{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:56:22Z","timestamp":1773323782526,"version":"3.50.1"},"reference-count":31,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2001,7,1]],"date-time":"2001-07-01T00:00:00Z","timestamp":993945600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of the Franklin Institute"],"published-print":{"date-parts":[[2001,7]]},"DOI":"10.1016\/s0016-0032(00)00087-9","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T12:59:31Z","timestamp":1027601971000},"page":"429-441","source":"Crossref","is-referenced-by-count":80,"title":["Use of chaotic dynamical systems in cryptography"],"prefix":"10.1016","volume":"338","author":[{"given":"Roland","family":"Schmitz","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0016-0032(00)00087-9_BIB1","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication Theory of Secrecy Systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Systems Tech. J."},{"key":"10.1016\/S0016-0032(00)00087-9_BIB2","series-title":"Contemporary Cryptology","article-title":"Contemporary cryptology: an introduction","author":"Massey","year":"1992"},{"issue":"8","key":"10.1016\/S0016-0032(00)00087-9_BIB3","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","article-title":"Synchronization in chaotic systems","volume":"64","author":"Pecora","year":"1990","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"10.1016\/S0016-0032(00)00087-9_BIB4","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/81.572346","article-title":"Cryptography based on chaotic systems","volume":"44","author":"Yang","year":"1997","journal-title":"IEE Trans. Circuits Systems \u2014 I"},{"issue":"2","key":"10.1016\/S0016-0032(00)00087-9_BIB5","doi-asserted-by":"crossref","first-page":"1532","DOI":"10.1103\/PhysRevE.57.1532","article-title":"Implementation of chaotic cryptography with chaotic synchronization","volume":"57","author":"He","year":"1998","journal-title":"Phys. Rev. E"},{"issue":"12","key":"10.1016\/S0016-0032(00)00087-9_BIB6","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1049\/el:19990693","article-title":"Dynamical cryptography based on synchronised chaotic systems","volume":"35","author":"Chu","year":"1999","journal-title":"Electron. Lett."},{"issue":"1","key":"10.1016\/S0016-0032(00)00087-9_BIB7","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/12.559800","article-title":"Secure communication with chaotic systems of difference equations","volume":"46","author":"Papadimitriou","year":"1997","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/S0016-0032(00)00087-9_BIB8","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1002\/cta.4490180302","article-title":"Generating randomness from chaos and constructing chaos with desired randomness","volume":"18","author":"Chua","year":"1990","journal-title":"Int. J. Circuit Theory Appl."},{"key":"10.1016\/S0016-0032(00)00087-9_BIB9","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","article-title":"On the derivation of a chaotic encryption algorithm","volume":"1","author":"Matthews","year":"1989","journal-title":"Cryptologia XIII"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB10","doi-asserted-by":"crossref","unstructured":"T. Habutsu, Y. Nishio, I. Sasase, S. Mori, A secret key cryptosystem by iterating a chaotic map, Proceedings of the EUROCRYPT \u201991, Springer, Berlin, 1991, pp.127\u2013140.","DOI":"10.1007\/3-540-46416-6_11"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB11","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1117\/12.227907","article-title":"Chaotic bit sequences for stream cipher cryptography and their correlation functions","volume":"2612","author":"Kohda","year":"1995","journal-title":"SPIE Proc."},{"issue":"1","key":"10.1016\/S0016-0032(00)00087-9_BIB12","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1142\/S0218127497000145","article-title":"Generating chaotic secure sequences with desired statistical properties and high security","volume":"7","author":"Hong","year":"1997","journal-title":"Int. J. Bifurc. Chaos"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB13","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1002\/andp.19975090504","article-title":"Discrete chaotic crytography","volume":"6","author":"Kotulski","year":"1997","journal-title":"Ann. Phys."},{"issue":"6","key":"10.1016\/S0016-0032(00)00087-9_BIB14","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1142\/S0218127499000778","article-title":"Application of discrete chaotic dynamical systems in cryptography \u2014 DCC method","volume":"9","author":"Kotulski","year":"1999","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"6","key":"10.1016\/S0016-0032(00)00087-9_BIB15","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1142\/S021812749800098X","article-title":"Symmetric ciphers based on two-dimensional chaotic maps","volume":"8","author":"Fridrich","year":"1998","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"2","key":"10.1016\/S0016-0032(00)00087-9_BIB16","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1142\/S0218127496000023","article-title":"Clarifying chaos: examples and counter examples","volume":"6","author":"Brown","year":"1996","journal-title":"Int. J. Bifurc. Chaos"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB17","series-title":"An Introduction to Chaotic Dynamical Systems","author":"Devaney","year":"1989"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB18","unstructured":"P. Collet, J.-P. Eckmann, Iterated maps of the interval as dynamical systems, Birkh\u00e4user, Basel, 1980."},{"key":"10.1016\/S0016-0032(00)00087-9_BIB19","doi-asserted-by":"crossref","first-page":"332","DOI":"10.2307\/2324899","article-title":"On Devaney's definition of chaos","volume":"4","author":"Banks","year":"1992","journal-title":"Am. Math. Monthly 99"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB20","series-title":"Fractals for the Classroom, Part 2","author":"Peitgen","year":"1992"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB21","series-title":"Chebychev Polynomials","author":"Rivlin","year":"1990"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB22","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1515\/FREQ.1998.52.1-2.11","article-title":"\u00dcber Anwendungen der Tschebyscheffschen Polynomen in der Schaltungstechnik","volume":"52","author":"Huber","year":"1998","journal-title":"Frequenz"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB23","doi-asserted-by":"crossref","unstructured":"F. Robert, Discrete Iterations, Springer, Berlin, 1986.","DOI":"10.1007\/978-3-642-61607-5"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB24","first-page":"140","article-title":"Supercomputer investigations of a chaotic encryption algorithm","volume":"2","author":"Matthews","year":"1991","journal-title":"Cryptologia XV"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB25","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1090\/S0002-9947-1988-0946440-2","article-title":"Pseudo-orbit shadowing in the family of tent maps","volume":"1","author":"Coven","year":"1988","journal-title":"Trans. Amer. Math. Soc. 308"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB26","unstructured":"H.G. Schuster, Deterministic Chaos, Wiley\/VCH, 1995."},{"key":"10.1016\/S0016-0032(00)00087-9_BIB27","first-page":"1120","article-title":"On combinations of stochastic and deterministic processes","volume":"53","author":"Ulam","year":"1947","journal-title":"Bull. Am. Math. Soc."},{"key":"10.1016\/S0016-0032(00)00087-9_BIB28","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1090\/S0002-9939-1964-0202968-3","article-title":"Ergodic and mixing properties of Chebychev polynomials","volume":"15","author":"Adler","year":"1964","journal-title":"Proc. Am. Math. Soc."},{"key":"10.1016\/S0016-0032(00)00087-9_BIB29","doi-asserted-by":"crossref","unstructured":"E. Biham, Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT\u201991, Proceedings of the EUROCRYPT \u201991, Springer, Berlin, 1991, pp. 532\u2013534.","DOI":"10.1007\/3-540-46416-6_49"},{"key":"10.1016\/S0016-0032(00)00087-9_BIB30","unstructured":"F. Pichler, J. Scharinger, Ciphering by Bernoulli shifts in finite abelian groups, in Contributions to General Algebra, Proceedings of the Linz-Conference, Vienna, pp. 465\u2013476."},{"key":"10.1016\/S0016-0032(00)00087-9_BIB31","unstructured":"T. Kohda, A. Tsuneda, Explicit evaluation of correlation functions of Chebyshev binary and bit sequences based on Perron\u2013Frobenius-operator, IEICE Trans. Fund. Electron. Comm. Comput. Sci. E77-A (11) (1994) 1794\u20131800."}],"container-title":["Journal of the Franklin Institute"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0016003200000879?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0016003200000879?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T07:50:20Z","timestamp":1556178620000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0016003200000879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,7]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2001,7]]}},"alternative-id":["S0016003200000879"],"URL":"https:\/\/doi.org\/10.1016\/s0016-0032(00)00087-9","relation":{},"ISSN":["0016-0032"],"issn-type":[{"value":"0016-0032","type":"print"}],"subject":[],"published":{"date-parts":[[2001,7]]}}}