{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:32:29Z","timestamp":1729636349397,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/atsip.2016.7523053","type":"proceedings-article","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T16:43:41Z","timestamp":1469724221000},"page":"88-92","source":"Crossref","is-referenced-by-count":3,"title":["Quantitative evaluation of chaotic CBC mode of operation"],"prefix":"10.1109","author":[{"given":"Abdessalem","family":"Abidi","sequence":"first","affiliation":[]},{"given":"Qianxue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Belgacem","family":"Bouallegue","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Machhout","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Guyeux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1201\/b14979","author":"bahi","year":"2013","journal-title":"Discrete Dynamical Systems and Chaotic Machines Theory and Applications"},{"key":"ref3","article-title":"Proving chaotic behavior of cbc mode of operation","author":"abdessalem","year":"0","journal-title":"International Journal of Bifurcation and Chaos 2016 Accepted paper forthcoming"},{"key":"ref10","first-page":"118","article-title":"Evaluating quality of chaotic pseudo-random generators. application to information hiding","volume":"4","author":"jacques","year":"2011","journal-title":"IJAS International Journal On Advances in Security"},{"key":"ref6","first-page":"51","article-title":"A topological study of chaotic iterations. application to hash functions","author":"christophe","year":"2012","journal-title":"CIPS Computational Intelligence for Privacy and Security volume 394 of Studies in Computational Intelligence"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1260\/1748-3018.4.2.167","article-title":"Hash functions using chaotic iterations","volume":"4","author":"jacques","year":"2010","journal-title":"Journal of Algorithms &amp; Computational Technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2307\/2324899"},{"key":"ref12","article-title":"An introduction to symbolic dynamics and coding","author":"douglas","year":"1995","journal-title":"Cambridge University Press"},{"key":"ref8","article-title":"Recommendation for block cipher modes of operation","author":"dworkin","year":"2001","journal-title":"methods and techniques Technical report DTIC Document"},{"key":"ref7","first-page":"19","article-title":"A novel structure with dynamic operation mode for symmetric-key block ciphers","volume":"5","author":"kuo-tsang","year":"2013","journal-title":"International Journal of Network Security & Its Applications (IJNSA)"},{"key":"ref2","article-title":"Efficient and cryptographically secure generation of chaotic pseudorandom numbers on gpu","author":"jacques","year":"2011","journal-title":"arXiv preprint arXiv 1112 5239"},{"journal-title":"Les modes operatoires de la cryptographie symetrique","year":"2003","author":"ang schiltz","key":"ref9"},{"journal-title":"An Introduction to Chaotic Dynamical Systems","year":"1989","author":"devaney","key":"ref1"}],"event":{"name":"2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP)","start":{"date-parts":[[2016,3,21]]},"location":"Monastir, Tunisia","end":{"date-parts":[[2016,3,23]]}},"container-title":["2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7504793\/7523041\/07523053.pdf?arnumber=7523053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:46:40Z","timestamp":1602676000000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7523053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/atsip.2016.7523053","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}