{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T03:07:06Z","timestamp":1762312026640,"version":"build-2065373602"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:00:00Z","timestamp":1762300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:00:00Z","timestamp":1762300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Guangxi Science and Technology Projects under Grant","award":["GuiKeAD24010047"],"award-info":[{"award-number":["GuiKeAD24010047"]}]},{"DOI":"10.13039\/100012547","name":"Natural Science Foundation of Guangxi Zhuang Autonomous Region","doi-asserted-by":"publisher","award":["2022GXNSFFA035028"],"award-info":[{"award-number":["2022GXNSFFA035028"]}],"id":[{"id":"10.13039\/100012547","id-type":"DOI","asserted-by":"publisher"}]},{"name":"research fund of Guangxi Normal University under Grant","award":["2021JC006"],"award-info":[{"award-number":["2021JC006"]}]},{"name":"AI+Education research project of Guangxi Humanities Society Science Development Research Center under Grant","award":["ZXZJ202205"],"award-info":[{"award-number":["ZXZJ202205"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Chaotic systems play an indispensable role in the fields of cryptography and information security. Sine-Transform-Based Chaotic System (STBCS) can address the shortcomings of low complexity and limited chaotic behaviour of classical chaos systems. In this paper, a compact hardware STBCS is proposed and developed on the FPGA device by using the Stochastic Computation (SC) technique. The traditional arithmetic operations are replaced by the SC and finite state machines design. The structure of STBCS is optimised, where the disturbance method is employed to improve the chaotic behaviours and also taking the SC method into account for implementation. The hardware performance of the proposed design is verified via various tests of the chaotic system and corresponding random number generator. Experimental results show that the utilisation of the hardware resources is reduced especially the DSP components compared to the traditional design methods. This provides an efficient design for the random generator of the alternative cryptosystems.<\/jats:p>","DOI":"10.1186\/s42400-025-00385-2","type":"journal-article","created":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T03:01:57Z","timestamp":1762311717000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A compact hardware STBCS design by using stochastic computation"],"prefix":"10.1186","volume":"8","author":[{"given":"Junxiu","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhewei","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Yuling","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Junjie","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,5]]},"reference":[{"key":"385_CR1","doi-asserted-by":"crossref","unstructured":"Al-Musawi WA, Wali WA, Al-Ibadi MA (2021) Implementation of chaotic system using FPGA. In: 2021 6th Asia-Pacific conference on intelligent robot systems, ACIRS 2021, IEEE, pp 83\u201388","DOI":"10.1109\/ACIRS52449.2021.9519360"},{"issue":"18\u201320","key":"385_CR2","doi-asserted-by":"publisher","first-page":"3469","DOI":"10.1140\/epjs\/s11734-021-00234-6","volume":"230","author":"MS Azzaz","year":"2021","unstructured":"Azzaz MS, Fellah R, Tanougast C, Kaibou R (2021) Design and FPGA implementation of TRNG based on a new multi-wing attractor in Lorenz chaotic system. Eur Phys J Spec Top 230(18\u201320):3469\u20133480","journal-title":"Eur Phys J Spec Top"},{"key":"385_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2024.114843","volume":"182","author":"Li Binglun","year":"2024","unstructured":"Binglun Li, Kehui Sun, Huihai Wang, Wenhao Liu (2024) A delay-disturbance method to counteract the dynamical degradation of digital chaotic systems and its application. Chaos, Solitons Fractals 182:114843","journal-title":"Chaos, Solitons Fractals"},{"issue":"4","key":"385_CR4","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11554-022-01220-4","volume":"19","author":"H Cai","year":"2022","unstructured":"Cai H, Sun J, Gao Z, Zhang H (2022) A novel multi-wing chaotic system with FPGA implementation and application in image encryption. J Real-Time Image Process 19(4):775\u2013790","journal-title":"J Real-Time Image Process"},{"key":"385_CR5","doi-asserted-by":"publisher","first-page":"4073","DOI":"10.1002\/sec.1324","volume":"8","author":"L Cao","year":"2015","unstructured":"Cao L, Luo Y, Bi J, Qiu S, Lu Z, Harkin J, McDaid L (2015) An authentication strategy based on spatiotemporal chaos for software copyright protection. Secur Commun Netw 8:4073\u20134086","journal-title":"Secur Commun Netw"},{"key":"385_CR6","doi-asserted-by":"crossref","unstructured":"Chung H, Miri A (2012) On the hardware design and implementation of a chaos-based RFID authentication and watermarking scheme. In: 2012 11th international conference on information science, signal processing and their applications (ISSPA), pp 460\u2013465","DOI":"10.1109\/ISSPA.2012.6310595"},{"key":"385_CR7","doi-asserted-by":"crossref","unstructured":"Giard P, Kaddoum G, Gagnon F, Thibeault C (2012) FPGA implementation and evaluation of discrete-time chaotic generators circuits. In: IECON 2012-38th annual conference on IEEE industrial electronics society, pp 3221\u20133224","DOI":"10.1109\/IECON.2012.6389382"},{"key":"385_CR8","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/TCOMM.1994.582834","volume":"42","author":"G Heidari-Bateni","year":"1994","unstructured":"Heidari-Bateni G, McGillem CD (1994) A chaotic direct-sequence spread-spectrum communication system. IEEE Trans Commun 42:1524\u20131527","journal-title":"IEEE Trans Commun"},{"key":"385_CR9","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.chaos.2006.11.027","volume":"38","author":"H Hu","year":"2008","unstructured":"Hu H, Xu Y, Zhu Z (2008) A method of improving the properties of digital chaotic system. Chaos, Solitons Fractals 38:439\u2013446","journal-title":"Chaos, Solitons Fractals"},{"key":"385_CR10","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"key":"385_CR11","doi-asserted-by":"publisher","first-page":"2557","DOI":"10.1109\/TIE.2017.2736515","volume":"65","author":"Z Hua","year":"2017","unstructured":"Hua Z, Zhou B, Zhou Y (2017) Sine-transform-based chaotic system with FPGA implementation. IEEE Trans Ind Electron 65:2557\u20132566","journal-title":"IEEE Trans Ind Electron"},{"key":"385_CR12","doi-asserted-by":"crossref","unstructured":"Huai L, Li P, Sobelman GE, Lilja DJ (2017) Stochastic computing implementation of trigonometric and hyperbolic functions. In: 2017 IEEE 12th international conference on ASIC (ASICON), pp 553\u2013556","DOI":"10.1109\/ASICON.2017.8252535"},{"key":"385_CR13","doi-asserted-by":"crossref","unstructured":"Hue TTK, Van\u00a0Lam C, Hoang TM, Al\u00a0Assad S (2012) Implementation of secure SPN chaos-based cryptosystem on FPGA. In: 2012 IEEE international symposium on signal processing and information technology (ISSPIT), pp 000129\u2013000134","DOI":"10.1109\/ISSPIT.2012.6621274"},{"key":"385_CR14","doi-asserted-by":"publisher","DOI":"10.1063\/5.0043458","volume":"31","author":"S Kong","year":"2021","unstructured":"Kong S, Li C, Jiang H, Lai Q, Jiang X (2021) A 2D hyperchaotic map with conditional symmetry and attractor growth. Chaos Interdiscip J Nonlinear Sci 31:043121","journal-title":"Chaos Interdiscip J Nonlinear Sci"},{"key":"385_CR15","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2023.12.008","volume":"171","author":"X Kong","year":"2024","unstructured":"Kong X, Yu F, Yao W, Cai S, Zhang J, Lin H (2024) Memristor-induced hyperchaos, multiscroll and extreme multistability in fractional-order HNN: Image encryption and FPGA implementation. Neural Netw 171:85\u2013103","journal-title":"Neural Netw"},{"key":"385_CR16","doi-asserted-by":"publisher","first-page":"10564","DOI":"10.1109\/TIE.2022.3144592","volume":"69","author":"Y Li","year":"2022","unstructured":"Li Y, Li C, Zhang S, Chen GR, Zeng Z (2022) A self-reproduction hyperchaotic map with compound lattice dynamics. IEEE Trans Ind Electron 69:10564\u201310572","journal-title":"IEEE Trans Ind Electron"},{"key":"385_CR17","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1109\/TPEL.2006.882420","volume":"21","author":"H Li","year":"2006","unstructured":"Li H, Zhang D, Foo SY (2006) A stochastic digital implementation of a neural network controller for small wind turbine systems. IEEE Trans Power Electron 21:1502\u20131507","journal-title":"IEEE Trans Power Electron"},{"key":"385_CR18","doi-asserted-by":"crossref","unstructured":"Li P, Lilja DJ (2011) Using stochastic computing to implement digital image processing algorithms. In: 2011 IEEE 29th international conference on computer design (ICCD), pp 154\u2013161","DOI":"10.1109\/ICCD.2011.6081391"},{"key":"385_CR19","unstructured":"Li P, Lilja DJ, Qian W, Bazargan K, Riedel, M (2012) Using a two-dimensional finite-state machine for stochastic computation. In: International workshop on logic and synthesis, IWLS, vol\u00a012"},{"key":"385_CR20","doi-asserted-by":"crossref","unstructured":"Li P, Qian W, Lilja DJ (2012) A stochastic reconfigurable architecture for fault-tolerant computation with sequential logic. In: 2012 IEEE 30th international conference on computer design (ICCD), pp 303\u2013308","DOI":"10.1109\/ICCD.2012.6378656"},{"key":"385_CR21","doi-asserted-by":"publisher","first-page":"8279","DOI":"10.1109\/ACCESS.2022.3142536","volume":"10","author":"TL Liao","year":"2022","unstructured":"Liao TL, Wan PY, Yan JJ (2022) Design and synchronization of chaos-based true random number generators and its FPGA implementation. IEEE Access 10:8279\u20138286","journal-title":"IEEE Access"},{"key":"385_CR22","doi-asserted-by":"crossref","unstructured":"Liu J, Liang Z, Luo Y, Huang J, Yang S (2019) Hardware tripartite synapse architecture based on stochastic computing. In: International symposium on theoretical aspects of software engineering (TASE), pp 81\u201385","DOI":"10.1109\/TASE.2019.00-16"},{"key":"385_CR23","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/24\/10\/100501","volume":"24","author":"L Cao","year":"2015","unstructured":"Lv-Chen C, Yu-Ling L, Sen-Hui Q, Jun-Xiu L (2015) A perturbation method to the tent map based on Lyapunov exponent and its application. Chin Phys B 24:100501","journal-title":"Chin Phys B"},{"issue":"7","key":"385_CR24","doi-asserted-by":"publisher","first-page":"2885","DOI":"10.1109\/TCSI.2022.3165469","volume":"69","author":"M Mohamed Sara","year":"2022","unstructured":"Mohamed Sara M, Sayed Wafaa S, Radwan Ahmed G, Said Lobna A (2022) FPGA implementation of reconfigurable CORDIC algorithm and a memristive chaotic system with transcendental nonlinearities. IEEE Trans Circuit Syst I Regul Papers 69(7):2885\u20132892","journal-title":"IEEE Trans Circuit Syst I Regul Papers"},{"key":"385_CR25","doi-asserted-by":"publisher","first-page":"5617","DOI":"10.1109\/TSP.2011.2163630","volume":"59","author":"A Naderi","year":"2011","unstructured":"Naderi A, Mannor S, Sawan M, Gross WJ (2011) Delayed stochastic decoding of LDPC codes. IEEE Trans Signal Process 59:5617\u20135626","journal-title":"IEEE Trans Signal Process"},{"key":"385_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5532106","volume":"2021","author":"JC Nu\u00f1ez-Perez","year":"2021","unstructured":"Nu\u00f1ez-Perez JC, Adeyemi VA, Sandoval-Ibarra Y, P\u00e9rez-Pinal FJ, Tlelo-Cuautle E (2021) FPGA realization of spherical chaotic system with application in image transmission. Math Prob Eng 2021:1\u201316","journal-title":"Math Prob Eng"},{"key":"385_CR27","doi-asserted-by":"crossref","unstructured":"Ouyang X, Luo Y, Liu J, Liu Y, Bi J, Qiu S (2018) Period analysis of chaotic systems under finite precisions. In: 2018 26th international conference on systems engineering (ICSEng), pp 1\u20135","DOI":"10.1109\/ICSENG.2018.8638177"},{"key":"385_CR28","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1007\/s11071-017-3505-2","volume":"89","author":"E Tlelo-Cuautle","year":"2017","unstructured":"Tlelo-Cuautle E, de la Fraga LG, Pham VT, Volos C, Jafari S, Quintas-Valles AJ (2017) Dynamics: FPGA realization and application of a chaotic system with an infinite number of equilibrium points. Nonlinear Dyn 89:1129\u20131139","journal-title":"Nonlinear Dyn"},{"key":"385_CR29","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1080\/0161-119191865821","volume":"15","author":"DD Wheeler","year":"1991","unstructured":"Wheeler DD, Matthews RA (1991) Supercomputer investigations of a chaotic encryption algorithm. Cryptologia 15:140\u2013152","journal-title":"Cryptologia"},{"key":"385_CR30","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.1016\/j.physleta.2007.12.026","volume":"372","author":"KW Wong","year":"2008","unstructured":"Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372:2645\u20132652","journal-title":"Phys Lett A"},{"key":"385_CR31","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/20\/5\/050509","volume":"20","author":"X Wang","year":"2011","unstructured":"Xing-Yuan W, Lin-Lin W (2011) A new perturbation method to the Tent map and its application. Chin Phys B 20:050509","journal-title":"Chin Phys B"},{"key":"385_CR32","doi-asserted-by":"crossref","unstructured":"Yoshioka D, Tsuneda A (2008) Design of pseudochaotic maximum length sequences with prescribed autocorrelation obtained from discretized chaos maps. In: 2008 IEEE 10th international symposium on spread spectrum techniques and applications, pp 161\u2013165","DOI":"10.1109\/ISSSTA.2008.36"},{"key":"385_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.114440","volume":"179","author":"F Yu","year":"2024","unstructured":"Yu F, Kong X, Yao W, Zhang J, Cai S, Lin H, Jin J (2024) Dynamics analysis, synchronization and FPGA implementation of multiscroll Hopfield neural networks with non-polynomial memristor. Chaos, Solitons Fractals 179:114440","journal-title":"Chaos, Solitons Fractals"},{"issue":"5","key":"385_CR34","doi-asserted-by":"publisher","first-page":"271","DOI":"10.3390\/fractalfract8050271","volume":"8","author":"F Yu","year":"2024","unstructured":"Yu F, Zhang W, Xiao X, Yao W, Cai S, Zhang J, Wang C, Li Y (2024) Dynamic analysis and field-programmable gate array implementation of a 5D fractional-order memristive hyperchaotic system with multiple coexisting attractors. Fractal Fract 8(5):271","journal-title":"Fractal Fract"},{"issue":"16","key":"385_CR35","doi-asserted-by":"publisher","first-page":"24379","DOI":"10.1007\/s11227-024-06257-9","volume":"80","author":"J Zhang","year":"2024","unstructured":"Zhang J, Wang P, Cheng N, Bi J (2024) The dynamic analysis, FPGA implementation, and adaptive synchronization control application of a multi-vortex chaotic system based on nonlinear functions. J Supercomput 80(16):24379\u201324412","journal-title":"J Supercomput"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00385-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00385-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00385-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T03:02:00Z","timestamp":1762311720000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-025-00385-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,5]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["385"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00385-2","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,5]]},"assertion":[{"value":"11 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"82"}}