{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T19:07:58Z","timestamp":1761419278715,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_42","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"543-553","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation"],"prefix":"10.1007","author":[{"given":"Musheer","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"M. N.","family":"Doja","sequence":"additional","affiliation":[]},{"given":"M. M. Sufyan","family":"Beg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"issue":"2","key":"42_CR1","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1007\/s11071-012-0558-0","volume":"70","author":"XY Wang","year":"2012","unstructured":"Wang, X.Y., Qin, X.: A new pseudo-random number generator based on CML and chaotic iteration. Nonlinear Dyn. 70(2), 1589\u20131592 (2012)","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"42_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.4218\/etrij.10.1409.0047","volume":"32","author":"SY Hwang","year":"2010","unstructured":"Hwang, S.Y., Park, G.Y., Kim, D.H., Jhang, K.S.: Efficient implementation of a pseudorandom sequence generator for high-speed data communications. ETRI J. 32(2), 222\u2013229 (2010)","journal-title":"ETRI J."},{"issue":"1\u20132","key":"42_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1023\/A:1015296523748","volume":"42","author":"H Niederreiter","year":"2001","unstructured":"Niederreiter, H., Winterhof, A.: On a new class of inversive pseudorandom numbers for parallelized simulation methods. Periodica Mathematica Hungarica 42(1\u20132), 77\u201387 (2001)","journal-title":"Periodica Mathematica Hungarica"},{"key":"42_CR4","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"5","key":"42_CR5","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/81.847868","volume":"47","author":"CS Petrie","year":"2000","unstructured":"Petrie, C.S., Connelly, J.A.: A noise-based IC random number generator for applications in cryptography. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 47(5), 615\u2013621 (2000)","journal-title":"IEEE Trans. Circuits Syst. I Fundam. Theory Appl."},{"issue":"1","key":"42_CR6","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11071-016-3051-3","volume":"87","author":"MA Murillo-Escobar","year":"2017","unstructured":"Murillo-Escobar, M.A., Cruz-Hern\u00e1ndez, C., Cardoza-Avenda\u00f1o, L., M\u00e9ndez-Ram\u00edrez, R.: A novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn. 87(1), 407\u2013425 (2017)","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"42_CR7","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s11071-017-3656-1","volume":"90","author":"D Lambi\u0107","year":"2017","unstructured":"Lambi\u0107, D., Nikoli\u0107, M.: Pseudo-random number generator based on discrete-space chaotic map. Nonlinear Dyn. 90(1), 223\u2013232 (2017)","journal-title":"Nonlinear Dyn."},{"key":"42_CR8","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos based cryptosystems. Int. J. Bifur. Chaos 16, 2129\u20132151 (2006)","journal-title":"Int. J. Bifur. Chaos"},{"key":"42_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20542-2","volume-title":"Chaos-Based Cryptography: Theory, Algorithms and Applications","year":"2011","unstructured":"Kocarev, L., Lian, S. (eds.): Chaos-Based Cryptography: Theory, Algorithms and Applications, vol. 354. Springer, Heidelberg (2011). \n                  https:\/\/doi.org\/10.1007\/978-3-642-20542-2"},{"issue":"9","key":"42_CR10","first-page":"534","volume":"65","author":"SI Oishi","year":"1982","unstructured":"Oishi, S.I., Inoue, H.: Pseudo-random number generators and chaos. IEICE Trans. 1976\u20131990 65(9), 534\u2013541 (1982)","journal-title":"IEICE Trans. 1976\u20131990"},{"key":"42_CR11","first-page":"119","volume":"35","author":"R Hamza","year":"2017","unstructured":"Hamza, R.: A novel pseudo random sequence generator for image-cryptographic applications. J. Inf. Secur. Appl. 35, 119\u2013127 (2017)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"42_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.cnsns.2013.06.017","volume":"19","author":"A Akhshani","year":"2014","unstructured":"Akhshani, A., Akhavan, A., Mobaraki, A., Lim, S.C., Hassan, Z.: Pseudo random number generator based on quantum chaotic map. Commun. Nonlinear Sci. Numer. Simul. 19(1), 101\u2013111 (2014)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"4","key":"42_CR13","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1007\/s11071-015-2303-y","volume":"82","author":"M Garc\u00eda-Mart\u00ednez","year":"2015","unstructured":"Garc\u00eda-Mart\u00ednez, M., Campos-Cant\u00f3n, E.: Pseudo-random bit generator based on multi-modal maps. Nonlinear Dyn. 82(4), 2119\u20132131 (2015)","journal-title":"Nonlinear Dyn."},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Singla, P., Sachdeva, P., Ahmad, M.: A chaotic neural network based cryptographic pseudo-random sequence design. In: 2014 Fourth International Conference on Advanced Computing and Communication Technologies (ACCT), pp. 301\u2013306. IEEE, February 2014","DOI":"10.1109\/ACCT.2014.38"},{"issue":"9","key":"42_CR15","doi-asserted-by":"publisher","first-page":"411","DOI":"10.12988\/astp.2015.5342","volume":"9","author":"B Stoyanov","year":"2015","unstructured":"Stoyanov, B., Kordov, K.: Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Adv. Stud. Theor. Phys. 9(9), 411\u2013421 (2015)","journal-title":"Adv. Stud. Theor. Phys."},{"issue":"3","key":"42_CR16","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1007\/s11071-014-1591-y","volume":"78","author":"F \u00d6zkaynak","year":"2014","unstructured":"\u00d6zkaynak, F.: Cryptographically secure random number generator with chaotic additional input. Nonlinear Dyn. 78(3), 2015\u20132020 (2014)","journal-title":"Nonlinear Dyn."},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Ahmad, M., Farooq, O.: Chaos based PN sequence generator for cryptographic applications. In: 2011 International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), pp. 83\u201386. IEEE, December 2011","DOI":"10.1109\/MSPCT.2011.6150443"},{"issue":"5560","key":"42_CR18","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"RM May","year":"1976","unstructured":"May, R.M.: Simple mathematical models with very complicated dynamics. Nature 261(5560), 459 (1976)","journal-title":"Nature"},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Xie, J., Yang, C., Xie, Q., Tian, L.: An encryption algorithm based on transformed logistic map. In: 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009, vol. 2, pp. 111\u2013114. IEEE, April 2009","DOI":"10.1109\/NSWCTC.2009.201"},{"issue":"1","key":"42_CR20","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1063\/1.166092","volume":"5","author":"S Pincus","year":"1995","unstructured":"Pincus, S.: Approximate entropy (ApEn) as a complexity measure. Chaos Interdisc. J. Nonlinear Sci. 5(1), 110\u2013117 (1995)","journal-title":"Chaos Interdisc. J. Nonlinear Sci."},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Rukhin, A., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22 (2001)","DOI":"10.6028\/NIST.SP.800-22"},{"issue":"4","key":"42_CR22","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/1268776.1268777","volume":"33","author":"P L\u2019Ecuyer","year":"2007","unstructured":"L\u2019Ecuyer, P., Simard, R.: TestU01: AC library for empirical testing of random number generators. ACM Trans. Math. Softw. (TOMS) 33(4), 22 (2007)","journal-title":"ACM Trans. Math. Softw. (TOMS)"},{"key":"42_CR23","volume-title":"Shift Register Sequences","author":"SW Golomb","year":"1982","unstructured":"Golomb, S.W.: Shift Register Sequences. Aegean Park Press, Laguna Hills (1982)"},{"issue":"1","key":"42_CR24","first-page":"32","volume":"10","author":"NK Pareek","year":"2010","unstructured":"Pareek, N.K., Patidar, V., Sud, K.K.: A random bit generator using chaotic maps. IJ Netw. Secur. 10(1), 32\u201338 (2010)","journal-title":"IJ Netw. Secur."},{"key":"42_CR25","unstructured":"Lambert, H.S.: International Business Machines Corporation, Method and apparatus for encryption of data. U.S. Patent 7,133, 522 (2006)"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:54:14Z","timestamp":1558396454000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}