{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:54:49Z","timestamp":1743076489219,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_5","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"51-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Inadequacy of\u00a0Multimodal Maps for\u00a0Cryptographic Hash Applications with\u00a0Phase-Space Modulation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7228-2818","authenticated-orcid":false,"given":"Imad","family":"El Hanouti","sequence":"first","affiliation":[]},{"given":"Hakim","family":"El Fadili","sequence":"additional","affiliation":[]},{"given":"Fawad","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Jawad","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Ahmad M, Khurana S, Singh S, AlSharari HD (2017) A simple secure hash function scheme using multiple chaotic maps. 3D Research. https:\/\/doi.org\/10.1007\/s13319-017-0123-1","DOI":"10.1007\/s13319-017-0123-1"},{"key":"#cr-split#-5_CR2.1","unstructured":"Arroyo D, Amig\u00f3 J, Li S, Alvarez G (2010) On the inadequacy of unimodal maps for cryptographic applications. First publ. In: RECSI 2010 : IX [i.e. XI] Reuni\u00f3n Espa\u00f1ola sobre Criptolog\u00eda y Seguridad de la Informaci\u00f3n, Tarragona 7-10 de septiembre 2010"},{"key":"#cr-split#-5_CR2.2","unstructured":"coordinado por Josep Domingo Ferrer ... Tarragona : Publicacions URV, 2010, pp 37-42 (01 2010)"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/s00145-014-9179-8","volume":"28","author":"E Biham","year":"2015","unstructured":"Biham E, Chen R, Joux A (2015) Cryptanalysis of sha-0 and reduced sha-1. J Cryptol 28(1):110\u2013160","journal-title":"J Cryptol"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Kocarev L, Lian S (2011) Chaos-based cryptography: theory, algorithms and applications, vol\u00a0354. Springer Science & Business Media","DOI":"10.1007\/978-3-642-20542-2"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Landelle F, Peyrin T (2016) Cryptanalysis of full ripemd-128. J Cryptol 29(4):927\u2013951. https:\/\/doi.org\/10.1007\/s00145-015-9213-5","DOI":"10.1007\/s00145-015-9213-5"},{"key":"5_CR6","unstructured":"Li HD, Feng DG (2003) Composite nonlinear discrete chaotic dynamical systems and keyed hash functions. Jisuanji Xuebao\/Chinese J Comput"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Li P, Zhang M, Shi J (2012) The design problems of one kind of chaotic one-way hash function. In: 2012 fourth international conference on multimedia information networking and security. IEEE, pp 592\u2013594","DOI":"10.1109\/MINES.2012.222"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Li Y, Ge G (2019) Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security. Multimed Tools Appl 78(13):17973\u201317994. https:\/\/doi.org\/10.1007\/s11042-018-7122-y","DOI":"10.1007\/s11042-018-7122-y"},{"key":"5_CR9","doi-asserted-by":"publisher","DOI":"10.3772\/j.issn.1006-6748.2012.01.002","author":"Y Li","year":"2012","unstructured":"Li Y, Xiao D, Deng S (2012) Secure hash function based on chaotic tent map with changeable parameter. High Technol Lett. https:\/\/doi.org\/10.3772\/j.issn.1006-6748.2012.01.002","journal-title":"High Technol Lett"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Li Y, Xiao D, Deng S, Han Q, Zhou G (2011) Parallel Hash function construction based on chaotic maps with changeable parameters. Neural Comput Appl https:\/\/doi.org\/10.1007\/s00521-011-0543-4","DOI":"10.1007\/s00521-011-0543-4"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Liu GJ, Shan L, Dai YW, Sun JS, Wang ZQ (2006) One-way Hash function based on chaotic neural network. Wuli Xuebao\/Acta Physica Sinica. https:\/\/doi.org\/10.7498\/aps.55.5688","DOI":"10.7498\/aps.55.5688"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Paar C, Jan P (2009) Understanding cryptography : a textbook for students and practitioners. Springer, Berlin, London. https:\/\/search.library.wisc.edu\/catalog\/9910092139102121","DOI":"10.1007\/978-3-642-04101-3"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Sahnoune A, Berkani D (2018) On the correlation of chaotic signals generated by multimodal skew tent map. Signal Image Video Proc. https:\/\/doi.org\/10.1007\/s11760-018-1279-8","DOI":"10.1007\/s11760-018-1279-8"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Van Strien S, Vargas E (2004) Real bounds, ergodicity and negative schwarzian for multimodal maps. J Am Math Soc. https:\/\/doi.org\/10.1090\/S0894-0347-04-00463-1","DOI":"10.1090\/S0894-0347-04-00463-1"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Wang S, Hu G (2007) Hash function based on chaotic map lattices. Chaos. https:\/\/doi.org\/10.1063\/1.2735812","DOI":"10.1063\/1.2735812"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Wang Y, Liao X, Xiao D, Wong KW (2008) One-way hash function construction based on 2D coupled map lattices. Inf Sci. https:\/\/doi.org\/10.1016\/j.ins.2007.10.008","DOI":"10.1016\/j.ins.2007.10.008"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"Xiao D, Liao X, Wong KW (2006) Improving the security of a dynamic look-up table based chaotic cryptosystem. In: IEEE transactions on circuits and systems II: express briefs. https:\/\/doi.org\/10.1109\/TCSII.2006.875336","DOI":"10.1109\/TCSII.2006.875336"},{"key":"5_CR18","doi-asserted-by":"publisher","unstructured":"Yi X (2005) Hash function based on chaotic tent maps. In IEEE transactions on circuits and systems II: express briefs. https:\/\/doi.org\/10.1109\/TCSII.2005.848992","DOI":"10.1109\/TCSII.2005.848992"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Zeraoulia E, Sprott JC (2011) Robust chaos and its applications. World Sci. https:\/\/doi.org\/10.1142\/8296, https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/8296","DOI":"10.1142\/8296"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:03:33Z","timestamp":1646489013000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}