{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:17Z","timestamp":1750306277096,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905130","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Pseudo Random Bit Generator using Logistic and Bernoulli Maps"],"prefix":"10.1145","author":[{"given":"P. Jhansi","family":"Rani","sequence":"first","affiliation":[{"name":"CMR Institute of Technology, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(03)00469-9"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021797929800051X"},{"key":"e_1_3_2_1_3_1","volume-title":"Stream cipher system based on chaotic maps,\" Proc. SPIE 4122, Mathematics and Applications of Data\/Image Coding, Compression, and Encryption III","author":"Argenti F.","year":"2000","unstructured":"F. Argenti , S. Benzi , E. D. Re , and R. Genesio , \" Stream cipher system based on chaotic maps,\" Proc. SPIE 4122, Mathematics and Applications of Data\/Image Coding, Compression, and Encryption III , vol. 10 , 2000 . F. Argenti, S. Benzi, E. D. Re, and R. Genesio, \"Stream cipher system based on chaotic maps,\" Proc. SPIE 4122, Mathematics and Applications of Data\/Image Coding, Compression, and Encryption III, vol. 10, 2000."},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"171","article-title":"Some hints for the design of digital chaos-based cryptosystems: Lessons learned from cryptanalysis","volume":"2","author":"Arroyo D.","year":"2009","unstructured":"D. Arroyo , G. Alvarez , and S. Li , \" Some hints for the design of digital chaos-based cryptosystems: Lessons learned from cryptanalysis ,\" IFAC , vol. 2 , no. 1 , pp. 171 -- 175 , 2009 . D. Arroyo, G. Alvarez, and S. Li, \"Some hints for the design of digital chaos-based cryptosystems: Lessons learned from cryptanalysis,\" IFAC, vol. 2, no. 1, pp. 171--175, 2009.","journal-title":"IFAC"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(98)00086-3"},{"key":"e_1_3_2_1_6_1","volume-title":"January 8","author":"Conte B.","year":"2006","unstructured":"B. Conte , Implementation of RC4 in C , January 8 , 2006 . {Online}. Available: http:\/\/bradconte.com\/rc4.c B. Conte, Implementation of RC4 in C, January 8, 2006. {Online}. Available: http:\/\/bradconte.com\/rc4.c"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-6927-5","volume-title":"Ergodic theory","author":"Cornfeld I. P.","year":"1982","unstructured":"I. P. Cornfeld , S. V. Fomin , and Y. G. Sinai , Ergodic theory . Berlin : Springer , 1982 . I. P. Cornfeld, S. V. Fomin, and Y. G. Sinai, Ergodic theory. Berlin: Springer, 1982."},{"key":"e_1_3_2_1_8_1","volume-title":"An introduction to chaotic dynamical systems","author":"Devaney R. L.","year":"1989","unstructured":"R. L. Devaney , An introduction to chaotic dynamical systems . Addison-Wesley , 1989 . R. L. Devaney, An introduction to chaotic dynamical systems. Addison-Wesley, 1989."},{"key":"e_1_3_2_1_9_1","volume-title":"CHAOS: Making a new science","author":"Gleick J.","year":"1987","unstructured":"J. Gleick , CHAOS: Making a new science . Penguin , 1987 . J. Gleick, CHAOS: Making a new science. Penguin, 1987."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0010-4655(99)00233-7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2007.10.022"},{"issue":"5","key":"e_1_3_2_1_12_1","first-page":"1893","article-title":"A modified method of a class of recently presented cryptosystems","volume":"23","author":"Huang F.","year":"2005","unstructured":"F. Huang and Z. H. Guan , \" A modified method of a class of recently presented cryptosystems ,\" Chaos, Solitons & Fractals , vol. 23 , no. 5 , pp. 1893 -- 1899 , 2005 . F. Huang and Z. H. Guan, \"A modified method of a class of recently presented cryptosystems,\" Chaos, Solitons & Fractals, vol. 23, no. 5, pp. 1893--1899, 2005.","journal-title":"Chaos, Solitons & Fractals"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0217979204025440"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2002.804550"},{"key":"e_1_3_2_1_15_1","first-page":"1258","article-title":"Digital random-number generator based on the chaotic signal algorithm","volume":"46","author":"Kolesov V. V.","year":"2001","unstructured":"V. V. Kolesov , R. V. Belyaev , and G. M. A. Voronov , \" Digital random-number generator based on the chaotic signal algorithm ,\" Journal of Communications Technology and Electronics , vol. 46 , pp. 1258 -- 1263 , 2001 . V. V. Kolesov, R. V. Belyaev, and G. M. A. Voronov, \"Digital random-number generator based on the chaotic signal algorithm,\" Journal of Communications Technology and Electronics, vol. 46, pp. 1258--1263, 2001.","journal-title":"Journal of Communications Technology and Electronics"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2004.09.028"},{"key":"e_1_3_2_1_17_1","volume-title":"INDOCRYPT","author":"Li S.","year":"2001","unstructured":"S. Li , X. Mou , and Y. Cai , \" Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography,\" Lecture Notes in Computer Science, vol. 2247, pp. 316--329, Progress in Cryptology \u00e2\u0102\u015e , INDOCRYPT 2001 . S. Li, X. Mou, and Y. Cai, \"Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography,\" Lecture Notes in Computer Science, vol. 2247, pp. 316--329, Progress in Cryptology \u00e2\u0102\u015e, INDOCRYPT 2001."},{"key":"e_1_3_2_1_18_1","first-page":"874","article-title":"Characteristic analysis of a chaotic random number generator using piece-wise-linear map","volume":"27","author":"Li X. M.","year":"2005","unstructured":"X. M. Li , H. B. Shen , and X. L. Yan , \" Characteristic analysis of a chaotic random number generator using piece-wise-linear map ,\" Journal of Electronics and Information Technology , vol. 27 , pp. 874 -- 878 , 2005 . X. M. Li, H. B. Shen, and X. L. Yan, \"Characteristic analysis of a chaotic random number generator using piece-wise-linear map,\" Journal of Electronics and Information Technology, vol. 27, pp. 874--878, 2005.","journal-title":"Journal of Electronics and Information Technology"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/cta.4490210506"},{"key":"e_1_3_2_1_20_1","first-page":"534","article-title":"Pseudo-random number generators and chaos","volume":"65","author":"Oishi S.","year":"1982","unstructured":"S. Oishi and H. Inoue , \" Pseudo-random number generators and chaos ,\" Transactions of the Institute of Electronics and Communication Engineers of Japan E , vol. 65 , pp. 534 -- 541 , 1982 . S. Oishi and H. Inoue, \"Pseudo-random number generators and chaos,\" Transactions of the Institute of Electronics and Communication Engineers of Japan E, vol. 65, pp. 534--541, 1982.","journal-title":"Transactions of the Institute of Electronics and Communication Engineers of Japan E"},{"issue":"1","key":"e_1_3_2_1_21_1","first-page":"32","article-title":"Random bit generator using chaotic maps","volume":"10","author":"Pareek N. K.","year":"2010","unstructured":"N. K. Pareek , V. Patidar , and K. K. Sud , \" Random bit generator using chaotic maps ,\" International Journal of Network Security , vol. 10 , no. 1 , pp. 32 -- 38 , 2010 . N. K. Pareek, V. Patidar, and K. K. Sud, \"Random bit generator using chaotic maps,\" International Journal of Network Security, vol. 10, no. 1, pp. 32--38, 2010.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_22_1","unstructured":"R. Rivest \"Rc4 \" RSA Laboratories 1987.  R. Rivest \"Rc4 \" RSA Laboratories 1987."},{"key":"e_1_3_2_1_23_1","volume-title":"NIST","author":"Rukhin A.","year":"2010","unstructured":"A. Rukhin , J. Soto , J. Nechvatal , M. Smid , E. Barker , S. Leigh , M. Levenson , M. Vangel , D. Banks , A. Heckert , J. Dray , and S. Vo , NIST Special Publication 800-22 Rev.1a: A statistical test suite for random and pseudorandom number generators for cryptographic applications . NIST , Apr. 2010 . A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo, NIST Special Publication 800-22 Rev.1a: A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST, Apr. 2010."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/81.915385"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/81.915396"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","first-page":"3964","DOI":"10.7498\/aps.55.3964","article-title":"Novel chaos-based pseudo-random number generator","volume":"55","author":"Wang L.","year":"2006","unstructured":"L. Wang , F. P. Wang , and Z. J. Wang , \" Novel chaos-based pseudo-random number generator ,\" Acta Physica Sinica , vol. 55 , pp. 3964 -- 3968 , 2006 . L. Wang, F. P. Wang, and Z. J. Wang, \"Novel chaos-based pseudo-random number generator,\" Acta Physica Sinica, vol. 55, pp. 3964--3968, 2006.","journal-title":"Acta Physica Sinica"},{"key":"e_1_3_2_1_28_1","first-page":"2433","article-title":"Design of a chaotic random number generator","volume":"26","author":"Wang Y.","year":"2005","unstructured":"Y. Wang , H. Shen , and X. Yan , \" Design of a chaotic random number generator ,\" Chinese Journal of Semiconductors , vol. 26 , pp. 2433 -- 2439 , 2005 . Y. Wang, H. Shen, and X. Yan, \"Design of a chaotic random number generator,\" Chinese Journal of Semiconductors, vol. 26, pp. 2433--2439, 2005.","journal-title":"Chinese Journal of Semiconductors"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2006.01.030"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(02)00431-0"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0010-4655(01)00220-X"},{"issue":"9","key":"e_1_3_2_1_32_1","first-page":"1","article-title":"A new pseudorandom number generator based on a complex number chaotic equation\u00e2\u0139&Uring;","volume":"21","author":"Yang L.","year":"2012","unstructured":"L. Yang and T. Xiao-Jun , \" A new pseudorandom number generator based on a complex number chaotic equation\u00e2\u0139&Uring; ,\" Chin. Phys. B , vol. 21 , no. 9 , pp. 1 -- 8 , 2012 . L. Yang and T. Xiao-Jun, \"A new pseudorandom number generator based on a complex number chaotic equation\u00e2\u0139&Uring;,\" Chin. Phys. B, vol. 21, no. 9, pp. 1--8, 2012.","journal-title":"Chin. Phys. B"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905130","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:49Z","timestamp":1750221529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":32,"alternative-id":["10.1145\/2905055.2905130","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905130","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}