{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T19:01:24Z","timestamp":1771268484714,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T00:00:00Z","timestamp":1771200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-025-05924-7","type":"journal-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:03:14Z","timestamp":1771264994000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A robust PRBG based on chaotic maps enhanced with a two\u2019s complement operation"],"prefix":"10.1007","volume":"29","author":[{"given":"Shreya","family":"Deoli","sequence":"first","affiliation":[]},{"given":"Madhu","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,16]]},"reference":[{"issue":"5560","key":"5924_CR1","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"RM May","year":"1976","unstructured":"May, R.M.: Simple mathematical models with very complicated dynamics. Nature 261(5560), 459\u2013467 (1976). https:\/\/doi.org\/10.1038\/261459a0","journal-title":"Nature"},{"key":"5924_CR2","doi-asserted-by":"publisher","unstructured":"Collet, P., Eckmann, J.-P.: Iterated Maps on the Interval as Dynamical Systems, 1st edn. Modern Birkh user Classics, p. 248. Birkh user Boston, Boston, MA (2009). https:\/\/doi.org\/10.1007\/978-0-8176-4927-2 . 67 b\/w illustrations","DOI":"10.1007\/978-0-8176-4927-2"},{"key":"5924_CR3","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1002\/zamm.19210010109","volume":"1","author":"G Duffing","year":"1921","unstructured":"Duffing, G.: Erzwungene schwingungen bei ver nderlicher eigenfrequenz und ihre technische bedeutung. ZAMM - Zeitschrift f r Angewandte Mathematik und Mechanik \/ Journal of Applied Mathematics and Mechanics 1, 72\u201373 (1921). https:\/\/doi.org\/10.1002\/zamm.19210010109","journal-title":"ZAMM - Zeitschrift f r Angewandte Mathematik und Mechanik \/ Journal of Applied Mathematics and Mechanics"},{"issue":"12","key":"5924_CR4","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/TCSI.2001.972857","volume":"48","author":"F Dachselt","year":"2001","unstructured":"Dachselt, F., Schwarz, W.: Chaos and cryptography. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 48(12), 1498\u20131509 (2001). https:\/\/doi.org\/10.1109\/TCSI.2001.972857","journal-title":"IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications"},{"key":"5924_CR5","doi-asserted-by":"publisher","unstructured":"Belmouhoub, I., Djemai, M., Barbot, J.-P.: Cryptography by discrete-time hyperchaotic systems. In: 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475), vol. 2, pp. 1902\u201319072 (2003). https:\/\/doi.org\/10.1109\/CDC.2003.1272893","DOI":"10.1109\/CDC.2003.1272893"},{"issue":"3","key":"5924_CR6","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.chaos.2011.12.006","volume":"45","author":"KJ Persohn","year":"2012","unstructured":"Persohn, K.J., Povinelli, R.J.: Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation. Chaos, Solitons & Fractals 45(3), 238\u2013245 (2012). https:\/\/doi.org\/10.1016\/j.chaos.2011.12.006","journal-title":"Chaos, Solitons & Fractals"},{"issue":"1","key":"5924_CR7","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/8692046","volume":"2017","author":"WS Sayed","year":"2017","unstructured":"Sayed, W.S., Radwan, A.G., Rezk, A.A., Fahmy, H.A.H.: Finite precision logistic map between computational efficiency and accuracy with encryption applications. Complexity 2017(1), 8692046 (2017). https:\/\/doi.org\/10.1155\/2017\/8692046","journal-title":"Complexity"},{"key":"5924_CR8","doi-asserted-by":"publisher","DOI":"10.3390\/e25121654","author":"J Zhou","year":"2023","unstructured":"Zhou, J., Li, Y., Wang, M.: Research on the threshold determination method of the duffing chaotic system based on improved permutation entropy and poincar mapping. Entropy (2023). https:\/\/doi.org\/10.3390\/e25121654","journal-title":"Entropy"},{"issue":"12","key":"5924_CR9","doi-asserted-by":"publisher","first-page":"3330","DOI":"10.1109\/TCYB.2015.2504180","volume":"46","author":"Z Hua","year":"2016","unstructured":"Hua, Z., Zhou, Y.: Dynamic parameter-control chaotic system. IEEE Transactions on Cybernetics 46(12), 3330\u20133341 (2016). https:\/\/doi.org\/10.1109\/TCYB.2015.2504180","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"3","key":"5924_CR10","doi-asserted-by":"publisher","first-page":"2557","DOI":"10.1109\/TIE.2017.2736515","volume":"65","author":"Z Hua","year":"2018","unstructured":"Hua, Z., Zhou, B., Zhou, Y.: Sine-transform-based chaotic system with fpga implementation. IEEE Trans. Industr. Electron. 65(3), 2557\u20132566 (2018). https:\/\/doi.org\/10.1109\/TIE.2017.2736515","journal-title":"IEEE Trans. Industr. Electron."},{"key":"5924_CR11","doi-asserted-by":"publisher","first-page":"34141","DOI":"10.1109\/ACCESS.2019.2902873","volume":"7","author":"S Zhu","year":"2019","unstructured":"Zhu, S., Zhu, C., Cui, H., Wang, W.: A class of quadratic polynomial chaotic maps and its application in cryptography. IEEE Access 7, 34141\u201334152 (2019)","journal-title":"IEEE Access"},{"key":"5924_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-5039-9","author":"M Riaz","year":"2018","unstructured":"Riaz, M., Ahmed, J., Shah, ra, Hussain, A.: Novel secure pseudorandom number generator based on duffing map. Wireless Personal Communications (2018). https:\/\/doi.org\/10.1007\/s11277-017-5039-9","journal-title":"Wireless Personal Communications"},{"key":"5924_CR13","doi-asserted-by":"publisher","first-page":"150609","DOI":"10.1109\/access.2019.2947561","volume":"7","author":"M Alawida","year":"2019","unstructured":"Alawida, M., Samsudin, A., Teh, J.S., Alshoura, W.H.: Digital cosine chaotic map for cryptographic applications. IEEE Access 7, 150609\u2013150622 (2019). https:\/\/doi.org\/10.1109\/access.2019.2947561","journal-title":"IEEE Access"},{"key":"5924_CR14","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1016\/j.ins.2019.10.055","volume":"512","author":"M Alawida","year":"2020","unstructured":"Alawida, M., Samsudin, A., Teh, J.S.: Enhanced digital chaotic maps based bit reversal with applications in random bit generators. Information Sciences 512, 1155\u20131169 (2020)","journal-title":"Information Sciences"},{"key":"5924_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103299","volume":"69","author":"M Sharma","year":"2022","unstructured":"Sharma, M., Ranjan, R., Bharti, V.: A pseudo-random bit generator based on chaotic maps enhanced with a bit-xor operation. Journal of Information Security and Applications 69, 103299 (2022). https:\/\/doi.org\/10.1016\/j.jisa.2022.103299","journal-title":"Journal of Information Security and Applications"},{"key":"5924_CR16","doi-asserted-by":"publisher","first-page":"3875","DOI":"10.1109\/access.2019.2958336","volume":"8","author":"RI Abdelfatah","year":"2020","unstructured":"Abdelfatah, R.I.: Secure image transmission using chaotic-enhanced elliptic curve cryptography. IEEE Access 8, 3875\u20133890 (2020). https:\/\/doi.org\/10.1109\/access.2019.2958336","journal-title":"IEEE Access"},{"key":"5924_CR17","doi-asserted-by":"publisher","unstructured":"Krishnamoorthi, S., Jayapaul, P., D, R.K., Rajasekar, V., Balamurugan, B., Islam, S.: Design of pseudo-random number generator from turbulence padded chaotic map. Nonlinear Dynamics 104 (2021). https:\/\/doi.org\/10.1007\/s11071-021-06346-x","DOI":"10.1007\/s11071-021-06346-x"},{"key":"5924_CR18","first-page":"1","volume":"82","author":"M Sharma","year":"2022","unstructured":"Sharma, M., Ranjan, R., Bharti, V.: An image encryption algorithm based on a novel hyperchaotic henon sine map. Multimedia Tools and Applications 82, 1\u201324 (2022)","journal-title":"Multimedia Tools and Applications"},{"key":"5924_CR19","doi-asserted-by":"publisher","first-page":"76191","DOI":"10.1109\/ACCESS.2021.3072075","volume":"9","author":"P Parida","year":"2021","unstructured":"Parida, P., Pradhan, C., Gao, X.-Z., Roy, D.S., Barik, R.K.: Image encryption and authentication with elliptic curve cryptography and multidimensional chaotic maps. IEEE Access 9, 76191\u201376204 (2021)","journal-title":"IEEE Access"},{"key":"5924_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2020.125759","volume":"393","author":"C Luo","year":"2021","unstructured":"Luo, C., Liu, B.-Q., Hou, H.-S.: Fractional chaotic maps with q deformation. Applied Mathematics and Computation 393, 125759 (2021)","journal-title":"Applied Mathematics and Computation"},{"issue":"6","key":"5924_CR21","doi-asserted-by":"publisher","first-page":"3713","DOI":"10.1109\/TSMC.2019.2932616","volume":"51","author":"Z Hua","year":"2021","unstructured":"Hua, Z., Zhou, Y.: Exponential chaotic model for generating robust chaos. IEEE Transactions on Systems, Man, and Cybernetics: Systems 51(6), 3713\u20133724 (2021)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"5924_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/9508749","volume":"2022","author":"Z Cheng","year":"2022","unstructured":"Cheng, Z., Wang, W., Dai, Y., Li, L.: 2d sin-cos-henon map for color image encryption with high security. Journal of Applied Mathematics 2022, 1\u201311 (2022). https:\/\/doi.org\/10.1155\/2022\/9508749","journal-title":"Journal of Applied Mathematics"},{"issue":"9","key":"5924_CR23","doi-asserted-by":"publisher","first-page":"3676","DOI":"10.1109\/TCSI.2023.3283877","volume":"70","author":"J Tang","year":"2023","unstructured":"Tang, J., Zhang, Z., Chen, P., Huang, Z., Huang, T.: A simple chaotic model with complex chaotic behaviors and its hardware implementation. IEEE Trans. Circuits Syst. I Regul. Pap. 70(9), 3676\u20133688 (2023). https:\/\/doi.org\/10.1109\/TCSI.2023.3283877","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"5924_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.fraope.2023.100055","volume":"5","author":"S Gebereselassie","year":"2023","unstructured":"Gebereselassie, S., Roy, B.: Speech encryption algorithm based on two newly designed chaotic maps. Franklin Open 5, 100055 (2023). https:\/\/doi.org\/10.1016\/j.fraope.2023.100055","journal-title":"Franklin Open"},{"issue":"6","key":"5924_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101595","volume":"35","author":"M Alawida","year":"2023","unstructured":"Alawida, M.: A novel chaos-based permutation for image encryption. Journal of King Saud University 35(6), 101595 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2023.101595","journal-title":"Journal of King Saud University"},{"key":"5924_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103685","volume":"80","author":"M Alawida","year":"2024","unstructured":"Alawida, M.: Enhancing logistic chaotic map for improved cryptographic security in random number generation. Journal of Information Security and Applications 80, 103685 (2024). https:\/\/doi.org\/10.1016\/j.jisa.2023.103685","journal-title":"Journal of Information Security and Applications"},{"key":"5924_CR27","doi-asserted-by":"publisher","first-page":"59346","DOI":"10.1109\/ACCESS.2023.3282370","volume":"11","author":"F Zhang","year":"2023","unstructured":"Zhang, F., Tang, J., Zhang, Z., Huang, Z., Huang, T.: An improved absolute-cosine chaotification model and its simple application in prng. IEEE Access 11, 59346\u201359356 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3282370","journal-title":"IEEE Access"},{"key":"5924_CR28","doi-asserted-by":"publisher","first-page":"83833","DOI":"10.1109\/access.2023.3302012","volume":"11","author":"T-C Yeh","year":"2023","unstructured":"Yeh, T.-C., Kiang, J.-F.: Second-order chaotic maps with random coefficients to generate complex chaotic sequences for high-security image encryption. IEEE Access 11, 83833\u201383851 (2023). https:\/\/doi.org\/10.1109\/access.2023.3302012","journal-title":"IEEE Access"},{"issue":"11","key":"5924_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2024.103016","volume":"15","author":"HG Ayoub","year":"2024","unstructured":"Ayoub, H.G., Abdulrazzaq, Z.A., Fathil, A.F., Hasso, S.A., Suhail, A.T.: Unveiling robust security: Chaotic maps for frequency hopping implementation in fpga. Ain Shams Engineering Journal 15(11), 103016 (2024)","journal-title":"Ain Shams Engineering Journal"},{"key":"5924_CR30","doi-asserted-by":"publisher","first-page":"63976","DOI":"10.1109\/access.2024.3396452","volume":"12","author":"P-P Duong","year":"2024","unstructured":"Duong, P.-P., Minh Nguyen, H., Dao, B.-A., Kieu-Do-Nguyen, B., Tran, T.-H., Hoang, T.-T., Pham, C.-K.: Construction of robust lightweight s-boxes using enhanced logistic and enhanced sine maps. IEEE Access 12, 63976\u201363994 (2024). https:\/\/doi.org\/10.1109\/access.2024.3396452","journal-title":"IEEE Access"},{"key":"5924_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2024.129586","volume":"637","author":"M Yang","year":"2024","unstructured":"Yang, M., Dong, C., Pan, H.: Generating multi-directional hyperchaotic attractors: A novel multi-scroll system based on julia fractal. Physica A: Statistical Mechanics and its Applications 637, 129586 (2024). https:\/\/doi.org\/10.1016\/j.physa.2024.129586","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"5924_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100642","volume":"9","author":"M Dua","year":"2024","unstructured":"Dua, M., Bhogal, R.: Medical image encryption using novel sine-tangent chaotic map. e-Prime - Advances in Electrical Engineering, Electronics and Energy 9, 100642 (2024). https:\/\/doi.org\/10.1016\/j.prime.2024.100642","journal-title":"e-Prime - Advances in Electrical Engineering, Electronics and Energy"},{"issue":"4","key":"5924_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10719-0","volume":"57","author":"S Kumar","year":"2024","unstructured":"Kumar, S., Sharma, D.: A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm. Artificial Intelligence Review 57(4), 87 (2024). https:\/\/doi.org\/10.1007\/s10462-024-10719-0","journal-title":"Artificial Intelligence Review"},{"issue":"4","key":"5924_CR34","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/TLA.2024.10472959","volume":"22","author":"A Maity","year":"2024","unstructured":"Maity, A., Dhara, B.C.: An audio encryption scheme based on empirical mode decomposition and 2d cosine logistic map. IEEE Latin America Transactions 22(4), 267\u2013275 (2024). https:\/\/doi.org\/10.1109\/TLA.2024.10472959","journal-title":"IEEE Latin America Transactions"},{"key":"5924_CR35","doi-asserted-by":"publisher","unstructured":"Ullah, F., Ziauddin, Faheem, M., Abbas\u00a0Hashmi, M., Ur-Rehman, A., Nawaz\u00a0Bashir, R., Rehman\u00a0Khan, A.: A novel 1-dimensional cosine chaotic equation and digital image encryption technique. IEEE Access 12, 118857\u2013118874 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3447889","DOI":"10.1109\/ACCESS.2024.3447889"},{"key":"5924_CR36","doi-asserted-by":"publisher","first-page":"135779","DOI":"10.1109\/ACCESS.2024.3462547","volume":"12","author":"L Dai","year":"2024","unstructured":"Dai, L., Hu, L., Chen, L., Wang, C., Lin, F.: An image double encryption based on improved gan and hyper chaotic system. IEEE Access 12, 135779\u2013135798 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3462547","journal-title":"IEEE Access"},{"issue":"5","key":"5924_CR37","doi-asserted-by":"publisher","first-page":"2824","DOI":"10.1109\/TCSII.2023.3348998","volume":"71","author":"J Mou","year":"2024","unstructured":"Mou, J., Han, Z., Cao, Y., Banerjee, S.: Discrete second-order memristor and its application to chaotic map. IEEE Transactions on Circuits and Systems II: Express Briefs 71(5), 2824\u20132828 (2024). https:\/\/doi.org\/10.1109\/TCSII.2023.3348998","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"key":"5924_CR38","doi-asserted-by":"publisher","first-page":"148216","DOI":"10.1109\/ACCESS.2024.3474801","volume":"12","author":"M Di Marco","year":"2024","unstructured":"Di Marco, M., Forti, M., Pancioni, L., Innocenti, G., Tesi, A.: Embedding classic chaotic maps in simple discrete-time memristor circuits. IEEE Access 12, 148216\u2013148229 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3474801","journal-title":"IEEE Access"},{"key":"5924_CR39","doi-asserted-by":"publisher","first-page":"156471","DOI":"10.1109\/ACCESS.2024.3481230","volume":"12","author":"J Shao","year":"2024","unstructured":"Shao, J., Bai, E., Jiang, X., Wu, Y.: Multi-view light field images compression and encryption using enhanced 3d chaotic system and pixel-bit-scrambling. IEEE Access 12, 156471\u2013156491 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3481230","journal-title":"IEEE Access"},{"issue":"10","key":"5924_CR40","doi-asserted-by":"publisher","first-page":"10281","DOI":"10.1109\/TCSVT.2024.3405558","volume":"34","author":"D Wu","year":"2024","unstructured":"Wu, D., Zhang, X., Wang, J., Li, L., Feng, G.: Novel robust video watermarking scheme based on concentric ring subband and visual cryptography with piecewise linear chaotic mapping. IEEE Transactions on Circuits and Systems for Video Technology 34(10), 10281\u201310298 (2024). https:\/\/doi.org\/10.1109\/TCSVT.2024.3405558","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"17","key":"5924_CR41","doi-asserted-by":"publisher","first-page":"5910","DOI":"10.1109\/JLT.2024.3406722","volume":"42","author":"G Chen","year":"2024","unstructured":"Chen, G., Liu, B., Ren, J., Li, Y., Mao, Y., Wu, X., Chen, S., Wang, B., Ullah, R., Wu, Y., Zhao, L., Guo, Z.: Three-dimensional non-orthogonal multiple access high-security seven-core transmission system based on constellation chaotic selection mapping. J. Lightwave Technol. 42(17), 5910\u20135917 (2024). https:\/\/doi.org\/10.1109\/JLT.2024.3406722","journal-title":"J. Lightwave Technol."},{"key":"5924_CR42","doi-asserted-by":"publisher","first-page":"54745","DOI":"10.1109\/ACCESS.2024.3389975","volume":"12","author":"C Zhang","year":"2024","unstructured":"Zhang, C., Zhang, S., Liang, K., Chen, Z.: Double image encryption algorithm based on parallel compressed sensing and chaotic system. IEEE Access 12, 54745\u201354757 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3389975","journal-title":"IEEE Access"},{"key":"5924_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2024.102200","volume":"97","author":"M Zhao","year":"2024","unstructured":"Zhao, M., Liu, H.: A non-degenerate n-dimensional integer domain chaotic map model with application to prng. Integration 97, 102200 (2024). https:\/\/doi.org\/10.1016\/j.vlsi.2024.102200","journal-title":"Integration"},{"key":"5924_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.121048","volume":"678","author":"L Kang","year":"2024","unstructured":"Kang, L., Lai, Y., Wang, J., Cao, W.: A pacesetter-l vy multi-objective particle swarm optimization with arnold chaotic map with opposition-based learning. Information Sciences 678, 121048 (2024). https:\/\/doi.org\/10.1016\/j.ins.2024.121048","journal-title":"Information Sciences"},{"key":"5924_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.115168","volume":"185","author":"D Ding","year":"2024","unstructured":"Ding, D., Zhu, H., Zhang, H., Yang, Z., Xie, D.: An n-dimensional polynomial modulo chaotic map with controllable range of lyapunov exponents and its application in color image encryption. Chaos, Solitons and Fractals 185, 115168 (2024). https:\/\/doi.org\/10.1016\/j.chaos.2024.115168","journal-title":"Chaos, Solitons and Fractals"},{"key":"5924_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.114650","volume":"181","author":"Z Wu","year":"2024","unstructured":"Wu, Z., Zhang, Y., Bao, H., Lan, R., Hua, Z.: nd-cs: A circularly shifting chaotic map generation method. Chaos, Solitons and Fractals 181, 114650 (2024). https:\/\/doi.org\/10.1016\/j.chaos.2024.114650","journal-title":"Chaos, Solitons and Fractals"},{"issue":"3","key":"5924_CR47","doi-asserted-by":"publisher","first-page":"3114","DOI":"10.1109\/TIE.2024.3447736","volume":"72","author":"H Bao","year":"2025","unstructured":"Bao, H., Su, Y., Hua, Z., Chen, M., Bao, B.: Two-dimensional bounded chaotic system with hardware implementation. IEEE Transactions on Industrial Electronics 72(3), 3114\u20133124 (2025). https:\/\/doi.org\/10.1109\/TIE.2024.3447736","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"1","key":"5924_CR48","doi-asserted-by":"publisher","first-page":"917","DOI":"10.32604\/cmc.2025.059640","volume":"83","author":"ZT Njitacke","year":"2025","unstructured":"Njitacke, Z.T., Maghrabi, L.A., Ahmad, M., Althaqafi, T.: Efficient bit-plane based medical image cryptosystem using novel and robust sine-cosine chaotic map. Computers, Materials and Continua 83(1), 917\u2013933 (2025). https:\/\/doi.org\/10.32604\/cmc.2025.059640","journal-title":"Computers, Materials and Continua"},{"key":"5924_CR49","doi-asserted-by":"publisher","first-page":"52863","DOI":"10.1109\/ACCESS.2025.3554308","volume":"13","author":"T Cigal","year":"2025","unstructured":"Cigal, T., Tanyildizi, E.: A novel chaotic system generator architecture based on optimization algorithm. IEEE Access 13, 52863\u201352873 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3554308","journal-title":"IEEE Access"},{"key":"5924_CR50","doi-asserted-by":"publisher","first-page":"3823","DOI":"10.1109\/ACCESS.2025.3525729","volume":"13","author":"M Zeghid","year":"2025","unstructured":"Zeghid, M., Yousif Ahmed, H., Nawaz Khan, A.: High-level design and implementation of a configurable cryptosystem with a novel chaos-enhanced function. IEEE Access 13, 3823\u20133840 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3525729","journal-title":"IEEE Access"},{"issue":"1","key":"5924_CR51","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/TII.2024.3431085","volume":"21","author":"Z Hua","year":"2025","unstructured":"Hua, Z., Yao, J., Zhang, Y., Bao, H., Yi, S.: Two-dimensional coupled complex chaotic map. IEEE Transactions on Industrial Informatics 21(1), 85\u201395 (2025). https:\/\/doi.org\/10.1109\/TII.2024.3431085","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"5924_CR52","doi-asserted-by":"publisher","first-page":"23645","DOI":"10.1109\/ACCESS.2025.3537182","volume":"13","author":"L Moysis","year":"2025","unstructured":"Moysis, L., Lawnik, M., Volos, C., Baptista, M.S., Goudos, S.K., Fragulis, G.F.: Testing the strength of chaotic systems as seeds in a pseudo random bit generator. IEEE Access 13, 23645\u201323657 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3537182","journal-title":"IEEE Access"},{"issue":"1","key":"5924_CR53","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s41870-023-01578-z","volume":"16","author":"T Umar","year":"2024","unstructured":"Umar, T., Nadeem, M., Anwer, F.: Modified chaotic quadratic map with improved robust region. Int. J. Inf. Technol. 16(1), 131\u2013136 (2024). https:\/\/doi.org\/10.1007\/s41870-023-01578-z","journal-title":"Int. J. Inf. Technol."},{"key":"5924_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125050","volume":"257","author":"T Umar","year":"2024","unstructured":"Umar, T., Nadeem, M., Anwer, F.: Chaos based image encryption scheme to secure sensitive multimedia content in cloud storage. Expert Systems with Applications 257, 125050 (2024). https:\/\/doi.org\/10.1016\/j.eswa.2024.125050","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"5924_CR55","doi-asserted-by":"publisher","first-page":"2363","DOI":"10.1364\/OE.20.002363","volume":"20","author":"C Fu","year":"2012","unstructured":"Fu, C., Chen, J.-J., Zou, H., Meng, W.-H., Zhan, Y.-F., Yu, Y.-W.: A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Express 20(3), 2363\u20132378 (2012). https:\/\/doi.org\/10.1364\/OE.20.002363","journal-title":"Optics Express"},{"key":"5924_CR56","doi-asserted-by":"crossref","unstructured":"Bassham, L., Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Leigh, S., Levenson, M., Vangel, M., Heckert, N., Banks, D.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD (2010). https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=906762","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"5924_CR57","doi-asserted-by":"publisher","unstructured":"L\u2019Ecuyer, P., Simard, R.: Testu01: A c library for empirical testing of random number generators. ACM Trans. Math. Softw. 33(4) (2007). https:\/\/doi.org\/10.1145\/1268776.1268777","DOI":"10.1145\/1268776.1268777"},{"key":"5924_CR58","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1103\/PhysRevA.28.2591","volume":"28","author":"P Grassberger","year":"1983","unstructured":"Grassberger, P., Procaccia, I.: Estimation of the kolmogorov entropy from a chaotic signal. Phys. Rev. A 28, 2591\u20132593 (1983). https:\/\/doi.org\/10.1103\/PhysRevA.28.2591","journal-title":"Phys. Rev. A"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05924-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05924-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05924-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:03:16Z","timestamp":1771264996000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05924-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,16]]},"references-count":58,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["5924"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05924-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,16]]},"assertion":[{"value":"4 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare they have no Conflicts of Interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"In this research no human or animal subjects were used by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"165"}}