{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:49Z","timestamp":1762004929563,"version":"3.41.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T00:00:00Z","timestamp":1501027200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10586-017-1062-6","type":"journal-article","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T17:12:49Z","timestamp":1501089169000},"page":"905-919","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["On the use of chaotic iterations to design keyed hash function"],"prefix":"10.1007","volume":"22","author":[{"given":"Zhuosheng","family":"Lin","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Guyeux","sequence":"additional","affiliation":[]},{"given":"Simin","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Qianxue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuting","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"issue":"2","key":"1062_CR1","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1260\/1748-3018.4.2.167","volume":"4","author":"JM Bahi","year":"2010","unstructured":"Bahi, J.M., Guyeux, C.: Hash functions using chaotic iterations. J. Algorithms Comput. Technol. 4(2), 167\u2013181 (2010)","journal-title":"J. Algorithms Comput. Technol."},{"key":"1062_CR2","doi-asserted-by":"publisher","DOI":"10.1201\/b14979","volume-title":"Discrete Dynamical Systems and Chaotic Machines: Theory and Applications","author":"JM Bahi","year":"2013","unstructured":"Bahi, J.M., Guyeux, C.: Discrete Dynamical Systems and Chaotic Machines: Theory and Applications. CRC Press, Boca Raton (2013)"},{"key":"1062_CR3","doi-asserted-by":"crossref","unstructured":"Bahi, J.M., Guyeux, C., Wang, Q.: A novel pseudo-random generator based on discrete chaotic iterations. INTERNET\u201909. 1-st International Conference on Evolving Internet, pp. 71\u201376. Cannes, France (2009)","DOI":"10.1109\/INTERNET.2009.18"},{"key":"1062_CR4","doi-asserted-by":"crossref","unstructured":"Bahi, J.M., Couchot, J.F., Guyeux, C., Richard, A.: On the link between strongly connected iteration graphs and chaotic boolean discrete-time dynamical systems. In: Fundamentals of Computation Theory, pp. 126\u2013137. Springer (2011)","DOI":"10.1007\/978-3-642-22953-4_11"},{"key":"1062_CR5","doi-asserted-by":"crossref","unstructured":"Bahi, J., Friot, N., Guyeux, C.: Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure. IIH-MSP\u20192012. 8-th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 359\u2013362. IEEE Computer Society, Piraeus-Athens, Greece (2012)","DOI":"10.1109\/IIH-MSP.2012.93"},{"issue":"5","key":"1062_CR6","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1016\/j.cnsns.2009.05.065","volume":"15","author":"S Deng","year":"2010","unstructured":"Deng, S., Li, Y., Xiao, D.: Analysis and improvement of a chaos-based hash function construction. Commun. Nonlinear Sci. Numer. Simul. 15(5), 1338\u20131347 (2010)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"1062_CR7","volume-title":"An Introduction to Chaotic Dynamical Systems","author":"RL Devaney","year":"1989","unstructured":"Devaney, R.L.: An Introduction to Chaotic Dynamical Systems. Addison-Wesley Reading, Boston (1989)"},{"key":"1062_CR8","unstructured":"Fang, X., Guyeux, C., Wang, Q., Bahi, J.: Randomness and disorder of chaotic iterations. Applications in information security field. NOLTA 2015, International Symposium on Nonlinear Theory and its Applications, pp. 1\u20134. China, Hong Kong (2015)"},{"issue":"373","key":"1062_CR9","doi-asserted-by":"publisher","first-page":"3201","DOI":"10.1016\/j.physleta.2009.07.016","volume":"373","author":"W Guo","year":"2009","unstructured":"Guo, W., Wang, X., He, D., Yang, C.: Cryptanalysis on a parallel keyed hash function based on chaotic maps. Phys. Lett. A 373(373), 3201\u20133206 (2009)","journal-title":"Phys. Lett. A"},{"key":"1062_CR10","doi-asserted-by":"crossref","unstructured":"Guyeux, C., Bahi, J.M.: Topological chaos and chaotic iterations application to hash functions. In: Neural Networks (IJCNN), The 2010 International Joint Conference on, pp. 1\u20137. IEEE (2010)","DOI":"10.1109\/IJCNN.2010.5596512"},{"key":"1062_CR11","doi-asserted-by":"crossref","unstructured":"Guyeux, C., Bahi, J.: A topological study of chaotic iterations. application to hash functions. In: CIPS, Computational Intelligence for Privacy and Security, Studies in Computational Intelligence, vol. 394, pp. 51\u201373. Springer (2012). Revised and extended journal version of an IJCNN best paper","DOI":"10.1007\/978-3-642-25237-2_5"},{"key":"1062_CR12","unstructured":"Guyeux, C., Wang, Q., Fang, X., Bahi, J.M.: Introducing the truly chaotic finite state machines and theirs applications in security field. In: Nolta 2014, International Symposium on Nonlinear Theory and ITS Applications (2014)"},{"issue":"10","key":"1062_CR13","doi-asserted-by":"publisher","first-page":"3877","DOI":"10.1007\/s11227-015-1479-8","volume":"71","author":"C Guyeux","year":"2015","unstructured":"Guyeux, C., Couturier, R., H\u00e9am, P.C., Bahi, J.M.: Efficient and cryptographically secure generation of chaotic pseudorandom numbers on gpu. J. Supercomput. 71(10), 3877\u20133903 (2015)","journal-title":"J. Supercomput."},{"issue":"1","key":"1062_CR14","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.cnsns.2012.06.019","volume":"18","author":"A Kanso","year":"2013","unstructured":"Kanso, A., Ghebleh, M.: A fast and efficient chaos-based keyed hash function. Commun. Nonlinear Sci. Numer. Simul. 18(1), 109\u2013123 (2013)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"1\u20132","key":"1062_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11071-015-1970-z","volume":"81","author":"A Kanso","year":"2015","unstructured":"Kanso, A., Ghebleh, M.: A structure-based chaotic hashing scheme. Nonlinear Dyn. 81(1\u20132), 27\u201340 (2015)","journal-title":"Nonlinear Dyn."},{"key":"1062_CR16","unstructured":"L\u2019Ecuyer, P., Simard, R.J.: TestU01: A C library for empirical testing of random number generators. ACM Trans. Math. Softw.(2007). URL http:\/\/doi.acm.org\/10.1145\/1268776.1268777"},{"issue":"10","key":"1062_CR17","doi-asserted-by":"publisher","first-page":"3119","DOI":"10.1142\/S0218127405014052","volume":"15","author":"S Li","year":"2005","unstructured":"Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 15(10), 3119\u20133151 (2005)","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"1","key":"1062_CR18","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00521-010-0432-2","volume":"20","author":"Y Li","year":"2011","unstructured":"Li, Y., Deng, S., Xiao, D.: A novel hash algorithm construction based on chaotic neural network. Neural Comput. Appl. 20(1), 133\u2013141 (2011)","journal-title":"Neural Comput. Appl."},{"issue":"23","key":"1062_CR19","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.ins.2012.06.001","volume":"214","author":"Y Li","year":"2012","unstructured":"Li, Y., Xiao, D., Deng, S.: Keyed hash function based on a dynamic lookup table of functions. Inform. Sci. 214(23), 56\u201375 (2012)","journal-title":"Inform. Sci."},{"key":"1062_CR20","doi-asserted-by":"publisher","unstructured":"Li, Y., Ge, G., Xia, D.: Chaotic hash function based on the dynamic s-box with variable parameters. Nonlinear Dyn. (2016). doi: 10.1007\/s11071-016-2652-1","DOI":"10.1007\/s11071-016-2652-1"},{"key":"1062_CR21","first-page":"014","volume":"7","author":"J Liu","year":"2000","unstructured":"Liu, J., Xie, J., Wang, P.: One way hash function construction based on chaotic mappings. J. Tsinghua Univ. 7, 014 (2000)","journal-title":"J. Tsinghua Univ."},{"issue":"6","key":"1062_CR22","first-page":"84","volume":"21","author":"Y Luo","year":"2012","unstructured":"Luo, Y., Du, M.: One-way hash function construction based on the spatiotemporal chaotic system. Chin. Phys. B 21(6), 84\u201393 (2012)","journal-title":"Chin. Phys. B"},{"key":"1062_CR23","unstructured":"Marsaglia, G.: Diehard: a battery of tests of randomness. http:\/\/stat.fsu.edu\/~geo\/diehard.html (1996)"},{"key":"1062_CR24","unstructured":"NIST: Sha-3 standardization. Tech. rep., National Institute of Standards and Technology (2013-2015). URL http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/sha-3_standardization.html"},{"issue":"4","key":"1062_CR25","doi-asserted-by":"publisher","first-page":"2014","DOI":"10.1016\/j.chaos.2009.03.168","volume":"42","author":"H Ren","year":"2009","unstructured":"Ren, H., Wang, Y., Xie, Q., Yang, H.: A novel method for one-way hash function construction based on spatiotemporal chaos. Chaos Solitons Fractals 42(4), 2014\u20132022 (2009)","journal-title":"Chaos Solitons Fractals"},{"key":"1062_CR26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1186","volume-title":"The MD4 Message Digest Algorithm","author":"RL Rivest","year":"1990","unstructured":"Rivest, R.L.: The MD4 Message Digest Algorithm. Springer, Berlin Heidelberg (1990)"},{"issue":"3","key":"1062_CR27","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1007\/s11071-015-2049-6","volume":"81","author":"JS Teh","year":"2015","unstructured":"Teh, J.S., Samsudin, A., Akhavan, A.: Parallel chaotic hash function based on the shuffle-exchange network. Nonlinear Dyn. 81(3), 1067\u20131079 (2015)","journal-title":"Nonlinear Dyn."},{"issue":"16","key":"1062_CR28","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.1016\/j.cnsns.2010.10.001","volume":"16","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Wong, K.W., Xiao, D.: Parallel hash function construction based on coupled map lattices. Commun. Nonlinear Sci. Numer. Simul. 16(16), 2810\u20132821 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"1062_CR29","doi-asserted-by":"crossref","unstructured":"Webster, A.F., Tavares, S.E.: On the design of s-boxes. In: Advances in Cryptology, pp. 523\u2013534 (1970)","DOI":"10.1007\/3-540-39799-X_41"},{"issue":"26","key":"1062_CR30","doi-asserted-by":"publisher","first-page":"4682","DOI":"10.1016\/j.physleta.2008.04.060","volume":"372","author":"D Xiao","year":"2008","unstructured":"Xiao, D., Liao, X., Deng, S.: Parallel keyed hash function construction based on chaotic maps. Phys. Lett. A 372(26), 4682\u20134688 (2008)","journal-title":"Phys. Lett. A"},{"issue":"373","key":"1062_CR31","doi-asserted-by":"publisher","first-page":"4346","DOI":"10.1016\/j.physleta.2009.09.059","volume":"373","author":"D Xiao","year":"2009","unstructured":"Xiao, D., Liao, X., Wang, Y.: Improving the security of a parallel keyed hash function based on chaotic maps. Phys. Lett. A 373(373), 4346\u20134353 (2009)","journal-title":"Phys. Lett. A"},{"issue":"10\u201312","key":"1062_CR32","doi-asserted-by":"publisher","first-page":"2288","DOI":"10.1016\/j.neucom.2008.12.031","volume":"72","author":"D Xiao","year":"2009","unstructured":"Xiao, D., Liao, X., Wang, Y.: Parallel keyed hash function construction based on chaotic neural network. Neurocomputing 72(10\u201312), 2288\u20132296 (2009)","journal-title":"Neurocomputing"},{"issue":"9","key":"1062_CR33","doi-asserted-by":"publisher","first-page":"2254","DOI":"10.1016\/j.cnsns.2009.10.012","volume":"15","author":"D Xiao","year":"2010","unstructured":"Xiao, D., Shih, F.Y., Liao, X.: A chaos-based hash function with both modification detection and localization capabilities. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2254\u20132261 (2010)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"362","key":"1062_CR34","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.physleta.2006.10.052","volume":"362","author":"J Zhang","year":"2007","unstructured":"Zhang, J., Wang, X., Zhang, W.: Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter. Phys. Lett. A 362(362), 439\u2013448 (2007)","journal-title":"Phys. Lett. A"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1062-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1062-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1062-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T18:12:20Z","timestamp":1750788740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1062-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,26]]},"references-count":34,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["1062"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1062-6","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2017,7,26]]},"assertion":[{"value":"2 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}