{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T13:10:06Z","timestamp":1749993006265,"version":"3.41.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856754","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"465-470","source":"Crossref","is-referenced-by-count":2,"title":["Structural improvements of chaotic PRNG implementations"],"prefix":"10.1109","author":[{"given":"Gabriele","family":"Spenger","sequence":"first","affiliation":[]},{"given":"Jorg","family":"Keller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Parallel exploration of the structure of random functions","author":"keller","year":"2002","journal-title":"Proceedings of the 6th Workshop Parallele Systeme und Algorithmen (PASA) in conjunction with the International Conference on Architecture of Computing Systems ARCS VDE"},{"key":"ref11","first-page":"7","article-title":"Period lengths of chaotic pseudo-random number generators","author":"keller","year":"2007","journal-title":"Proceedings of the Fourth IASTED International Conference on Communication Network and Information Security"},{"key":"ref12","first-page":"19","article-title":"Mathematical analysis of algorithms","author":"knuth","year":"1972","journal-title":"Proc of IFIP Congress 1971 Information Processing 71"},{"key":"ref13","first-page":"191","article-title":"On constructive approach to chaotic pseudorandom number generators","author":"kotulski","year":"2000","journal-title":"Proceedings of RCMCIS'2000"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-642-54568-9_21","article-title":"Lightweight cryptography for embedded systems-a comparative analysis","author":"manifavas","year":"2014","journal-title":"Proc 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security"},{"article-title":"The marsaglia random number cdrom including the diehard battery of tests of randomness","year":"1995","author":"marsaglia","key":"ref15"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"menezes","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_30"},{"article-title":"Statistical test suite for random and pseudorandom number generators for cryptographic applications: Special publication 800-22, revision 1a","year":"2010","author":"rukhin","key":"ref18"},{"article-title":"An Introduction to the Analysis of Algorithms.","year":"1996","author":"sedgewick","key":"ref19"},{"key":"ref4","article-title":"A practice-oriented treatment of pseudorandom number generators","author":"desai","year":"2002","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref3","article-title":"Real Time Cryptanalysis of A5\/1 on a PC","author":"biryujkov","year":"2000","journal-title":"Proc Int Workshop Fast Software Encrypt"},{"key":"ref6","article-title":"A collection of selected pseudorandom number generators with linear structures","author":"entacher","year":"1997","journal-title":"ACPC-Austrian Center for Parallel Computation Tech Rep"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516653"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-69053-0_17","article-title":"Cryptanalysis of Alleged A5 Stream Cypher","author":"golic","year":"1997","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46885-4_34"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.99.4"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1109\/ICComm.2016.7528291","article-title":"Design of a peudo-chaotic number generator as a random number generator","author":"abutaha","year":"2016","journal-title":"International Conference on Communications (COMM)"},{"key":"ref9","first-page":"481","article-title":"A very efficient pseudorandom number generator based on chaotic maps and S-box tables","volume":"9","author":"hamdi","year":"2015","journal-title":"Int J Comput Control Quantum Inform Eng"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011950531970"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856754.pdf?arnumber=7856754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T12:40:35Z","timestamp":1749991235000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856754","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}