{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T01:08:38Z","timestamp":1769821718167,"version":"3.49.0"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T00:00:00Z","timestamp":1606176000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10059-5","type":"journal-article","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:22:46Z","timestamp":1606188166000},"page":"10509-10531","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Presence of dynamics of quantum dots in the digital signature using DNA alphabet and chaotic S-box"],"prefix":"10.1007","volume":"80","author":[{"given":"Nafiseh","family":"Hematpour","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0474-4678","authenticated-orcid":false,"given":"Sodeif","family":"Ahadpour","sequence":"additional","affiliation":[]},{"given":"Sohrab","family":"Behnia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,24]]},"reference":[{"key":"10059_CR1","first-page":"1021","volume":"266","author":"L Adleman","year":"1994","unstructured":"Adleman L (1994) Molecular computation of solutions to combinatorial problems. Sci New Series 266:1021","journal-title":"Sci New Series"},{"key":"10059_CR2","unstructured":"Advanced encryption standard (aes) (2001) Federal Information Processing Standards Publication 197 Std"},{"key":"10059_CR3","unstructured":"Ahadpour S, Hematpour N (2012) Quantum chaos in quantum dots coupled to bosons. arXiv:1207.5590v1"},{"key":"10059_CR4","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1142\/S0129183110015117","volume":"21","author":"A Akhshani","year":"2010","unstructured":"Akhshani A, Behnia S, Akhavan A, Lim SC, Hassan Z (2010) Pseudo random number generator based on synchronized chaotic maps. Int J Modern Phys C 21:275\u2013290","journal-title":"Int J Modern Phys C"},{"key":"10059_CR5","unstructured":"Amin S, Saeb M, El-Gindi S (2006) A DNA-based implementation of YAEA encryption algorithm. In: Computational intelligence, p 120"},{"key":"10059_CR6","doi-asserted-by":"crossref","first-page":"022304","DOI":"10.1103\/PhysRevA.74.022304","volume":"74","author":"E Andersson","year":"2006","unstructured":"Andersson E, Curty M, Jex I (2006) Experimentally realizable quantum comparison of coherent states and its applications. Phys Rev A 74:022304","journal-title":"Phys Rev A"},{"key":"10059_CR7","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.cose.2012.11.009","volume":"34","author":"JLH Ardieta","year":"2013","unstructured":"Ardieta JLH, Tablas AIG, Fuentes JMD, Ramos B (2013) A taxonomy and survey of attacks on digital signatures. Comput Secur 34:67\u2013112","journal-title":"Comput Secur"},{"key":"10059_CR8","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1007\/s11042-019-08375-6","volume":"79","author":"Z Azimi","year":"2020","unstructured":"Azimi Z, Ahadpour S (2020) Color image encryption based on DNA encoding and pair coupled chaotic maps. Multimed Tools Appl 79:1727\u20131744","journal-title":"Multimed Tools Appl"},{"key":"10059_CR9","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.asoc.2014.03.022","volume":"21","author":"S Behnia","year":"2014","unstructured":"Behnia S, Ahadpour S, Ayubi P (2014) Design and implementation of coupled chaotic maps in watermarking. Appl Soft Comput 21:481\u2013490","journal-title":"Appl Soft Comput"},{"key":"10059_CR10","doi-asserted-by":"crossref","first-page":"3455","DOI":"10.1016\/j.cam.2011.02.006","volume":"235","author":"S Behnia","year":"2011","unstructured":"Behnia S, Akhavan A, Akhshani A, Samsudin A (2011) A novel dynamic model of pseudo random number generator. J Comput Appl Math 235:3455\u20133463","journal-title":"J Comput Appl Math"},{"key":"10059_CR11","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.physleta.2007.01.081","volume":"366","author":"S Behnia","year":"2007","unstructured":"Behnia S, Akhshani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys Lett A 366:391\u2013396","journal-title":"Phys Lett A"},{"key":"10059_CR12","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.chaos.2006.05.011","volume":"35","author":"S Behnia","year":"2008","unstructured":"Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 35:408\u2013419","journal-title":"Chaos Solitons Fractals"},{"key":"10059_CR13","unstructured":"Behnia S, Fathizadeh S, Ziaei J (2016) Controlling charge current through a DNA based molecular transistor. 381:36\u201343"},{"key":"10059_CR14","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of des like cryptosystems. J Cryptol 4:3\u201372","journal-title":"J Cryptol"},{"key":"10059_CR15","first-page":"21","volume":"50","author":"M Borda","year":"2009","unstructured":"Borda M, Tornea O, Hodorogea T (2009) Secret writing by dna hybridization. Acta Technica Napocensis Electron Commun 50:21","journal-title":"Acta Technica Napocensis Electron Commun"},{"key":"10059_CR16","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.physa.2008.10.019","volume":"388","author":"M Castagnino","year":"2009","unstructured":"Castagnino M, Lombardi O (2009) Towards a definition of the quantum ergodic hierarchy: Ergodicity and mixing. Physica A 388:247\u2013267","journal-title":"Physica A"},{"key":"10059_CR17","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1007\/s11071-017-3920-4","volume":"91","author":"U Cavusoglu","year":"2018","unstructured":"Cavusoglu U, Ka\u00e7ar S., Zengin A, Pehlivan I (2018) A novel hybrid encryption algorithm based on chaos and s-aes algorithm. Nonlinear Dyn 91:939\u2013956","journal-title":"Nonlinear Dyn"},{"key":"10059_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-017-1770-0","volume":"17","author":"F Chen","year":"2018","unstructured":"Chen F, Liu W, Chen S, Wangi Z (2018) Public-key quantum digital signature scheme with one-time pad private-key. Quantum Inf Process 17:1\u201314","journal-title":"Quantum Inf Process"},{"key":"10059_CR19","doi-asserted-by":"crossref","first-page":"0589","DOI":"10.26421\/QIC14.7-8-4","volume":"14","author":"X Chen","year":"2014","unstructured":"Chen X, Xu G, Su Y, Yang Y (2014) Robust variations of secret sharing through noisy quantum channel. Quantum Inform Comput 14:0589","journal-title":"Quantum Inform Comput"},{"key":"10059_CR20","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/s11128-020-02695-5","volume":"19","author":"J Chen","year":"2020","unstructured":"Chen J, Zhang C, Chen JM, Zhang CM, Wang Q (2020) Improving the performance of decoy-state quantum digital signature with single-photon-added coherent sources. Quantum Inf Process 19:198","journal-title":"Quantum Inf Process"},{"key":"10059_CR21","doi-asserted-by":"crossref","first-page":"1174","DOI":"10.1038\/ncomms2172","volume":"3","author":"PJ Clarke","year":"2012","unstructured":"Clarke PJ, Collins RJ, Dunjko V, Andersson E, Jeffers J, Buller GS (2012) Experimental demonstration of quantum digital signatures using phase\u2013encoded coherent states of light. Nat Commun 3:1174","journal-title":"Nat Commun"},{"key":"10059_CR22","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/21092","volume":"339","author":"C Clelland","year":"1999","unstructured":"Clelland C, Risca V, Bancroft C (1999) Hiding messages in dna microdots. Nature 339:533","journal-title":"Nature"},{"key":"10059_CR23","doi-asserted-by":"crossref","first-page":"4883","DOI":"10.1364\/OL.41.004883","volume":"41","author":"R Collins","year":"2016","unstructured":"Collins R, Amiri R, Fujiwara M, Honjo T, Shimizu K, Tamaki K, Takeoka M, Andersson E, Buller G, Sasaki M (2016) Experimental transmission of quantum digital signatures over 90km of installed optical fiber using a differential phase shift quantum key distribution system. Opt Lett 41:4883","journal-title":"Opt Lett"},{"key":"10059_CR24","volume-title":"Cryptographic boolean functions and applications","author":"T Cusick","year":"2017","unstructured":"Cusick T, Stanica P (2017) Cryptographic boolean functions and applications. Elsevier, Amsterdam"},{"key":"10059_CR25","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"10059_CR26","doi-asserted-by":"crossref","first-page":"012329","DOI":"10.1103\/PhysRevA.93.012329","volume":"93","author":"R Donaldson","year":"2016","unstructured":"Donaldson R, Collins R, Kleczkowska K, Amiri R, Wallden P, Dunjko V, Jeffers J, Andersson E, Buller G (2016) Experimental demonstration of kilometer-range quantum digital signatures. Phys Rev A 93:012329","journal-title":"Phys Rev A"},{"key":"10059_CR27","doi-asserted-by":"crossref","first-page":"040502","DOI":"10.1103\/PhysRevLett.112.040502","volume":"112","author":"V Dunjko","year":"2014","unstructured":"Dunjko V, Wallden P, Andersson E (2014) Quantum digital signatures without quantum memory. Phys Rev Lett 112:040502","journal-title":"Phys Rev Lett"},{"key":"10059_CR28","doi-asserted-by":"crossref","first-page":"0662031","DOI":"10.1103\/PhysRevE.67.066203","volume":"67","author":"C Emary","year":"2003","unstructured":"Emary C, Brandes T (2003) Chaos and phase transitions in quantum dots coupled to bosons. Phys Rev E 67:0662031\u201306620322","journal-title":"Phys Rev E"},{"key":"10059_CR29","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.optlaseng.2013.12.003","volume":"56","author":"R Enayatifar","year":"2014","unstructured":"Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83\u201393","journal-title":"Opt Lasers Eng"},{"key":"10059_CR30","first-page":"233","volume":"54","author":"A Gehani","year":"2000","unstructured":"Gehani A, LaBean TH, Reif JH (2000) DNA-Based cryptography. DIMACS series in discrete mathematics. Theor Comput Sci 54:233\u2013249","journal-title":"Theor Comput Sci"},{"key":"10059_CR31","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1016\/j.cjph.2017.07.002","volume":"55","author":"P Gholamin","year":"2017","unstructured":"Gholamin P, Sheikhani A (2017) A new three-dimensional chaotic system: dynamical properties and simulation. Chin J Phys 55:1300","journal-title":"Chin J Phys"},{"key":"10059_CR32","unstructured":"Gottesman D, Chuang I (2001) Quantum digital signatures. arXiv:0105032v2"},{"key":"10059_CR33","doi-asserted-by":"crossref","unstructured":"Harrison P, Valavanis A (2016) Quantum wells, wires and dots: theoretical and computational physics of semiconductor Nanostructures 4th edn","DOI":"10.1002\/9781118923337"},{"key":"10059_CR34","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1186\/1471-2105-8-176","volume":"8","author":"D Heider","year":"2007","unstructured":"Heider D, Barnekow A (2007) Dna-based watermarks using the dna-crypt algo- rithm. BMC Bioinform 8:176","journal-title":"BMC Bioinform"},{"key":"10059_CR35","doi-asserted-by":"crossref","unstructured":"Hematpour N, Ahadpour S, Behnia S (2018) Digital signature: quantum chaos approach and bell states, Chapter 9 Springer Science and Business Media LLC","DOI":"10.1007\/978-3-030-15297-0_9"},{"key":"10059_CR36","doi-asserted-by":"crossref","first-page":"1647","DOI":"10.1016\/j.ins.2009.01.023","volume":"179","author":"J Herranz","year":"2009","unstructured":"Herranz J (2009) On the transferability of private signatures. Inf Sci 179:1647\u20131656","journal-title":"Inf Sci"},{"key":"10059_CR37","first-page":"144","volume":"1424","author":"JG Hirsch","year":"2012","unstructured":"Hirsch JG, Casta\u00f1os O, Pena RL, Achar EN (2012) Mean field description of the Dicke Model, foundations of probability and physics 6 alPConf. Proc 1424:144\u2013148","journal-title":"Proc"},{"key":"10059_CR38","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1080\/01621459.1963.10500830","volume":"58","author":"W Hoeffding","year":"1963","unstructured":"Hoeffding W (1963) Probability inequalities for sums of bounded random variables. J Am Stat Assoc 58:301","journal-title":"J Am Stat Assoc"},{"key":"10059_CR39","doi-asserted-by":"crossref","first-page":"1791","DOI":"10.1007\/s11071-012-0573-1","volume":"70","author":"I Hussain","year":"2012","unstructured":"Hussain I, Tariq S, Muhammad A (2012) A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm. Nonlinear Dyn 70:1791\u20131794","journal-title":"Nonlinear Dyn"},{"key":"10059_CR40","first-page":"1013","volume":"104","author":"MA Jafarizadeh","year":"2001","unstructured":"Jafarizadeh MA (2001) Hierarchy of chaotic maps with an invariant measure. J Math Phys 104:1013\u20131028","journal-title":"J Math Phys"},{"key":"10059_CR41","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1007\/s12043-006-0024-y","volume":"67","author":"M Jafarizadeh","year":"2006","unstructured":"Jafarizadeh M, Foroutan M, Ahadpour S (2006) Hierarchy of rational order families of chaotic maps with an invariant measure. Pramana 67:1073\u20131086","journal-title":"Pramana"},{"key":"10059_CR42","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G Jakimoski","year":"2001","unstructured":"Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I Fundament Theory Appl 48:163\u2013169","journal-title":"IEEE Trans Circ Syst I Fundament Theory Appl"},{"key":"10059_CR43","doi-asserted-by":"crossref","first-page":"2303","DOI":"10.1007\/s11071-012-0621-x","volume":"70","author":"M Khan","year":"2012","unstructured":"Khan M, Shah T, Mahmood H, Asif M, Iqtadar G (2012) A novel technique for the construction of strong s-boxes based on chaotic lorenz systems. Nonlinear Dyn 70:2303\u20132311","journal-title":"Nonlinear Dyn"},{"key":"10059_CR44","unstructured":"Kneifel JD (1999) National institute of standards and technology, FIPS PUB 46-3: data encryption standard (DES), Super-sedes FIPS, pp 46\u20132"},{"key":"10059_CR45","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/978-3-642-20542-2","volume-title":"Chaos-based cryptography theory, algorithms and applications","author":"L Kocarev","year":"2011","unstructured":"Kocarev L, Lian SH (2011) Chaos-based cryptography theory, algorithms and applications. Springer, Berlin, p 397"},{"key":"10059_CR46","doi-asserted-by":"crossref","unstructured":"Lambic D (2020) A new discrete-space chaotic map based on the multiplication of integer numbers and its application in s-box design. Nonlinear Dyn pp 1\u201313","DOI":"10.1007\/s11071-020-05503-y"},{"key":"10059_CR47","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/LCOMM.2014.2379253","volume":"19","author":"J Li","year":"2015","unstructured":"Li J, Chen X, Xu G, Yang Y, Li ZP (2015) Perfect quantum network coding independent of classical network solutions. IEEE Commun Lett 19:115","journal-title":"IEEE Commun Lett"},{"key":"10059_CR48","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YSH (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl pp 1\u201337","DOI":"10.1007\/s11042-020-08645-8"},{"key":"10059_CR49","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s11128-018-2014-7","volume":"17","author":"X Lou","year":"2018","unstructured":"Lou X, Chen Z, Guo Y (2018) A high capacity quantum weak blind signature based on logistic chaoticmaps. Quantum Inf Process 17:251","journal-title":"Quantum Inf Process"},{"key":"10059_CR50","doi-asserted-by":"crossref","first-page":"13218","DOI":"10.1109\/ACCESS.2020.2966255","volume":"8","author":"X Lou","year":"2020","unstructured":"Lou X, Wang Y, Long H, Yang Y, Li J (2020) Sequential quantum multiparty signature based on quantum fourier transform and chaotic system. IEEE Access 8:13218\u201313227","journal-title":"IEEE Access"},{"key":"10059_CR51","first-page":"386","volume-title":"Linear cryptanalysis method for des cipher, Workshop on the theory and application of cryptographic techniques","author":"M Matsui","year":"1993","unstructured":"Matsui M (1993) Linear cryptanalysis method for des cipher, Workshop on the theory and application of cryptographic techniques. Springer, Berlin, pp 386\u2013397"},{"key":"10059_CR52","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1007\/s11042-015-3064-9","volume":"76","author":"M Mollaeefar","year":"2017","unstructured":"Mollaeefar M, Sharif A, Nazari M (2017) A novel encryption scheme for colored image based on high level chaotic maps. Multimed Tools Appl 76:607\u2013629","journal-title":"Multimed Tools Appl"},{"key":"10059_CR53","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1007\/s11071-013-0987-4","volume":"74","author":"F Ozkaynak","year":"2013","unstructured":"Ozkaynak F, Yavuz S (2013) Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74:551\u2013557","journal-title":"Nonlinear Dyn"},{"key":"10059_CR54","unstructured":"Rauhe H, Vopper G, Feldkamp U, Banzhaf W, Howard JC (2000) Digital DNA molecules. In: Proceedings 6th DIMACS workshop on DNA based computers, p 13"},{"key":"10059_CR55","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120\u2013126","journal-title":"Commun ACM"},{"key":"10059_CR56","volume-title":"Applied cryptography: protocols, algorithms, and source code in c","author":"B Schneier","year":"2007","unstructured":"Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in c. Wiley, New Jersey"},{"key":"10059_CR57","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0030-4018(03)01261-6","volume":"218","author":"A Sinha","year":"2003","unstructured":"Sinha A, Singh K (2003) A technique for image encryption using digital signature. Opt Commun 218:229\u2013234","journal-title":"Opt Commun"},{"key":"10059_CR58","first-page":"478","volume-title":"Nonlinear dynamics and chaos: with applications to physics, biology, chemistry, and engineering","author":"SH Strogatz","year":"2000","unstructured":"Strogatz SH (2000) Nonlinear dynamics and chaos: with applications to physics, biology, chemistry, and engineering. Westview Press, Cambridge, p 478"},{"key":"10059_CR59","doi-asserted-by":"crossref","first-page":"1471","DOI":"10.1016\/j.jss.2011.02.041","volume":"84","author":"Y Sun","year":"2011","unstructured":"Sun Y, Xu CH, Yu Y, Mu Y (2011) Strongly unforgeable proxy signature scheme secure in the standard model. J Syst Softw 84:1471\u20131479","journal-title":"J Syst Softw"},{"key":"10059_CR60","first-page":"260","volume-title":"A classical introduction to cryptography applications for communications security","author":"S Vaudenay","year":"2006","unstructured":"Vaudenay S (2006) A classical introduction to cryptography applications for communications security. springer Science+Business Media Inc, New York, pp 260\u2013261"},{"key":"10059_CR61","doi-asserted-by":"crossref","first-page":"125303","DOI":"10.1088\/1751-8113\/47\/12\/125303","volume":"47","author":"P Wallden","year":"2014","unstructured":"Wallden P, Dunjko V, Andersson E (2014) Minimum-cost quantum measurements for quantum information. J Phys A 47:125303","journal-title":"J Phys A"},{"key":"10059_CR62","doi-asserted-by":"crossref","first-page":"0423041","DOI":"10.1103\/PhysRevA.91.042304","volume":"91","author":"P Wallden","year":"2015","unstructured":"Wallden P, Dunjko V, Kent A, Andersson E (2015) Quantum digital signature with quantum key distribution components. Phys Rev A 91:0423041\u201310","journal-title":"Phys Rev A"},{"key":"10059_CR63","doi-asserted-by":"crossref","first-page":"3089","DOI":"10.1016\/j.cnsns.2008.12.005","volume":"14","author":"Y Wang","year":"2009","unstructured":"Wang Y, Wong KW, Liao X, Xiang T (2009) A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14:3089\u20133099","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10059_CR64","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"JD Watson","year":"1953","unstructured":"Watson JD, Crick FHC (1953) A structure for deoxyribose nucleic acid. Nature 171:737\u2013738","journal-title":"Nature"},{"key":"10059_CR65","unstructured":"Webster A, Tavares S (1985) On the design of s-boxes. In: Conference on the theory and application of cryptographic techniques. springer, New York, pp 523\u201334"},{"key":"10059_CR66","doi-asserted-by":"crossref","first-page":"2505","DOI":"10.1007\/s10773-014-2478-x","volume":"54","author":"Z Wei","year":"2015","unstructured":"Wei Z, Chen X, Niu X, Yang YX (2015) The quantum steganography protocol via quantum noisy channels. Int J Theor Phys 54:2505","journal-title":"Int J Theor Phys"},{"key":"10059_CR67","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s11227-009-0347-9","volume":"56","author":"C Weng-Long","year":"2011","unstructured":"Weng-Long C, Shu-Chien H, Weicheng LK (2011) Fast parallel DNA-based algorithms for molecular computation: discrete logarithm. J Supercomputing 56:129\u201363","journal-title":"J Supercomputing"},{"key":"10059_CR68","first-page":"0323161","volume":"93","author":"HL Yin","year":"2016","unstructured":"Yin HL, Fu Y, Chen ZB (2016) Practical quantum digital signature. Phys Rev A 93:0323161\u201312","journal-title":"Phys Rev A"},{"key":"10059_CR69","first-page":"0323341","volume":"95","author":"HL Yin","year":"2017","unstructured":"Yin HL, Fu Y, Liu H, Tang QJ, Wang J, You LX, Zhang WJ, Chen SJ, Wang Z, Zhang Q, Chen TY, Chen ZB, Pan JW (2017) Experimental quantum digital signature over 102 km. Phys Rev A 95:0323341\u20139","journal-title":"Phys Rev A"},{"key":"10059_CR70","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/TSMCB.2009.2030506","volume":"40","author":"H Zhang","year":"2009","unstructured":"Zhang H, Ma T, Huang G, Wang Z (2009) Robust global exponential syn- chronization of uncertain chaotic delayed neural networks via dual-stage impulsive control. IEEE Trans Syst Man Part B Cybern 40:831\u2013844","journal-title":"IEEE Trans Syst Man Part B Cybern"},{"key":"10059_CR71","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-019-2494-0","volume":"19","author":"CM Zhang","year":"2020","unstructured":"Zhang CM, Zhu Y, Chen JJ, Wang Q (2020) Practical quantum digital signature with configurable decoy states. Quantum Inf Process 19:1\u20137","journal-title":"Quantum Inf Process"},{"key":"10059_CR72","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.amc.2009.02.011","volume":"212","author":"XD Zheng","year":"2009","unstructured":"Zheng XD, Xu J, Li Parallel W (2009) DNA Arithmetic operation based on n-moduli set. Appl Math Comput 212:177\u2013184","journal-title":"Appl Math Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10059-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10059-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10059-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T06:50:18Z","timestamp":1698389418000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10059-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,24]]},"references-count":72,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10059"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10059-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,24]]},"assertion":[{"value":"4 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}