{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T05:54:49Z","timestamp":1713851689599},"reference-count":7,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,10,10]],"date-time":"2018-10-10T00:00:00Z","timestamp":1539129600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11432-017-9438-8","type":"journal-article","created":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T02:18:57Z","timestamp":1539569937000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Some characteristics of logistic map over the finite field"],"prefix":"10.1007","volume":"62","author":[{"given":"Bo","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,10]]},"reference":[{"key":"9438_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20542-2","volume-title":"Chaos-Based Cryptography","author":"L Kocarev","year":"2011","unstructured":"Kocarev L, Lian S G. Chaos-Based Cryptography. Berlin: Springer, 2011"},{"key":"9438_CR2","doi-asserted-by":"publisher","first-page":"3249","DOI":"10.1109\/TIT.2012.2235907","volume":"59","author":"F Chen","year":"2013","unstructured":"Chen F, Wong K W, Liao X F, et al. Period distribution of the generalized discrete Arnold cat map for N = 2e. IEEE Trans Inf Theory, 2013, 59: 3249\u20133255","journal-title":"IEEE Trans Inf Theory"},{"key":"9438_CR3","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.sigpro.2013.07.020","volume":"94","author":"J B Lima","year":"2014","unstructured":"Lima J B, Novaes L F G. Image encryption based on the fractional Fourier transform over finite fields. Signal Process, 2014, 94: 521\u2013530","journal-title":"Signal Process"},{"key":"9438_CR4","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1007\/s11432-011-4401-x","volume":"55","author":"R M Yin","year":"2012","unstructured":"Yin R M, Wang J, Yuan J, et al. Weak key analysis for chaotic cipher based on randomness properties. Sci China Inf Sci, 2012, 55: 1162\u20131171","journal-title":"Sci China Inf Sci"},{"key":"9438_CR5","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1016\/j.cnsns.2010.05.008","volume":"16","author":"C Q Li","year":"2011","unstructured":"Li C Q, Li S J, Lo K T. Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul, 2011, 16: 837\u2013843","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"9438_CR6","first-page":"665","volume-title":"Proceedings of International Symposium on Information Theory and its Applications","author":"K Yoshida","year":"2014","unstructured":"Yoshida K, Miyazaki T, Uehara S, et al. Some properties of the maximum period on the Logistic map over Z\n                           2n. In: Proceedings of International Symposium on Information Theory and its Applications, Melbourne, 2014. 665\u2013668"},{"key":"9438_CR7","doi-asserted-by":"publisher","first-page":"022302","DOI":"10.1007\/s11432-015-0756-1","volume":"60","author":"B Yang","year":"2017","unstructured":"Yang B, Liao X F. Period analysis of the Logistic map for the finite field. Sci China Inf Sci, 2017, 60: 022302","journal-title":"Sci China Inf Sci"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9438-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-017-9438-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-017-9438-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T19:27:09Z","timestamp":1570649229000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-017-9438-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,10]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["9438"],"URL":"https:\/\/doi.org\/10.1007\/s11432-017-9438-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,10]]},"assertion":[{"value":"1 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"39104"}}