{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T07:14:36Z","timestamp":1774682076414,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,3,24]],"date-time":"2013-03-24T00:00:00Z","timestamp":1364083200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s00530-013-0314-4","type":"journal-article","created":{"date-parts":[[2013,3,23]],"date-time":"2013-03-23T03:27:25Z","timestamp":1364009245000},"page":"45-64","source":"Crossref","is-referenced-by-count":153,"title":["A novel image encryption based on hash function with only two-round diffusion process"],"prefix":"10.1007","volume":"20","author":[{"given":"Benyamin","family":"Norouzi","sequence":"first","affiliation":[]},{"given":"Seyed Mohammad","family":"Seyedzadeh","sequence":"additional","affiliation":[]},{"given":"Sattar","family":"Mirzakuchaki","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Mosavi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,24]]},"reference":[{"key":"314_CR1","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. J. Chaos Solitons Fractals 21, 749\u2013761 (2004)","journal-title":"J. Chaos Solitons Fractals"},{"key":"314_CR2","doi-asserted-by":"crossref","first-page":"2722","DOI":"10.1016\/j.optcom.2009.03.075","volume":"282","author":"X Tong","year":"2009","unstructured":"Tong, X., Cui, M., Wang, Z.: A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. J. Opt. Commun. 282, 2722\u20132728 (2009)","journal-title":"J. Opt. Commun."},{"key":"314_CR3","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.jss.2011.08.017","volume":"85","author":"X Wei","year":"2012","unstructured":"Wei, X., Guo, L., Zhang, Q., Zhang, J., Lian, S.: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 85, 290\u2013299 (2012)","journal-title":"J. Syst. Softw."},{"key":"314_CR4","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/S0375-9601(99)00747-1","volume":"263","author":"E Alvarez","year":"1999","unstructured":"Alvarez, E., Fernandez, A., Garc\u00eda, P., Jimenez, J., Marcano, A.: New approach to chaotic encryption. J. Phys. Lett. A 263, 373\u2013375 (1999)","journal-title":"J. Phys. Lett. A"},{"key":"314_CR5","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0375-9601(00)00642-3","volume":"276","author":"G Alvarez","year":"2000","unstructured":"Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a chaotic encryption system. J. Phys. Lett. A 276, 191\u2013196 (2000)","journal-title":"J. Phys. Lett. A"},{"key":"314_CR6","first-page":"49","volume":"4","author":"JC Yen","year":"2000","unstructured":"Yen, J.C., Guo, J.I.: A new chaotic key-based design for image encryption and decryption. Proc. IEEE Int. Conf. Circuits Syst. 4, 49\u201352 (2000)","journal-title":"Proc. IEEE Int. Conf. Circuits Syst."},{"key":"314_CR7","first-page":"708","volume":"2","author":"S Li","year":"2002","unstructured":"Li, S., Zheng, X.: Cryptanalysis of a chaotic image encryption method. Proc. IEEE Int. Symp. Circuits Syst. 2, 708\u2013711 (2002)","journal-title":"Proc. IEEE Int. Symp. Circuits Syst."},{"key":"314_CR8","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1016\/j.optcom.2009.10.106","volume":"283","author":"A Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: A hash-based image encryption algorithm. J. Opt. Commun. 283, 879\u2013893 (2010)","journal-title":"J. Opt. Commun."},{"key":"314_CR9","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/978-3-540-25937-4_24","volume":"3017","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. J. Fast Softw. Encryption 3017, 371\u2013388 (2004)","journal-title":"J. Fast Softw. Encryption"},{"key":"314_CR10","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1016\/j.ins.2007.10.008","volume":"178","author":"Y Wang","year":"2008","unstructured":"Wang, Y., Liao, X., Xiao, D., Wong, K.W.: One-way hash function construction based on 2D coupled map lattices. J. Inf. Sci. 178, 1391\u20131406 (2008)","journal-title":"J. Inf. Sci."},{"key":"314_CR11","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0030-4018(03)01261-6","volume":"218","author":"A Sinha","year":"2003","unstructured":"Sinha, A., Singh, K.: A technique for image encryption using digital signature. J. Opt. Commun. 218, 229\u2013234 (2003)","journal-title":"J. Opt. Commun."},{"key":"314_CR12","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.optcom.2006.07.043","volume":"268","author":"LH Encinas","year":"2006","unstructured":"Encinas, L.H., Dominguez, A.P.: Comment on \u2018A technique for image encryption using digital signature\u2019. J. Opt. Commun. 268, 261\u2013265 (2006)","journal-title":"J. Opt. Commun."},{"key":"314_CR13","doi-asserted-by":"crossref","unstructured":"Seyedzade, S.M., Atani, R.E., Mirzakuchaki, S.: A novel image encryption algorithm based on hash function. In: Iranian Conference on Machine Vision and Image Processing, No. 5941167 (2010)","DOI":"10.1109\/IranianMVIP.2010.5941167"},{"key":"314_CR14","doi-asserted-by":"crossref","unstructured":"Belkhouche, F., Qidwai, U.: Binary image encoding using one-dimensional chaotic map. In: Proceedings of the IEEE Annual Technical Conference, pp. 39\u201343 (2003)","DOI":"10.1109\/REG5.2003.1199708"},{"key":"314_CR15","unstructured":"Bernstein, D.J.: Salsa20 specification. http:\/\/cr.yp.to\/snuffle.html#xsalsa (2005)"},{"key":"314_CR16","doi-asserted-by":"crossref","unstructured":"Borujeni, S.E., Eshghi, M.: Chaotic image encryption system using phase-magnitude transformation and pixel substitution. J. Telecommun. Syst. (2011). doi: 10.1007\/s11235-011-9458-8","DOI":"10.1007\/s11235-011-9458-8"},{"key":"314_CR17","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1016\/j.sigpro.2011.11.004","volume":"92","author":"SM Seyedzadeh","year":"2012","unstructured":"Seyedzadeh, S.M., Mirzakuchaki, S.: A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. J. Signal Process. 92, 1202\u20131215 (2012)","journal-title":"J. Signal Process."},{"key":"314_CR18","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/j.optcom.2011.08.079","volume":"285","author":"C Zhu","year":"2012","unstructured":"Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. J. Opt. Commun. 285, 29\u201337 (2012)","journal-title":"J. Opt. Commun."},{"key":"314_CR19","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.cnsns.2010.04.010","volume":"16","author":"A Kumar","year":"2011","unstructured":"Kumar, A., Ghose, M.K.: Extended substitution\u2013diffusion based image cipher using chaotic standard map. J. Commun. Nonlinear Sci. Numer. Simul. 16, 372\u2013382 (2011)","journal-title":"J. Commun. Nonlinear Sci. Numer. Simul."},{"key":"314_CR20","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1016\/j.optcom.2011.02.039","volume":"284","author":"G Zhang","year":"2011","unstructured":"Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. J. Opt. Commun. 284, 2775\u20132780 (2011)","journal-title":"J. Opt. Commun."},{"key":"314_CR21","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1016\/j.chaos.2009.03.084","volume":"42","author":"S Mazloom","year":"2009","unstructured":"Mazloom, S., Eftekhari-Moghadam, A.M.: Color image encryption based on coupled nonlinear chaotic map. J. Chaos Solitons Fractals 42, 1745\u20131754 (2009)","journal-title":"J. Chaos Solitons Fractals"},{"key":"314_CR22","doi-asserted-by":"crossref","unstructured":"Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. J. Telecommun. Syst. (2011). doi: 10.1007\/s11235-011-9461-0","DOI":"10.1007\/s11235-011-9461-0"},{"key":"314_CR23","doi-asserted-by":"crossref","first-page":"3259","DOI":"10.1016\/j.optcom.2010.04.056","volume":"283","author":"A Akhshani","year":"2010","unstructured":"Akhshani, A., Behnia, S., Akhavan, A., Hassan, H.A., Hassan, Z.: A novel scheme for image encryption based on 2D piecewise chaotic maps. J. Opt. Commun. 283, 3259\u20133266 (2010)","journal-title":"J. Opt. Commun."},{"key":"314_CR24","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1016\/j.chaos.2008.01.028","volume":"38","author":"F Sun","year":"2008","unstructured":"Sun, F., Liu, S., Li, Z., Lu, Z.: A novel image encryption scheme based on spatial chaos map. J. Chaos Solitons Fractals 38, 631\u2013640 (2008)","journal-title":"J. Chaos Solitons Fractals"},{"key":"314_CR25","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.physleta.2007.01.081","volume":"366","author":"S Behnia","year":"2007","unstructured":"Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A.: A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. J. Phys. Lett. A 366, 391\u2013396 (2007)","journal-title":"J. Phys. Lett. A"},{"key":"314_CR26","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Wong, K.W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. J. Appl. Soft Comput. 11, 514\u2013522 (2011)","journal-title":"J. Appl. Soft Comput."},{"key":"314_CR27","doi-asserted-by":"crossref","first-page":"1518","DOI":"10.1016\/j.chaos.2005.11.090","volume":"32","author":"HS Kwok","year":"2007","unstructured":"Kwok, H.S., Tang, W.K.S.: A fast image encryption system based on chaotic maps with finite precision representation. J. Chaos Solitons Fractals 32, 1518\u20131529 (2007)","journal-title":"J. Chaos Solitons Fractals"},{"key":"314_CR28","doi-asserted-by":"crossref","first-page":"5973","DOI":"10.1016\/j.physleta.2008.07.057","volume":"372","author":"R Rhouma","year":"2008","unstructured":"Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. J. Phys. Lett. A 372, 5973\u20135978 (2008)","journal-title":"J. Phys. Lett. A"},{"key":"314_CR29","doi-asserted-by":"crossref","first-page":"1362","DOI":"10.1016\/j.physleta.2010.01.024","volume":"374","author":"X Ge","year":"2010","unstructured":"Ge, X., Liu, F., Lu, B., Yang, C.: Improvement of Rhouma\u2019s attacks on Gao algorithm. J. Phys. Lett. A 374, 1362\u20131367 (2010)","journal-title":"J. Phys. Lett. A"},{"key":"314_CR30","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. J. Chaos Solitons Fractals 35, 408\u2013419 (2008)","journal-title":"J. Chaos Solitons Fractals"},{"key":"314_CR31","doi-asserted-by":"crossref","first-page":"2028","DOI":"10.1016\/j.mcm.2010.06.005","volume":"52","author":"Q Zhang","year":"2010","unstructured":"Zhang, Q., Guo, L., Wei, X.: Image encryption using DNA addition combining with chaotic maps. J. Math. Comput. Model. 52, 2028\u20132035 (2010)","journal-title":"J. Math. Comput. Model."},{"key":"314_CR32","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu, Z.L., Zhang, W., Wong, K.W., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. J. Inf. Sci. 181, 1171\u20131186 (2011)","journal-title":"J. Inf. Sci."},{"key":"314_CR33","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.physleta.2007.07.040","volume":"372","author":"T Gao","year":"2008","unstructured":"Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. J. Phys. Lett. A 372, 394\u2013400 (2008)","journal-title":"J. Phys. Lett. A"},{"key":"314_CR34","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.chaos.2006.11.009","volume":"38","author":"T Gao","year":"2008","unstructured":"Gao, T., Chen, Z.: Image encryption based on a new total shuffling algorithm. J. Chaos Solitons Fractals 38, 213\u2013220 (2008)","journal-title":"J. Chaos Solitons Fractals"},{"key":"314_CR35","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.chaos.2005.08.110","volume":"29","author":"H Gao","year":"2006","unstructured":"Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. J. Chaos Solitons Fractals 29, 393\u2013399 (2006)","journal-title":"J. Chaos Solitons Fractals"},{"key":"314_CR36","doi-asserted-by":"crossref","first-page":"3303","DOI":"10.1016\/j.cnsns.2011.12.015","volume":"17","author":"L Zhao","year":"2012","unstructured":"Zhao, L., Adhikari, A., Xiao, D., Sakurai, K.: On the Security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption. J. Commun. Nonlinear Sci. Numer. Simulat. 17, 3303\u20133327 (2012)","journal-title":"J. Commun. Nonlinear Sci. Numer. Simulat."},{"issue":"4","key":"314_CR37","doi-asserted-by":"crossref","first-page":"2411","DOI":"10.1007\/s11071-011-0155-7","volume":"67","author":"X Huang","year":"2012","unstructured":"Huang, X.: Image encryption algorithm using chaotic Chebyshev generator. J. Nonlinear Dyn. 67(4), 2411\u20132417 (2012)","journal-title":"J. Nonlinear Dyn."},{"key":"314_CR38","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.image.2011.11.003","volume":"27","author":"M Francois","year":"2012","unstructured":"Francois, M., Grosges, T., Barchiesi, D., Erra, R.: A new image encryption scheme based on a chaotic function. J. Signal Process. Image Commun. 27, 249\u2013259 (2012)","journal-title":"J. Signal Process. Image Commun."},{"key":"314_CR39","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1016\/j.optcom.2011.11.044","volume":"285","author":"Y Zhou","year":"2010","unstructured":"Zhou, Y., Panetta, K., Agaian, S., Chen, C.L.P.: Image encryption using P-Fibonacci transform and decomposition. J. Opt. Commun. 285, 594\u2013608 (2010)","journal-title":"J. Opt. Commun."},{"key":"314_CR40","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.chaos.2004.11.096","volume":"26","author":"S Lian","year":"2005","unstructured":"Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. J. Chaos Solitons Fractals 26, 117\u2013129 (2005)","journal-title":"J. Chaos Solitons Fractals"},{"key":"314_CR41","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1155\/S1110865703309011","volume":"13","author":"HC Chen","year":"2003","unstructured":"Chen, H.C., Guo, J.I., Huang, L.C., Yen, J.C.: Design and realization of a new signal security system for multimedia data transmission. J. EURASIP J. Appl. Signal Process. 13, 1291\u20131305 (2003)","journal-title":"J. EURASIP J. Appl. Signal Process."},{"key":"314_CR42","doi-asserted-by":"crossref","first-page":"5092","DOI":"10.1016\/j.asoc.2011.05.050","volume":"11","author":"CH Yuen","year":"2011","unstructured":"Yuen, C.H., Wong, K.W.: A chaos-based joint image compression and encryption scheme using DCT and SHA-1. J. Appl. Soft Comput. 11, 5092\u20135098 (2011)","journal-title":"J. Appl. Soft Comput."},{"key":"314_CR43","doi-asserted-by":"crossref","first-page":"2465","DOI":"10.1016\/j.sigpro.2009.04.022","volume":"89","author":"A Cheddad","year":"2009","unstructured":"Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: A skin tone detection algorithm for an adaptive approach to steganography. J. Signal Process. 89, 2465\u20132478 (2009)","journal-title":"J. Signal Process."},{"key":"314_CR44","doi-asserted-by":"crossref","first-page":"2324","DOI":"10.1016\/j.sigpro.2009.02.001","volume":"89","author":"A Cheddad","year":"2009","unstructured":"Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: A secure and improved self-embedding algorithm to combat digital document forgery. J. Signal Process. 89, 2324\u20132332 (2009)","journal-title":"J. Signal Process."},{"key":"314_CR45","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s00530-004-0133-8","volume":"10","author":"TS Chen","year":"2004","unstructured":"Chen, T.S., Chen, J., Chen, J.G.: A simple and efficient watermark technique based on JPEG2000 Codec. Multimed. Syst. 10, 16\u201326 (2004)","journal-title":"Multimed. Syst."},{"key":"314_CR46","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s00530-003-0083-6","volume":"9","author":"EC Chang","year":"2003","unstructured":"Chang, E.C., Kankanhalli, M.S., Guan, X., Huang, Z., Wu, Y.: Robust image authentication using content based compression. Multimed. Syst. 9, 121\u2013130 (2003)","journal-title":"Multimed. Syst."},{"key":"314_CR47","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s00530-003-0096-1","volume":"9","author":"H Guo","year":"2003","unstructured":"Guo, H., Georganas, N.D.: A novel approach to digital image watermarking based on a generalized secret sharing scheme. Multimed. Syst. 9, 249\u2013260 (2003)","journal-title":"Multimed. Syst."},{"key":"314_CR48","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/s00530-003-0099-y","volume":"9","author":"A Pommer","year":"2003","unstructured":"Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimed. Syst. 9, 279\u2013287 (2003)","journal-title":"Multimed. Syst."},{"key":"314_CR49","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s00530-003-0097-0","volume":"9","author":"IK Yeo","year":"2003","unstructured":"Yeo, I.K., Kim, H.J.: Generalized patchwork algorithm for image watermarking. Multimed. Syst. 9, 261\u2013265 (2003)","journal-title":"Multimed. Syst."},{"key":"314_CR50","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1007\/s00530-003-0115-2","volume":"9","author":"J Jiang","year":"2004","unstructured":"Jiang, J., Armstrong, A., Feng, G.C.: Web-based image indexing and retrieval in JPEG compressed domain. Multimed. Syst. 9, 424\u2013432 (2004)","journal-title":"Multimed. Syst."},{"key":"314_CR51","doi-asserted-by":"crossref","unstructured":"Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. (2012). doi: 10.1007\/s11042-012-1292-9","DOI":"10.1007\/s11042-012-1292-9"},{"key":"314_CR52","doi-asserted-by":"crossref","unstructured":"Seyedzadeh, S.M., Mirzakuchaki, S.: Image encryption scheme based on Choquet fuzzy integral with pseudo-random keystream generator. In: 11th International Symposium on Artificial Intelligence and Signal Processing (AISP), June 2011, pp. 101\u2013106","DOI":"10.1109\/AISP.2011.5960982"},{"key":"314_CR53","doi-asserted-by":"crossref","unstructured":"Seyedzadeh, S.M., Hashemi, Y.: Image encryption algorithm based on Choquet fuzzy integral with self-adaptive pseudo-random number generator. In: 11th International Conference on Intelligent Systems Design and Applications (ISDA), November 2011, pp. 642\u2013647","DOI":"10.1109\/ISDA.2011.6121728"},{"key":"314_CR54","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"314_CR55","unstructured":"Goldreich, O.: Foundations of Cryptography. Weizmann Institute of Science, Rehovot (1995) (fragment of a book)"},{"key":"314_CR56","unstructured":"Bernstein, D.: Salsa20 security. http:\/\/www.ecrypt.eu.org\/stream\/e2-salsa20.html"},{"key":"314_CR57","unstructured":"Seyedzadeh, S.M., Moosavi, S.M.S., Mirzakuchaki, S.: Using self-adaptive coupled piecewise nonlinear chaotic map for color image encryption scheme. In: 19th Iranian Conference on Electrical Engineering, pp. 1\u20136 (2011)"},{"key":"314_CR58","unstructured":"Neves, S.: Cryptography in GPUs. Master\u2019s thesis, Universidade de Coimbra, Coimbra (2009). [Online]. http:\/\/eden.dei.uc.pt\/~sneves\/gpucrypto.pdf"},{"key":"314_CR59","unstructured":"Mukherjee, P.: An overview of eSTREAM ciphers. [Online]. http:\/\/cs.au.dk\/~pratyay\/eSTREAM.pdf"},{"issue":"11","key":"314_CR60","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1016\/j.parco.2004.08.002","volume":"30","author":"M Mascagni","year":"2004","unstructured":"Mascagni, M., Chi, H.: Parallel linear congruential generators with Sophie\u2013Germain moduli. Parallel Comput. 30(11), 1217\u20131231 (2004)","journal-title":"Parallel Comput."},{"issue":"1","key":"314_CR61","first-page":"25","volume":"175","author":"P Wu","year":"2006","unstructured":"Wu, P., Huang, K.: Parallel use of multiplicative congruential random number generators. J. Parallel Comput. 175(1), 25\u201329 (2006)","journal-title":"J. Parallel Comput."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-013-0314-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00530-013-0314-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-013-0314-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T01:40:44Z","timestamp":1745977244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00530-013-0314-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,24]]},"references-count":61,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["314"],"URL":"https:\/\/doi.org\/10.1007\/s00530-013-0314-4","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,24]]}}}