{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T03:43:33Z","timestamp":1771299813708,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T00:00:00Z","timestamp":1509926400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11277-017-5039-9","type":"journal-article","created":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T15:00:59Z","timestamp":1509980459000},"page":"85-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Novel Secure Pseudorandom Number Generator Based on Duffing Map"],"prefix":"10.1007","volume":"99","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7573-2375","authenticated-orcid":false,"given":"Mamoon","family":"Riaz","sequence":"first","affiliation":[]},{"given":"Jameel","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Raza Ali","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Ashiq","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,6]]},"reference":[{"issue":"1","key":"5039_CR1","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.cnsns.2013.06.017","volume":"19","author":"A Akhshani","year":"2014","unstructured":"Akhshani, A., Akhavan, A., Mobaraki, A., Lim, S. C., & Hassan, Z. (2014). Pseudo random number generator based on quantum chaotic map. Communications in Nonlinear Science and Numerical Simulation, 19(1), 101\u2013111.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"4","key":"5039_CR2","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1016\/j.cnsns.2013.08.032","volume":"19","author":"M Fran\u00e7ois","year":"2014","unstructured":"Fran\u00e7ois, M., Grosges, T., Barchiesi, D., & Erra, R. (2014). Pseudo-random number generator based on mixing of three chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 19(4), 887\u2013895.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"3","key":"5039_CR3","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1016\/j.cpc.2012.11.017","volume":"184","author":"H Hu","year":"2013","unstructured":"Hu, H., Liu, L., & Ding, N. (2013). Pseudorandom sequence generator based on the Chen chaotic system. Computer Physics Communications, 184(3), 765\u2013768.","journal-title":"Computer Physics Communications"},{"issue":"2","key":"5039_CR4","doi-asserted-by":"crossref","first-page":"181","DOI":"10.15388\/Informatica.2013.391","volume":"24","author":"M Francois","year":"2013","unstructured":"Francois, M., Grosges, T., Barchiesi, D., & Erra, R. (2013). A new pseudo-random number generator based on two chaotic maps. Informatica, 24(2), 181\u2013197.","journal-title":"Informatica"},{"issue":"1","key":"5039_CR5","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.vlsi.2013.06.003","volume":"47","author":"I Cicek","year":"2014","unstructured":"Cicek, I., Pusane, A. E., & Dundar, G. (2014). A novel design method for discrete time chaos based true random number generators. INTEGRATION, The VLSI Journal, 47(1), 38\u201347.","journal-title":"INTEGRATION, The VLSI Journal"},{"issue":"24","key":"5039_CR6","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1049\/el.2012.2762","volume":"48","author":"A Beirami","year":"2012","unstructured":"Beirami, A., Nejati, H., & Ali, W. H. (2012). Zigzag map: A variability-aware discrete-time chaotic-map truly random number generator. Electronics Letters, 48(24), 1537\u20131538.","journal-title":"Electronics Letters"},{"issue":"1","key":"5039_CR7","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/s10470-012-9893-9","volume":"73","author":"H Nejati","year":"2012","unstructured":"Nejati, H., Beirami, A., & Ali, W. H. (2012). Discrete-time chaotic-map truly random number generators: Design, implementation, and variability analysis of the zigzag map. Analog Integrated Circuits and Signal Processing, 73(1), 363\u2013374.","journal-title":"Analog Integrated Circuits and Signal Processing"},{"issue":"03","key":"5039_CR8","doi-asserted-by":"crossref","first-page":"1250024","DOI":"10.1142\/S0129183112500246","volume":"23","author":"XY Wang","year":"2012","unstructured":"Wang, X. Y., & Xie, Y. X. (2012). A design of pseudo-random bit generator based on single chaotic system. International Journal of Modern Physics C, 23(03), 1250024.","journal-title":"International Journal of Modern Physics C"},{"issue":"32","key":"5039_CR9","doi-asserted-by":"crossref","first-page":"1250208","DOI":"10.1142\/S0217979212502086","volume":"26","author":"XY Wang","year":"2012","unstructured":"Wang, X. Y., & Yang, L. (2012). Design of pseudo-random bit generator based on chaotic maps. International Journal of Modern Physics B, 26(32), 1250208.","journal-title":"International Journal of Modern Physics B"},{"issue":"2","key":"5039_CR10","doi-asserted-by":"crossref","first-page":"1589","DOI":"10.1007\/s11071-012-0558-0","volume":"70","author":"XY Wang","year":"2012","unstructured":"Wang, X. Y., & Qin, X. (2012). A new pseudo-random number generator based on CML and chaotic iteration. Nonlinear Dynamics, 70(2), 1589\u20131592.","journal-title":"Nonlinear Dynamics"},{"issue":"3","key":"5039_CR11","first-page":"249","volume":"27","author":"M Fran\u00e7ois","year":"2012","unstructured":"Fran\u00e7ois, M., Grosges, T., Barchiesi, D., & Erra, R. (2012). A new image encryption scheme based on a chaotic function. Signal Processing: Image Communication, 27(3), 249\u2013259.","journal-title":"Signal Processing: Image Communication"},{"issue":"1","key":"5039_CR12","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.ins.2011.09.008","volume":"186","author":"A Kanso","year":"2012","unstructured":"Kanso, A., Yahyaoui, H., & Almulla, M. (2012). Keyed hash function based on a chaotic map. Information Sciences, 186(1), 249\u2013264.","journal-title":"Information Sciences"},{"issue":"4","key":"5039_CR13","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1016\/j.robot.2012.01.001","volume":"60","author":"CK Volos","year":"2012","unstructured":"Volos, C. K., Kyprianidis, I. M., & Stouboulos, I. N. (2012). A chaotic path planning generator for autonomous mobile robots. Robotics and Autonomous Systems, 60(4), 651\u2013656.","journal-title":"Robotics and Autonomous Systems"},{"issue":"4","key":"5039_CR14","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/s11071-013-1105-3","volume":"75","author":"A Anees","year":"2014","unstructured":"Anees, A., Siddiqui, A. M., Ahmed, J., & Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807\u2013816.","journal-title":"Nonlinear Dynamics"},{"issue":"02","key":"5039_CR15","doi-asserted-by":"crossref","first-page":"1250021","DOI":"10.1142\/S0218127412500216","volume":"22","author":"R Lozi","year":"2012","unstructured":"Lozi, R. (2012). Emergence of randomness from chaos. International Journal of Bifurcation and Chaos, 22(02), 1250021.","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"5039_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-59281-2","volume-title":"Chaos: An introduction to dynamical systems","author":"KT Alligood","year":"1997","unstructured":"Alligood, K. T., Sauer, T. D., & Yorke, J. A. (1997). Chaos: An introduction to dynamical systems. New York: Springer."},{"key":"5039_CR17","unstructured":"http:\/\/www.mathworks.com\/products (2016). Accessed 28 March 2016."},{"issue":"9","key":"5039_CR18","doi-asserted-by":"crossref","first-page":"411","DOI":"10.12988\/astp.2015.5342","volume":"9","author":"B Stoyanov","year":"2015","unstructured":"Stoyanov, B., & Kordov, K. (2015). Novel secure pseudo-random number generation scheme based on two tinkerbell maps. Advanced Studies in Theoretical Physics, 9(9), 411\u2013421.","journal-title":"Advanced Studies in Theoretical Physics"},{"key":"5039_CR19","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois, M., Defour, D. & Bertho\u00e9, P. (2014) A pseudo-random bit generator based on three chaotic logistic maps and IEEE 754-2008 floating-point arithmetic. In T.V. Gopal, M. Agrawal, A. Li & S.B. Cooper (Eds.), Theory and applications of models of computation: 11th Annual Conference, TAMC 2014, Chennai, India, April 11-13, 2014, Proceedings (pp. 229\u2013247). Berlin: Springer International Publishing.","DOI":"10.1007\/978-3-319-06089-7_16"},{"issue":"1","key":"5039_CR20","first-page":"32","volume":"10","author":"NK Pareek","year":"2010","unstructured":"Pareek, N. K., Patidar, V., & Sud, K. K. (2010). A random bit generator using chaotic maps. IJ Network Security, 10(1), 32\u201338.","journal-title":"IJ Network Security"},{"key":"5039_CR21","unstructured":"Lambert, H. S. (2006). International Business Machines Corporation, Method and apparatus for encryption of data. U.S. Patent 7,133,522"},{"issue":"08","key":"5039_CR22","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(08), 2129\u20132151.","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"9","key":"5039_CR23","doi-asserted-by":"crossref","first-page":"090506","DOI":"10.1088\/1674-1056\/21\/9\/090506","volume":"21","author":"L Yang","year":"2012","unstructured":"Yang, L., & Xiao-Jun, T. (2012). A new pseudorandom number generator based on a complex number chaotic equation. Chinese Physics B, 21(9), 090506.","journal-title":"Chinese Physics B"},{"issue":"2","key":"5039_CR24","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/82.661656","volume":"45","author":"MJ Werter","year":"1998","unstructured":"Werter, M. J. (1998). An improved chaotic digital encoder. IEEE Transactions on Circuits and Systems. 2, Analog and Digital Signal Processing, 45(2), 227\u2013229.","journal-title":"IEEE Transactions on Circuits and Systems. 2, Analog and Digital Signal Processing"},{"issue":"1","key":"5039_CR25","first-page":"191","volume":"53","author":"X Tong","year":"2010","unstructured":"Tong, X., & Cui, M. (2010). Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation. Science in China Series F: Information Sciences, 53(1), 191\u2013202.","journal-title":"Science in China Series F: Information Sciences"},{"key":"5039_CR26","unstructured":"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-22-rev1a\/SP800-22rev1a.pdf (2016). Accessed 28 March 2016."},{"key":"5039_CR27","unstructured":"IEEE Computer Society, IEEE standard for binary floating-point arithmetic, ANSI\/IEEE Std. 754, (1985)."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-5039-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5039-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5039-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T05:21:35Z","timestamp":1603257695000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-5039-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,6]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["5039"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5039-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11,6]]}}}