. Morgan Kaufmann Publishers, Inc., San Francisco (2001)"},{"key":"34_CR20","unstructured":"OpenMP Application Program Interface. Version 3.1 July 2011 (2011)"},{"key":"34_CR21","volume-title":"Parallel Processing: From Applications to Systems","author":"DI Moldovan","year":"1993","unstructured":"Moldovan, D.I.: Parallel Processing: From Applications to Systems. Morgan Kaufmann Publishers, Inc., San Mateo (1993)"},{"key":"34_CR22","volume-title":"Advanced Compiler Design and Implementation","author":"SS Muchnick","year":"1997","unstructured":"Muchnick, S.S.: Advanced Compiler Design and Implementation. Morgan Kaufmann Publishers Inc., San Francisco (1997)"},{"key":"34_CR23","volume-title":"Optimizing Compilers for Modern Architectures: A Dependencebased Approach","author":"R Allen","year":"2001","unstructured":"Allen, R., Kennedy, K.: Optimizing Compilers for Modern Architectures: A Dependencebased Approach. Morgan Kaufmann Publishers, Inc., San Francisco (2001)"},{"key":"34_CR24","volume-title":"Compilers: Principles, Techniques, and Tools","author":"A Aho","year":"2006","unstructured":"Aho, A., Lam, M., Sethi, R., Ullman, J.: Compilers: Principles, Techniques, and Tools, 2nd edn. Prentice Hall, Upper Saddle River (2006)","edition":"2"},{"key":"34_CR25","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New (1995)","edition":"2"},{"key":"34_CR26","doi-asserted-by":"crossref","unstructured":"Amdahl, G.M.: Validity of the single-processor approach to achieving large scale computing capabilities. In: AFIPS Conference Proceedings, pp. 483\u2013485 (1967)","DOI":"10.1145\/1465482.1465560"},{"key":"34_CR27","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for block cipher modes of operation: methods and techniques. NIST Special, Publication 800\u201338A, Dec (2001)","DOI":"10.6028\/NIST.SP.800-38a"}],"container-title":["Lecture Notes in Computer Science","Parallel Processing and Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55195-6_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T16:27:56Z","timestamp":1676392076000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-55195-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642551949","9783642551956"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55195-6_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 May 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}