{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:09:50Z","timestamp":1729667390864,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iccomm.2016.7528304","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T18:27:58Z","timestamp":1470421678000},"page":"405-410","source":"Crossref","is-referenced-by-count":13,"title":["Secure Hash Algorithm based on Efficient Chaotic Neural Network"],"prefix":"10.1109","author":[{"given":"Nabil","family":"Abdoun","sequence":"first","affiliation":[]},{"given":"Safwan","family":"El Assad","sequence":"additional","affiliation":[]},{"given":"Mohammad Abu","family":"Taha","sequence":"additional","affiliation":[]},{"given":"Rima","family":"Assaf","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Deforges","sequence":"additional","affiliation":[]},{"given":"Mohamad","family":"Khalil","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Generator of chaotic sequences and corresponding generating system","author":"el assad","year":"2014","journal-title":"US Patent"},{"key":"ref11","first-page":"67","article-title":"Chaos Based Information Hiding and Security","author":"el assad","year":"2012","journal-title":"2012 International Conference for Internet Technology and Secured Transactions ICITST"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/ICITST.2014.7038770","article-title":"Efficient multicore implementation of an advanced generator of discrete chaotic sequences","author":"desnos","year":"2014","journal-title":"Internet Technology and Secured Transactions (ICITST) 2014 9th InternationalConference for"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICITST.2015.7412053"},{"year":"0","author":"mohammed","article-title":"Chaotic based secure hash algorithm","key":"ref14"},{"key":"ref15","first-page":"239","article-title":"Broad view of cryptographic hash functions","volume":"10","author":"alahmad","year":"2013","journal-title":"International Journal of Computer ScienceIssues (IJCSI)"},{"key":"ref16","article-title":"Hash functions: Theory, attacks, and applications","author":"mironov","year":"2005","journal-title":"Microsoft Research Silicon Valley Campus"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.neucom.2006.04.003"},{"key":"ref3","first-page":"3","article-title":"standard: Permutation-based hash and extendable-output functions","volume":"202","author":"sha","year":"2015","journal-title":"FIPS PUB"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.cnsns.2010.12.009"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.neucom.2008.12.031"},{"year":"2013","author":"he","article-title":"A method for designing hash function based on chaotic neural network","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/s00521-010-0432-2"},{"key":"ref2","first-page":"72","article-title":"180&#x2013;2","volume":"1","author":"standard","year":"2002"},{"key":"ref1","first-page":"235","article-title":"Secure hash standard","volume":"100","year":"1995","journal-title":"Public Law"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICITST.2015.7412051"}],"event":{"name":"2016 International Conference on Communications (COMM)","start":{"date-parts":[[2016,6,9]]},"location":"Bucharest, Romania","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7522608\/7528195\/07528304.pdf?arnumber=7528304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:05:15Z","timestamp":1498334715000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7528304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2016.7528304","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}