{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:28:22Z","timestamp":1744900102903},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2011,8,20]],"date-time":"2011-08-20T00:00:00Z","timestamp":1313798400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s00521-011-0726-z","type":"journal-article","created":{"date-parts":[[2011,8,19]],"date-time":"2011-08-19T04:26:28Z","timestamp":1313727988000},"page":"1563-1573","source":"Crossref","is-referenced-by-count":10,"title":["Parallel chaotic Hash function construction based on cellular neural network"],"prefix":"10.1007","volume":"21","author":[{"given":"Yantao","family":"Li","sequence":"first","affiliation":[]},{"given":"Di","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Huaqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Shaojiang","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,20]]},"reference":[{"key":"726_CR1","first-page":"54","volume":"1","author":"N Sklavos","year":"2003","unstructured":"Sklavos N, Alexopoulos E, Koufopavlou O (2003) Networking data integrity: high speed architectures and hardware implementations. Int Arab J Inf Technol 1:54\u201359","journal-title":"Int Arab J Inf Technol"},{"key":"726_CR2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/141809.141812","volume":"22","author":"G Tsudik","year":"1992","unstructured":"Tsudik G (1992) Message authentication with one-way hash functions. ACM SIGCOMM Comput Commun Rev 22:29\u201338","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"726_CR3","doi-asserted-by":"crossref","unstructured":"Rompel J (1990) One-way functions are necessary and sufficient for secure signatures. In: Proceedings of the 22th annual ACM symposium on Theory of computing. ACM, Baltimore, pp 387\u2013394","DOI":"10.1145\/100216.100269"},{"key":"726_CR4","doi-asserted-by":"crossref","unstructured":"Rivest R (1992) The MD5 Message-Digest Algorithm, RFC 1321, MIT LCS and RSA Data Security Inc","DOI":"10.17487\/rfc1321"},{"key":"726_CR5","unstructured":"SHA-1 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-1 (1993) Available: http:\/\/www.itl.nist.gov\/fipspubs\/fip180-1.htm"},{"key":"726_CR6","first-page":"17","volume":"3621","author":"XY Wang","year":"2005","unstructured":"Wang XY, Yin YQ, Yu HB (2005) Finding collisions in the full SHA-1, advances in cryptology-crypto 05. LNCS 3621:17\u201336","journal-title":"LNCS"},{"key":"726_CR7","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/S0375-9601(02)01770-X","volume":"307","author":"KW Wong","year":"2003","unstructured":"Wong KW (2003) A combined chaotic cryptographic and hashing scheme. Phy Lett A 307:292\u2013298","journal-title":"Phy Lett A"},{"key":"726_CR8","doi-asserted-by":"crossref","first-page":"4043","DOI":"10.1142\/S0218127405014489","volume":"15","author":"HS Kwok","year":"2005","unstructured":"Kwok HS, Tang WKS (2005) A chaos-based cryptographic hash function for message authentication. Int J Bifurcation Chaos 15:4043\u20134050","journal-title":"Int J Bifurcation Chaos"},{"key":"726_CR9","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.chaos.2004.07.003","volume":"24","author":"D Xiao","year":"2005","unstructured":"Xiao D, Liao XF, Deng SJ (2005) One-way Hash function construction based on the chaotic map with changeable parameter. Chaos Solitons Fractals 24:65\u201371","journal-title":"Chaos Solitons Fractals"},{"key":"726_CR10","doi-asserted-by":"crossref","first-page":"4442","DOI":"10.7498\/aps.55.4442","volume":"55","author":"XF Guo","year":"2006","unstructured":"Guo XF, Zhang JS (2006) Keyed one-way Hash function construction based on the chaotic dynamic S-Box. Acta Phys Sin 55:4442\u20134449","journal-title":"Acta Phys Sin"},{"key":"726_CR11","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1016\/j.ins.2007.10.008","volume":"178","author":"Y Wang","year":"2008","unstructured":"Wang Y, Liao XF, Xiao D et al (2008) One-way hash function construction based on 2D coupled map lattices. Inf Sci 178:1391\u20131406","journal-title":"Inf Sci"},{"key":"726_CR12","doi-asserted-by":"crossref","first-page":"1046","DOI":"10.1016\/j.chaos.2009.02.044","volume":"42","author":"A Akhavan","year":"2009","unstructured":"Akhavan A, Samsudin A, Akhshani A (2009) Hash function based on piecewise nonlinear chaotic map. Chaos Solitons Fractals 42:1046\u20131053","journal-title":"Chaos Solitons Fractals"},{"key":"726_CR13","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1016\/j.chaos.2009.02.001","volume":"42","author":"M Amin","year":"2009","unstructured":"Amin M, Faragallah OS, El-latif AAA (2009) Chaos-based hash function (CBHF) for cryptographic applications. Chaos Solitons Fractals 42:767\u2013772","journal-title":"Chaos Solitons Fractals"},{"key":"726_CR14","doi-asserted-by":"crossref","first-page":"2346","DOI":"10.1016\/j.neucom.2006.04.003","volume":"69","author":"SG Lian","year":"2006","unstructured":"Lian SG, Sun JS, Wang ZQ (2006) Secure hash function based on neural network. Neurocomputing 69:2346\u20132350","journal-title":"Neurocomputing"},{"key":"726_CR15","doi-asserted-by":"crossref","first-page":"5688","DOI":"10.7498\/aps.55.5688","volume":"55","author":"GJ Liu","year":"2006","unstructured":"Liu GJ, Shan L, Dai YW et al (2006) One-way Hash function based on chaotic neural network. Acta Phys Sin 55:5688\u20135693","journal-title":"Acta Phys Sin"},{"key":"726_CR16","doi-asserted-by":"crossref","first-page":"2388","DOI":"10.1088\/1674-1056\/17\/7\/011","volume":"17","author":"QT Yang","year":"2008","unstructured":"Yang QT, Gao TG (2008) One-way hash function based on hyper-chaotic cellular neural network. Chin Phys B 17:2388\u20132393","journal-title":"Chin Phys B"},{"key":"726_CR17","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s00521-010-0432-2","volume":"20","author":"YT Li","year":"2011","unstructured":"Li YT, Deng SJ, Xiao D (2011) A novel Hash algorithm construction based on chaotic neural network. Neural Comput Appl 20:133\u2013141","journal-title":"Neural Comput Appl"},{"key":"726_CR18","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"GR Chen","year":"2004","unstructured":"Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21:749\u2013761","journal-title":"Chaos Solitons Fractals"},{"key":"726_CR19","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1103\/RevModPhys.57.617","volume":"57","author":"JP Eckmann","year":"1985","unstructured":"Eckmann JP, Ruelle D (1985) Ergodic theory of chaos and strange attractors. Rev Mod Phys 57:617\u2013656","journal-title":"Rev Mod Phys"},{"key":"726_CR20","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.comnet.2004.01.001","volume":"45","author":"CN Zhang","year":"2004","unstructured":"Zhang CN, Lai CR (2004) A systematic approach for encryption and authentication with fault tolerance. Comput Netw 45:143\u2013154","journal-title":"Comput Netw"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-011-0726-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-011-0726-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-011-0726-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T21:54:29Z","timestamp":1686261269000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-011-0726-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,20]]},"references-count":20,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["726"],"URL":"https:\/\/doi.org\/10.1007\/s00521-011-0726-z","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,20]]}}}