{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:22:28Z","timestamp":1743139348093,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680588"},{"type":"electronic","value":"9789811680595"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_3","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"35-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0338-1200","authenticated-orcid":false,"given":"Jamal N.","family":"Hasoon","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1676-932X","authenticated-orcid":false,"given":"Bashar Ahmed","family":"Khalaf","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4189-2637","authenticated-orcid":false,"given":"Rasha Subhi","family":"Hameed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5348-502X","authenticated-orcid":false,"given":"Salama A.","family":"Mostafa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1360-130X","authenticated-orcid":false,"given":"Ali Hussein","family":"Fadil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"3_CR1","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/978-3-030-80129-8_59","volume-title":"Intelligent Computing","author":"M Gjorgjievska Perusheska","year":"2021","unstructured":"Gjorgjievska Perusheska, M., Dimitrova, V., Popovska-Mitrovikj, A., Andonov, S.: Application of machine learning in cryptanalysis concerning algorithms from symmetric cryptography. In: Arai, K. (ed.) Intelligent Computing. LNNS, vol. 285, pp. 885\u2013903. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-80129-8_59"},{"issue":"2","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.25195\/ijci.v44i2.51","volume":"44","author":"MS Mahdi","year":"2018","unstructured":"Mahdi, M.S., Hassan, N.F.A.: Suggested super salsa stream cipher. E. Iraqi J. Comput. Inform. 44(2), 1\u20136 (2018)","journal-title":"Iraqi J. Comput. Inform."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Kubba, Z.M.J., Hoomod, H.K.: A hybrid modified lightweight algorithm combined of two cryptography algorithms PRESENT and Salsa20 using chaotic system. In: The 1st International Conference of Computer and Applied Sciences (CAS), pp. 199\u2013203. IEEE, Baghdad (2019)","DOI":"10.1109\/CAS47993.2019.9075488"},{"issue":"1","key":"3_CR4","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1515\/jisys-2021-0083","volume":"30","author":"SA Kashinath","year":"2021","unstructured":"Kashinath, S.A., Mostafa, S.A., Lim, D., Mustapha, A., Hafit, H., Darman, R.: A general framework of multiple coordinative data fusion modules for real-time and heterogeneous data sources. J. Intell. Syst. 30(1), 947\u2013965 (2021)","journal-title":"J. Intell. Syst."},{"issue":"2","key":"3_CR5","first-page":"310","volume":"11","author":"M Almazrooie","year":"2015","unstructured":"Almazrooie, M., Samsudin, A., Singh, M.M.: Improving the diffusion of the stream cipher salsa20 by employing a chaotic logistic map. J. Inf. Process. Syst. 11(2), 310\u2013324 (2015)","journal-title":"J. Inf. Process. Syst."},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J.: The Salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 84\u201397. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68351-3_8"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Nugrahtama, A.L., Pramadi, Y.R.: Pramadi, implementation of Salsa20 stream cipher algorithm as an alternative cipher suite SSL-VPN for VOIP security. In: IOP Conference Series: Materials Science and Engineering, vol. 508, no. 1, p. 012132. IOP Publishing (2019)","DOI":"10.1088\/1757-899X\/508\/1\/012132"},{"issue":"2","key":"3_CR8","first-page":"5","volume":"9","author":"A Gaeini","year":"2016","unstructured":"Gaeini, A., Mirghadri, A., Jandaghi, G., Keshavarzi, B.: Comparing some pseudorandom number generators and cryptography algorithms using a general evaluation pattern. Int. J. Inf. Technol. Comput. Sci. 9(2), 5\u201331 (2016)","journal-title":"Int. J. Inf. Technol. Comput. Sci."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Zhai, F., Liang, X., Miao, S., Zhu, Y.: A lightweight secure access protocol for collecting terminals in power internet of things based on symmetric cryptographic algorithm. In: Journal of Physics: Conference Series, vol. 1920, no. 1, p. 012051. IOP Publishing (2021)","DOI":"10.1088\/1742-6596\/1920\/1\/012051"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Henriques, M.S., Vernekar, N.K.: Using symmetric and asymmetric cryptography to secure communication between devices in IoT0. In: 2017 International Conference on IoT and Application (ICIOT), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/ICIOTA.2017.8073643"},{"issue":"3","key":"3_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i3\/80087","volume":"9","author":"R Sobti","year":"2016","unstructured":"Sobti, R., Ganesan, G.: Analysis of quarter rounds of Salsa and ChaCha core and proposal of an alternative design to maximize diffusion. Indian J. Sci. Technol. 9(3), 1\u201310 (2016)","journal-title":"Indian J. Sci. Technol."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Mohaisen, E.L., Mohammed, R.S.: Stream cipher based on chaotic maps. In: 1st International Conference of Computer and Applied Sciences (CAS), pp. 256\u2013261. IEEE, Baghdad (2019)","DOI":"10.1109\/CAS47993.2019.9075490"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"103125","DOI":"10.1016\/j.micpro.2020.103125","volume":"77","author":"CB Basha","year":"2020","unstructured":"Basha, C.B., Rajaprakash, S.: Enhancing the security using SRB18 method of embedding computing. Microprocess. Microsyst. 77, 103125 (2020)","journal-title":"Microprocess. Microsyst."},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Kubba, Z.M.J., Hoomod, H.K.: Modified PRESENT Encryption algorithm based on new 5D chaotic system. In: IOP Conference Series: Materials Science and Engineering, vol. 928, no. 3, p. 032023. IOP Publishing (2020)","DOI":"10.1088\/1757-899X\/928\/3\/032023"},{"issue":"4","key":"3_CR15","first-page":"593","volume":"19","author":"S Rajendran","year":"2017","unstructured":"Rajendran, S., Doraipandian, M.: Chaotic map based random image steganography using LSB technique. Int. J. Netw. Secur. 19(4), 593\u2013598 (2017)","journal-title":"Int. J. Netw. Secur."},{"issue":"6","key":"3_CR16","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1016\/j.cnsns.2010.09.021","volume":"16","author":"EJ Yoon","year":"2011","unstructured":"Yoon, E.J., Jeon, I.S.: An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 2383\u20132389 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1515\/jisys-2021-0042","volume":"30","author":"FM Aswad","year":"2021","unstructured":"Aswad, F.M., Salman, I., Mostafa, S.A.: An optimization of color halftone visual cryptography scheme based on Bat algorithm. J. Intell. Syst. 30(1), 816\u2013835 (2021)","journal-title":"J. Intell. Syst."},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.dam.2017.04.034","volume":"227","author":"S Dey","year":"2017","unstructured":"Dey, S., Sarkar, S.: Improved analysis for reduced round Salsa and Chacha. Discret. Appl. Math. 227, 58\u201369 (2017)","journal-title":"Discret. Appl. Math."},{"issue":"1","key":"3_CR19","first-page":"704","volume":"63","author":"AH Fadel","year":"2020","unstructured":"Fadel, A.H., Hameed, R.S., Hasoon, J.N., Mostafa, S.A., Khalaf, B.A.: A Lightweight ESalsa20 Ciphering based on 1D Logistic and Chebyshev chaotic maps. Solid State Technol. 63(1), 704\u2013717 (2020)","journal-title":"Solid State Technol."},{"issue":"4","key":"3_CR20","first-page":"2117","volume":"59","author":"AT Ibtisam","year":"2018","unstructured":"Ibtisam, A.T., Hameed, S.M.: A new Color image Encryption based on multi Chaotic Maps. Iraqi J. Sci. 59(4), 2117\u20132127 (2018)","journal-title":"Iraqi J. Sci."},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5542919","volume":"2021","author":"BA Khalaf","year":"2021","unstructured":"Khalaf, B.A., et al.: An adaptive protection of flooding attacks model for complex network environments. Secur. Commun. Netw. 2021, 1\u201317 (2021)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"3_CR22","doi-asserted-by":"publisher","first-page":"213","DOI":"10.30534\/ijeter\/2020\/3381.12020","volume":"8","author":"OS Babatunde","year":"2020","unstructured":"Babatunde, O.S., Ahmad, A.R., Mostafa, S.A.: A smart network intrusion detection system based on network data analyzer and support vector machine. Int. J. Emerg. Trends Eng. Res. 8(1), 213\u2013220 (2020)","journal-title":"Int. J. Emerg. Trends Eng. Res."},{"issue":"2","key":"3_CR23","doi-asserted-by":"publisher","first-page":"827","DOI":"10.11591\/eei.v9i2.2075","volume":"9","author":"SA Mostafa","year":"2020","unstructured":"Mostafa, S.A., Mustapha, A., Shamala, P., Obaid, O.I., Khalaf, B.A.: Social networking mobile apps framework for organizing and facilitating charitable and voluntary activities in Malaysia. Bull. Electr. Eng. Inform, 9(2), 827\u2013833 (2020)","journal-title":"Bull. Electr. Eng. Inform,"},{"issue":"1","key":"3_CR24","doi-asserted-by":"publisher","first-page":"337","DOI":"10.11591\/eei.v10i1.2521","volume":"10","author":"HA Ismael","year":"2021","unstructured":"Ismael, H.A., Abbas, J.M., Mostafa, S.A., Fadel, A.H.: An enhanced fireworks algorithm to generate prime key for multiple users in fingerprinting domain. Bulletin of Electrical Engineering and Informatics 10(1), 337\u2013343 (2021)","journal-title":"Bulletin of Electrical Engineering and Informatics"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T15:47:41Z","timestamp":1726242461000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}