{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T01:46:31Z","timestamp":1774143991592,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T00:00:00Z","timestamp":1478649600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11432-015-0756-1","type":"journal-article","created":{"date-parts":[[2016,11,15]],"date-time":"2016-11-15T03:05:26Z","timestamp":1479179126000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Period analysis of the Logistic map for the finite field","\u57fa\u4e8e\u6709\u9650\u57dfN=3^n \u7684Logistic \u6620\u5c04\u5468\u671f\u5206\u6790"],"prefix":"10.1007","volume":"60","author":[{"given":"Bo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,9]]},"reference":[{"key":"756_CR1","first-page":"527","volume":"98","author":"A N Kolmogorov","year":"1954","unstructured":"Kolmogorov A N. On conservation of conditionally periodic motions under small perturbations of the Hamiltonian. Dokl Akad Nauk SSSR, 1954, (98): 527\u2013530","journal-title":"Dokl Akad Nauk SSSR"},{"key":"756_CR2","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2","volume":"20","author":"E N Lorenz","year":"1963","unstructured":"Lorenz E N. Deterministic non-periodic follow. J Atmos Sci, 1963, (20): 130\u2013141","journal-title":"J Atmos Sci"},{"key":"756_CR3","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF01608556","volume":"50","author":"M Henon","year":"1976","unstructured":"Henon M. Two-dimensional mapping with a strange attractor. Comm Math Phys, 1976, (50): 69\u201377","journal-title":"Comm Math Phys"},{"key":"756_CR4","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"R May","year":"1976","unstructured":"May R. Simple mathematical model with very complicated dynamics. Nature, 1976, (261): 459\u2013467","journal-title":"Nature"},{"key":"756_CR5","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/BF01020332","volume":"19","author":"M Feigenbaum","year":"1978","unstructured":"Feigenbaum M. Quantitative universality for a class of nonlinear transformations. J Stat Phys, 1978, (19): 25\u201352","journal-title":"J Stat Phys"},{"key":"756_CR6","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","volume":"13","author":"A Robert","year":"1989","unstructured":"Robert A, Matthews J. On the derivation of a chaotic encryption algorithm. Cryptologia, 1989, (13): 29\u201342","journal-title":"Cryptologia"},{"key":"756_CR7","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","volume":"64","author":"L Pecora","year":"1989","unstructured":"Pecora L, Carroll T. Synchronization in chaotic systems. Phys Rev Lett, 1989, (64): 821\u2013824","journal-title":"Phys Rev Lett"},{"key":"756_CR8","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Gamal El","year":"1985","unstructured":"El Gamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory, 1985, (31): 469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"756_CR9","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/18.567654","volume":"43","author":"T Kohda","year":"1997","unstructured":"Kohda T, Tsuneda A. Statistics of chaotic binary sequences. IEEE Trans Inf Theory, 1997, (43): 104\u2013112","journal-title":"IEEE Trans Inf Theory"},{"key":"756_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20542-2","volume-title":"Chaos-Based Cryptography: Theory, Algorithms and Applications","author":"L Kocarev","year":"2011","unstructured":"Kocarev L, Lian S. Chaos-Based Cryptography: Theory, Algorithms and Applications. New York: Springer-Verlag, 2011"},{"key":"756_CR11","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev L. Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag, 2001, (1): 6\u201321","journal-title":"IEEE Circ Syst Mag"},{"key":"756_CR12","doi-asserted-by":"crossref","first-page":"2601","DOI":"10.1109\/18.796413","volume":"45","author":"G Gong","year":"1999","unstructured":"Gong G, Ham L. Public-key cryptosystems based on cubic finite field extensions. IEEE Trans Inf Theory, 1999, (45): 2601\u20132605","journal-title":"IEEE Trans Inf Theory"},{"key":"756_CR13","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/81.899919","volume":"47","author":"G Kolumban","year":"2000","unstructured":"Kolumban G, Kennedy M. The role of synchronization in digital communications using chaos-part III: performance bounds for correlation receivers. IEEE Trans Circ Syst, 2000, (47): 1673\u20131683","journal-title":"IEEE Trans Circ Syst"},{"key":"756_CR14","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/81.904880","volume":"48","author":"G Jakimoski","year":"2001","unstructured":"Jakimoski G, Kocarev L. Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I: Fundam Theory Appl, 2001, (48): 163\u2013169","journal-title":"IEEE Trans Circ Syst I: Fundam Theory Appl"},{"key":"756_CR15","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract, 2004, (21): 749\u2013761","journal-title":"Chaos Soliton Fract"},{"key":"756_CR16","doi-asserted-by":"crossref","first-page":"033118","DOI":"10.1063\/1.2242052","volume":"16","author":"A N Pisarchik","year":"2006","unstructured":"Pisarchik A N, Flores-Carmona N J, Carpio-Valadez M. Encryption and decryption of images with chaotic map lattices. Chaos Interdisciplinary J Nonlinear Sci, 2006, 16: 033118","journal-title":"Chaos Interdisciplinary J Nonlinear Sci"},{"key":"756_CR17","doi-asserted-by":"crossref","first-page":"023110","DOI":"10.1063\/1.2903758","volume":"18","author":"R Hasimoto-Beltran","year":"2008","unstructured":"Hasimoto-Beltran R. High-performance multimedia encryption system based on chaos. Chaos Interdisciplinary J Nonlinear Sci, 2008, 18: 023110","journal-title":"Chaos Interdisciplinary J Nonlinear Sci"},{"key":"756_CR18","doi-asserted-by":"crossref","first-page":"1392","DOI":"10.1109\/TC.2010.148","volume":"59","author":"X F Liao","year":"2010","unstructured":"Liao X F, Chen F, Wong K W. On the security of public-key algorithms based on chebyshev polynomials over the finite field ZN. IEEE Trans Comput, 2010, (59): 1392\u20131401","journal-title":"IEEE Trans Comput"},{"key":"756_CR19","volume-title":"Ergodic Problems of Classical Mechanics","author":"V Arnold","year":"1968","unstructured":"Arnold V, Avez A. Ergodic Problems of Classical Mechanics. New York: Benjamin, 1968"},{"key":"756_CR20","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/S0010-4655(01)00220-X","volume":"138","author":"W K Wong","year":"2001","unstructured":"Wong W K, Lee L P, Wong K W. A modified chaotic cryptographic method. Comput Phys Commun, 2001, (138): 234\u2013236","journal-title":"Comput Phys Commun"},{"key":"756_CR21","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/S0375-9601(02)00431-0","volume":"298","author":"K W Wong","year":"2002","unstructured":"Wong K W. A fast chaotic cryptographic scheme with dynamic look-up table. Phys Lett A, 2002, (298): 238\u2013242","journal-title":"Phys Lett A"},{"key":"756_CR22","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/S0375-9601(03)00259-7","volume":"310","author":"K W Wong","year":"2003","unstructured":"Wong K W, Ho S W, Yung C K. A chaotic cryptography scheme for generating short ciphertext. Phys Lett A, 2003, (310): 67\u201373","journal-title":"Phys Lett A"},{"key":"756_CR23","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.physleta.2005.02.083","volume":"349","author":"T Xiang","year":"2006","unstructured":"Xiang T, Liao X F. A novel block cryptosystem based on iterating a chaotic map. Phys Lett A, 2006, (349): 109\u2013115","journal-title":"Phys Lett A"},{"key":"756_CR24","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s11432-010-0010-3","volume":"53","author":"X J Tong","year":"2010","unstructured":"Tong X J, Cui M G. Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation. Sci China Inf Sci, 2010, (53): 191\u2013202","journal-title":"Sci China Inf Sci"},{"key":"756_CR25","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1007\/s11432-011-4401-x","volume":"55","author":"R M Yin","year":"2012","unstructured":"Yin R M, Wang J, Yuan J, et al. Weak key analysis for chaotic cipher based on randomness properties. Sci China Inf Sci, 2012, (55): 1162\u20131171","journal-title":"Sci China Inf Sci"},{"key":"756_CR26","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1016\/j.cnsns.2010.04.031","volume":"16","author":"D Arroyo","year":"2011","unstructured":"Arroyo D, Alvarez G, Amig\u00f3 J, et al. Cryptanalysis of a family of self-synchronizing chaotic stream ciphers. Original Res Article Commun Nonlinear Sci Numer Simulat, 2011, (16): 805\u2013813","journal-title":"Original Res Article Commun Nonlinear Sci Numer Simulat"},{"key":"756_CR27","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1016\/j.cnsns.2010.05.008","volume":"16","author":"C Li","year":"2011","unstructured":"Li C, Li S, Lo K. Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. Original Res Article Commun Nonlinear Sci Numer Simulat, 2011, (16): 837\u2013843","journal-title":"Original Res Article Commun Nonlinear Sci Numer Simulat"},{"key":"756_CR28","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/TIT.2011.2171534","volume":"58","author":"F Chen","year":"2012","unstructured":"Chen F, Wong K W, Liao X F, et al. Period distribution of generalized discrete arnold cat map for N = pe. IEEE Trans Inf Theory, 2012, (58): 445\u2013452","journal-title":"IEEE Trans Inf Theory"},{"key":"756_CR29","doi-asserted-by":"crossref","first-page":"3249","DOI":"10.1109\/TIT.2012.2235907","volume":"59","author":"F Chen","year":"2013","unstructured":"Chen F, Wong K W, Liao X F, et al. Period distribution of the generalized discrete arnold cat map for N = 2e. IEEE Trans Inf Theory, 2013, (59): 3249\u20133255","journal-title":"IEEE Trans Inf Theory"},{"key":"756_CR30","doi-asserted-by":"crossref","first-page":"5110","DOI":"10.1016\/j.ins.2011.07.008","volume":"181","author":"F Chen","year":"2011","unstructured":"Chen F, Liao X F, Xiang T, et al. Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN. Inf Sci, 2011, (181): 5110\u20135118","journal-title":"Inf Sci"},{"key":"756_CR31","first-page":"665","volume-title":"Proceedings of International Symposium on Information Theory and its Applications, Melbourne","author":"K Yoshida","year":"2014","unstructured":"Yoshida K, Miyazaki T, Uehara S, et al. Some properties of the maximum period on the Logistic map over Z2n. In: Proceedings of International Symposium on Information Theory and its Applications, Melbourne, 2014. 665\u2013668"},{"key":"756_CR32","first-page":"714","volume-title":"Proceedings of International Symposium on Information Theory and its Applications, Melbourne","author":"T Miyazaki","year":"2014","unstructured":"Miyazaki T, Araki S, Uehara S, et al. A study of an automorphism on the Logistic maps over prime fields. In: Proceedings of International Symposium on Information Theory and its Applications, Melbourne, 2014. 714\u2013718"},{"key":"756_CR33","doi-asserted-by":"crossref","first-page":"2258","DOI":"10.1587\/transfun.E93.A.2258","volume":"93","author":"T Miyazaki","year":"2010","unstructured":"Miyazaki T, Araki S, Uehara S. Some properties of Logistic maps over integers. IEICE Trans Fundamentals, 2010, (93): 2258\u20132265","journal-title":"IEICE Trans Fundamentals"},{"key":"756_CR34","volume-title":"Proceedings of the 30th Symposium on Cryptography and Information Security, Japanese","author":"T Miyazaki","year":"2013","unstructured":"Miyazaki T, Araki S, Uehara S, et al. A study on the pseudorandom number generator for the Logistic map over prime fields. In: Proceedings of the 30th Symposium on Cryptography and Information Security, Japanese, 2013"},{"key":"756_CR35","volume-title":"New York: Springer-Verlag","author":"J H Silverman","year":"2007","unstructured":"Silverman J H. The Arithmetic of Dynamical Systems. New York: Springer-Verlag, 2007"},{"key":"756_CR36","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2103-4","volume-title":"A Classical Introduction to Modern Number Theory. Volume 84 of Graduate Texts in Mathematics","author":"K Ireland","year":"1990","unstructured":"Ireland K, Rosen M. A Classical Introduction to Modern Number Theory. Volume 84 of Graduate Texts in Mathematics. 2nd ed. New York: Springer-Verlag, 1990"},{"key":"756_CR37","first-page":"71","volume":"49","author":"L Keen","year":"1994","unstructured":"Keen L. Julia sets of rational maps. Comp Dyn Syst, 1994, (49): 71\u201390","journal-title":"Comp Dyn Syst"},{"key":"756_CR38","volume-title":"Universitext: Tracts in Mathematics","author":"L Carleson","year":"1993","unstructured":"Carleson L, Gamelin T W. Complex dynamics. In: Universitext: Tracts in Mathematics. New York: Springer-Verlag, 1993"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0756-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-0756-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0756-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:34:57Z","timestamp":1498361697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-0756-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,9]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["756"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-0756-1","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,9]]},"article-number":"022302"}}