{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T00:06:22Z","timestamp":1756425982494,"version":"3.44.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2008,8,1]],"date-time":"2008-08-01T00:00:00Z","timestamp":1217548800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2008,8,1]],"date-time":"2008-08-01T00:00:00Z","timestamp":1217548800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/coginf.2008.4639189","type":"proceedings-article","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T14:47:34Z","timestamp":1223390854000},"page":"358-365","source":"Crossref","is-referenced-by-count":1,"title":["A Double-Piped iterated hash function based on a hybrid of chaotic maps"],"prefix":"10.1109","author":[{"family":"Jun Peng","sequence":"first","affiliation":[{"name":"College of Electronic Information Engineering, Chongqing University of Science and Technology, 400050, China"}]},{"family":"Du Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, California State University, Sacramento, 95819, USA"}]},{"family":"Yongguo Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"family":"Xiaofeng Liao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chongqing University, 400044, China"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2006.10.052"},{"key":"17","first-page":"354","article-title":"hash function based on chaotic tent maps","volume":"52","author":"yi","year":"2005","journal-title":"IEEE Trans on CAS-II"},{"key":"18","first-page":"237","article-title":"hash function based on chaotic neural networks","author":"lian","year":"2006","journal-title":"proceedings of IEEE International Symposium on Circuits and Systems"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2004.04.018"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-0779(04)00456-4"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.01.017"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(02)01770-X"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2003.12.104"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.07.026"},{"key":"21","first-page":"855","article-title":"pseudonoise sequences by chaotic nonlinear and their correlation properties","volume":"e76 b","author":"kohda","year":"1993","journal-title":"IEICE Trans on Communications"},{"key":"20","article-title":"collisions for hash functions md4, md5, haval-128 and ripemd","author":"wang","year":"2004","journal-title":"CRYPTO'04"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/18.567654"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-1964-0202968-3"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127405014052"},{"year":"0","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_40"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"journal-title":"Applied Cryptography","year":"1996","author":"schneier","key":"28"},{"key":"29","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.76.904"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.77.4162"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.854475"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.64.821"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(01)00609-0"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1997.638097"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/81.572346"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/81.989169"},{"key":"9","first-page":"687","article-title":"chaotic mixing of digital images and applications to watermarking","volume":"2","author":"voyatzis","year":"1996","journal-title":"Proceedings of ECMAST'96"},{"key":"8","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","article-title":"a symmetric image encryption based on 3d chaotic maps","volume":"21","author":"chen","year":"2004","journal-title":"Chaos Solitons & Fractals"}],"event":{"name":"2008 7th IEEE International Conference on Cognitive Informatics (ICCI)","start":{"date-parts":[[2008,8,14]]},"location":"Stanford, CA, USA","end":{"date-parts":[[2008,8,16]]}},"container-title":["2008 7th IEEE International Conference on Cognitive Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4629860\/4639143\/04639189.pdf?arnumber=4639189","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T18:03:38Z","timestamp":1756404218000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4639189\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/coginf.2008.4639189","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}