{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T22:07:14Z","timestamp":1773526034848,"version":"3.50.1"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004242","name":"Princess Nourah bint Abdulrahman University Researchers Supporting Project","doi-asserted-by":"publisher","award":["PNURSP2023R239"],"award-info":[{"award-number":["PNURSP2023R239"]}],"id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004242","name":"Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004242","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3298545","type":"journal-article","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T17:51:52Z","timestamp":1690221112000},"page":"101694-101709","source":"Crossref","is-referenced-by-count":17,"title":["Design and Analysis of New Version of Cryptographic Hash Function Based on Improved Chaotic Maps With Induced DNA Sequences"],"prefix":"10.1109","volume":"11","author":[{"given":"Salwa M. Serag","family":"Eldin","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5068-2033","authenticated-orcid":false,"given":"Ahmed A. Abd.","family":"El-Latif","sequence":"additional","affiliation":[{"name":"EIAS Data Science Laboratory, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9711-0235","authenticated-orcid":false,"given":"Samia A.","family":"Chelloug","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4915-9325","authenticated-orcid":false,"given":"Musheer","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Jamia Millia Islamia, New Delhi, India"}]},{"given":"Ahmed H.","family":"Eldeeb","sequence":"additional","affiliation":[{"name":"Electronic and Communication Department, Gezira Higher Institute of Engineering and Technology (EGI), Cairo, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7081-0485","authenticated-orcid":false,"given":"Tamer O.","family":"Diab","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, Benha Faculty of Engineering, Benha University, Banha, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-6521","authenticated-orcid":false,"given":"Wageda I. Al","family":"Sobky","sequence":"additional","affiliation":[{"name":"Basic Engineering Sciences Department, Benha Faculty of Engineering, Benha University, Benha, Egypt"}]},{"given":"Hany Nasry","family":"Zaky","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Military Technical College, Cairo, Egypt"}]}],"member":"263","reference":[{"key":"ref13","author":"priyadarshini","year":"2019","journal-title":"Introduction to Blockchain Technology"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CISW.2007.4425614"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3071501"},{"key":"ref56","first-page":"7","article-title":"Secure hash function based on chaotic tent map with changeable parameter","volume":"18","author":"li","year":"2012","journal-title":"High Technol Lett"},{"key":"ref15","first-page":"1116","article-title":"A-survey-of-blockchain-from-the-viewpoints-of-applications,-challenges-and-chances","volume":"12","author":"alsobky","year":"2021","journal-title":"International Journal of Engineering Science"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.12.009"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3183990"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2009.02.044"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2008.09.056"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2009.05.065"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.37282\/991819.16.38"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2009.02.001"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2009.09.059"},{"key":"ref17","volume":"139","author":"stallings","year":"2011","journal-title":"Data and Computer Communications"},{"key":"ref16","first-page":"15","volume":"17","year":"1995"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/app9183740"},{"key":"ref18","first-page":"171","author":"ibrahim","year":"2016","journal-title":"New Secure Solutions for Privacy and Access Control in Health Information Exchange"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2009.02.020"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2008.12.031"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.07.003"},{"key":"ref45","first-page":"180","year":"2002"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2006.10.052"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.04.003"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.1340"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/5767102"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.202"},{"key":"ref43","author":"shannon","year":"1949","journal-title":"The Mathematical Theory of Communication"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.10.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-017-0123-1"},{"key":"ref7","author":"xiao","year":"2011","journal-title":"Chaos Based Hash Function Chaos-Based Cryptography"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732117"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-007-9010-1"},{"key":"ref3","article-title":"Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD","author":"wang","year":"2004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_3"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs.v11i2.6508"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"457","DOI":"10.24425\/123546","article-title":"SHAH: Hash function based on irregularly","volume":"64","author":"todorova","year":"2018","journal-title":"Int J Electron Telecommun"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2007.10698131"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896661"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.24425\/123546"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/math10081333"},{"key":"ref78","first-page":"461","article-title":"Cryptographic hash functions: A review","volume":"9","author":"sobti","year":"2012","journal-title":"Int J Comput Sci Issues"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.09.008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2018.07.027"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.17.1.11-16"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"4442","DOI":"10.7498\/aps.55.4442","article-title":"Keyed one-way Hash function construction based on the chaotic dynamic S-box","volume":"55","author":"guo","year":"2006","journal-title":"Acta Physica Sinica"},{"key":"ref30","first-page":"74","article-title":"A proposal to improve RC4 algorithm based on hybrid chaotic maps","volume":"6","author":"sadiq","year":"2016","journal-title":"J Adv Comput Sci Technol Res"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2009.03.168"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.21608\/ijt.2022.266474"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.7498\/aps.54.4006"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002763"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/IWCFTA.2011.72"},{"key":"ref2","author":"menezes","year":"1997","journal-title":"Handbook of Applied Cryptography"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0199-8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01244-y"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/e22091012"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/21\/6\/060503"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2008.04.060"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.06.001"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-011-0726-z"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3049881"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2013-126"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1142\/S021812741750033X"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2016.04.007"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989050"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972265"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2012.6483140"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100254"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.2991\/ccis-13.2013.53"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-011-0703-6"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20542-2","volume":"354","author":"kocarev","year":"2011","journal-title":"Chaos-Based Cryptography Theory Algorithms and Applications"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2049-6"},{"key":"ref21","first-page":"176","article-title":"Evaluation of the most suitable hyperchaotic map in S-box design used in image encryption","volume":"5","author":"saeed","year":"2022","journal-title":"International Journal of Multidisciplinary Research and Publications"},{"key":"ref65","first-page":"1089","article-title":"A topologically simple keyed hash function based on circular chaotic sinusoidal map network","author":"jiteurtragool","year":"2013","journal-title":"Proc 15th Int Conf Adv Commun Technol (ICACT)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.25212\/ICoIT17.009"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.055"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2304\/1\/012007"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-010-0432-2"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-011-0543-4"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2010.10.001"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10192383.pdf?arnumber=10192383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T22:12:28Z","timestamp":1729807948000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10192383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3298545","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}