{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:15Z","timestamp":1750306275124,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905281","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Implementation of Hardware Efficient Chaotic Generators for Signal Security in Portable Systems"],"prefix":"10.1145","author":[{"family":"Izharuddin","sequence":"first","affiliation":[{"name":"Department of Computer, Engineering, Z. H. College of Engg. &amp; Technology, Aligarh Muslim University AMU Aligarh, UP, India"}]},{"given":"Omar","family":"Farooq","sequence":"additional","affiliation":[{"name":"Department of Electronics, Engineering, Z. H. College of Engg. and Technology, Aligarh Muslim University A. M. U. Aligarh"}]},{"given":"M. Qasim","family":"Rafiq","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Z H C E T, Aligarh Muslim University AMU, Aligarh, UP, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Azeem Ilyas and Luca Adrian","author":"Vlad Adriana","year":"2013","unstructured":"Adriana Vlad , Azeem Ilyas and Luca Adrian , 2013 . Unifying running-key approach and logistic map to generate enciphering sequences, Ann. Telecommun . (2013) 68:179--186. Adriana Vlad, Azeem Ilyas and Luca Adrian, 2013. Unifying running-key approach and logistic map to generate enciphering sequences, Ann. Telecommun. (2013) 68:179--186."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.181"},{"key":"e_1_3_2_1_3_1","first-page":"251254","volume-title":"Workshop on Signal Processing Systems","author":"Azzaz M. S., Tanougast C., Sadoudi","year":"2011","unstructured":"Azzaz M. S., Tanougast C., Sadoudi S. and Dandache A ., 2011. New Hardware cryptosystem bases chaos for the secure real-time of embedded applications , Workshop on Signal Processing Systems 2011 , pp. 251254 . Azzaz M. S., Tanougast C., Sadoudi S. and Dandache A., 2011. New Hardware cryptosystem bases chaos for the secure real-time of embedded applications, Workshop on Signal Processing Systems 2011, pp. 251254."},{"key":"e_1_3_2_1_4_1","volume-title":"Horizon in Computer Science Research","volume":"4","author":"Lin Chin-Feng","year":"2013","unstructured":"Chin-Feng Lin , 2013 . Chaos-Based 2D Visual Encryption Mechanism for ECG Medical Signal , Horizon in Computer Science Research , Vol. 4 , Chapter 11, ISBN 978-1-61324-262-9. Chin-Feng Lin, 2013. Chaos-Based 2D Visual Encryption Mechanism for ECG Medical Signal, Horizon in Computer Science Research, Vol. 4, Chapter 11, ISBN 978-1-61324-262-9."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2010.5515285"},{"key":"e_1_3_2_1_6_1","first-page":"543","volume-title":"Gangadhar, 2011. VLSI Realization of a secure cryptosystem for Image encryption and decryption, International Conference on Signal Processing","author":"Deergha","year":"2011","unstructured":"Deergha K. Rao and Ch . Gangadhar, 2011. VLSI Realization of a secure cryptosystem for Image encryption and decryption, International Conference on Signal Processing 2011 , pp. 543 -- 547 . Deergha K. Rao and Ch. Gangadhar, 2011. VLSI Realization of a secure cryptosystem for Image encryption and decryption, International Conference on Signal Processing 2011, pp. 543--547."},{"issue":"1","key":"e_1_3_2_1_7_1","first-page":"76","article-title":"Improved Implimentation of Chua's Chaotic Oscillator Using Current Feedback Op Amp, IEEE Transaction on Circuits and Systems","volume":"47","author":"Elwakil","year":"2000","unstructured":"Elwakil A. S. and Kennedy M. P. 2000 . Improved Implimentation of Chua's Chaotic Oscillator Using Current Feedback Op Amp, IEEE Transaction on Circuits and Systems , Part I , Vol. 47 , No. 1 , pp. 76 -- 79 . Elwakil A. S. and Kennedy M. P. 2000. Improved Implimentation of Chua's Chaotic Oscillator Using Current Feedback Op Amp, IEEE Transaction on Circuits and Systems, Part I, Vol. 47, No. 1, pp. 76--79.","journal-title":"Part I"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.06.0205.0090"},{"key":"e_1_3_2_1_9_1","first-page":"640","article-title":"Three steps to Chaos -- Part I: Evolution, part II: a Chua circuit primer, IEEE transaction on Circuits and systems -- i","volume":"40","author":"Kennedy M.","year":"1993","unstructured":"Kennedy M. P. , 1993 . Three steps to Chaos -- Part I: Evolution, part II: a Chua circuit primer, IEEE transaction on Circuits and systems -- i : Fundamental Theory and Applications , Vol. 40 , pp. 640 -- 674 . Kennedy M. P., 1993. Three steps to Chaos -- Part I: Evolution, part II: a Chua circuit primer, IEEE transaction on Circuits and systems -- i: Fundamental Theory and Applications, Vol. 40, pp. 640--674.","journal-title":"Fundamental Theory and Applications"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4103\/0377-2063.110633"},{"key":"e_1_3_2_1_11_1","first-page":"759","volume-title":"Xiaofeng Liao and Xuebing Wang","author":"Zhang Linhua","year":"2005","unstructured":"Linhua Zhang , Xiaofeng Liao and Xuebing Wang , 2005 . An image encryption approach based on chaotic maps, Science Direct, Elsevier , Chaos, Solitons and Fractals, pp. 759 -- 765 . Linhua Zhang, Xiaofeng Liao and Xuebing Wang, 2005. An image encryption approach based on chaotic maps, Science Direct, Elsevier, Chaos, Solitons and Fractals, pp. 759--765."},{"issue":"55","key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"2719","DOI":"10.12988\/ams.2013.13242","article-title":"A Pseudo Random Number Generator Based on the Chaotic System of Chua's Circuit, and its Real Time FPGA Implimentation","volume":"7","author":"Lahcene Merah","year":"2013","unstructured":"Merah Lahcene , Adda Ali-Pacha , Naima Hadj and Mustafa Mamat , 2013 . A Pseudo Random Number Generator Based on the Chaotic System of Chua's Circuit, and its Real Time FPGA Implimentation , Applied Mathematical Science , Vol. 7 No. 55 pp. 2719 -- 2734 . Merah Lahcene, Adda Ali-Pacha, Naima Hadj and Mustafa Mamat, 2013. A Pseudo Random Number Generator Based on the Chaotic System of Chua's Circuit, and its Real Time FPGA Implimentation, Applied Mathematical Science, Vol. 7 No. 55 pp. 2719--2734.","journal-title":"Applied Mathematical Science"},{"issue":"5","key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.12988\/ams.2013.13022","article-title":"Design and FPGA Implimentation of Lorenz Chaotic System for Information Security Issues","volume":"7","author":"Lahcene Merah","year":"2013","unstructured":"Merah Lahcene , Adda Ali-Pacha , Naima Hadj and Mustafa Mamat , 2013 . Design and FPGA Implimentation of Lorenz Chaotic System for Information Security Issues , Applied Mathematical Science , Vol. 7 No. 5 pp. 237 -- 246 . Merah Lahcene, Adda Ali-Pacha, Naima Hadj and Mustafa Mamat, 2013. Design and FPGA Implimentation of Lorenz Chaotic System for Information Security Issues, Applied Mathematical Science, Vol. 7 No. 5 pp. 237--246.","journal-title":"Applied Mathematical Science"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-012-9893-9"},{"key":"e_1_3_2_1_15_1","first-page":"68","volume-title":"IEEE proceedings of international conference on Multimedia, Signal processing and communication Technology","author":"Izharuddin Parveen S, Prashar","year":"2011","unstructured":"Parveen S, Prashar S and Izharuddin , 2011 . Technique for providing security in medical signals IMPACT , IEEE proceedings of international conference on Multimedia, Signal processing and communication Technology , pp. 68 -- 71 . Parveen S, Prashar S and Izharuddin, 2011. Technique for providing security in medical signals IMPACT, IEEE proceedings of international conference on Multimedia, Signal processing and communication Technology, pp. 68--71."},{"key":"e_1_3_2_1_16_1","first-page":"544","volume-title":"Proceedings of 13th International Arab Conference on Information Technology ACIT2012","author":"Abdul Razzaq","year":"2012","unstructured":"Razzaq Abdul , Mahmood Yasir , Ahmad Farooq and Hur Ali , 2012 . Strong Key Mechanism generated by LFSR based Vigenera Cipher , Proceedings of 13th International Arab Conference on Information Technology ACIT2012 , pp. 544 -- 548 . Razzaq Abdul, Mahmood Yasir, Ahmad Farooq and Hur Ali, 2012. Strong Key Mechanism generated by LFSR based Vigenera Cipher, Proceedings of 13th International Arab Conference on Information Technology ACIT2012, pp. 544--548."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Proceedings of IEEE International conference for Internet Technology and Secure Transaction, ICITST","author":"Richard","unstructured":"Richard A. Guinee and Marta Blaszczyk, 2009. A Novel True Random Binary Sequence Generator Based On Chaotc Double Scroll Oscillator Combination With A Pseudo Random Generator For Cryptographic Applications , Proceedings of IEEE International conference for Internet Technology and Secure Transaction, ICITST , pp. 1 -- 6 . Richard A. Guinee and Marta Blaszczyk, 2009. A Novel True Random Binary Sequence Generator Based On Chaotc Double Scroll Oscillator Combination With A Pseudo Random Generator For Cryptographic Applications, Proceedings of IEEE International conference for Internet Technology and Secure Transaction, ICITST, pp. 1--6."},{"key":"e_1_3_2_1_18_1","volume-title":"Salah Mohamed Azzaz, Djeddou Mustapha and Benssalah Mustapah","author":"Said Sadoudi","year":"2009","unstructured":"Sadoudi Said , Salah Mohamed Azzaz, Djeddou Mustapha and Benssalah Mustapah , 2009 . An FPGA based Real-time Implementation of the Chen's Chaotic System for Securing Chaotic Communications \"International Journal of Nonlinear Science ,\" Vol. 7 , No. 4 pp. 467--474. Sadoudi Said, Salah Mohamed Azzaz, Djeddou Mustapha and Benssalah Mustapah, 2009. An FPGA based Real-time Implementation of the Chen's Chaotic System for Securing Chaotic Communications \"International Journal of Nonlinear Science,\" Vol. 7, No. 4 pp. 467--474."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502415"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/81.915385"},{"key":"#cr-split#-e_1_3_2_1_21_1.1","doi-asserted-by":"crossref","unstructured":"Sufi F Han F Khalil I and Hu J 2011. A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications Security Communication Networks Wiley InterScience Published online DOI: 10.1002\/sec.226 Vol. 4 Issue 6 pp. 515--524. 10.1002\/sec.226","DOI":"10.1002\/sec.226"},{"key":"#cr-split#-e_1_3_2_1_21_1.2","doi-asserted-by":"crossref","unstructured":"Sufi F Han F Khalil I and Hu J 2011. A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications Security Communication Networks Wiley InterScience Published online DOI: 10.1002\/sec.226 Vol. 4 Issue 6 pp. 515--524.","DOI":"10.1002\/sec.226"},{"key":"e_1_3_2_1_22_1","first-page":"663","volume-title":"Techniques and Applications (CIMTA-2013)","author":"Soma Sukalyan","year":"2013","unstructured":"Sukalyan Soma and Sayani Senb , 2013 . A Non-adaptive Partial Encryption of Grayscale Images Based on Chaos, Proceeding of first International Conference on Computational Intelligence: Modelling , Techniques and Applications (CIMTA-2013) , pp. 663 -- 671 . Sukalyan Soma and Sayani Senb, 2013. A Non-adaptive Partial Encryption of Grayscale Images Based on Chaos, Proceeding of first International Conference on Computational Intelligence: Modelling, Techniques and Applications (CIMTA-2013), pp. 663--671."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2013.2246777"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Yalcin M. E. Suykens J. A. K. and Vandewalle J. 2004. True random bit generation from a double-scroll attractor IEEE transaction on circuit and systems -- I Vol. 51 No. 7.  Yalcin M. E. Suykens J. A. K. and Vandewalle J. 2004. True random bit generation from a double-scroll attractor IEEE transaction on circuit and systems -- I Vol. 51 No. 7.","DOI":"10.1109\/TCSI.2004.830683"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":25,"alternative-id":["10.1145\/2905055.2905281","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905281","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}