{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:09:13Z","timestamp":1730344153860,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664361","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T19:49:11Z","timestamp":1552333751000},"page":"413-417","source":"Crossref","is-referenced-by-count":0,"title":["Chaos-Based Stream Cipher Using a Star Network of Chaotic Maps"],"prefix":"10.23919","author":[{"given":"Takaya","family":"Miyano","sequence":"first","affiliation":[]},{"given":"Kenichiro","family":"Cho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.4324\/9780203214589"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1268776.1268777","article-title":"TestU01: a C Library for empirical testing of random number generators","volume":"33","author":"l\u2019ecuyer","year":"2007","journal-title":"ACM Trans Math Soft"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.81.1301"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.145"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref30","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"1","author":"bennett","year":"1984","journal-title":"Proc IEEE Int Conf Comput Syst Signal Process"},{"key":"ref37","first-page":"11","article-title":"A study on rational judgement method of randomness property using NIST randomness test (NIST SP.800-22)","volume":"j93 a","author":"okutomi","year":"2010","journal-title":"IEICE Trans Fundam"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-22"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/nature13303"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1038\/nature12493","article-title":"A quantum access network","volume":"501","author":"fr\u00f6hlich","year":"2013","journal-title":"Nature"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2006.885979"},{"journal-title":"Federal Information Processing Standard Publication 197","year":"2001","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015970"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2006.874182"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2007.09.005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E94.A.282"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2012.6366039"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2383","DOI":"10.1007\/s11071-012-0626-5","article-title":"Breaking a novel colour image encryption algorithm based on chaos","volume":"70","author":"li","year":"2012","journal-title":"Nonlinear Dyn"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","article-title":"A novel colour image encryption algorithm based on chaos","volume":"92","author":"wang","year":"2012","journal-title":"Signal Process"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1049\/iet-ifs.2012.0304","article-title":"Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map","volume":"7","author":"li","year":"2013","journal-title":"IET Inf Secur"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1007\/s11071-014-1533-8","article-title":"Cryptanalyzing image encryption using chaotic logistic map","volume":"78","author":"li","year":"2014","journal-title":"Nonlinear Dyn"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1016\/j.physd.2009.04.019","article-title":"Bounds for the chaotic region in the Lorenz model","volume":"238","author":"barrio","year":"2009","journal-title":"Physica D"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.73.1781"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2007.03.013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/82.246164"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1038\/nature04275","article-title":"Chaos-based communications at high bit rates using commercial fibre-optic links","volume":"437","author":"argyris","year":"2005","journal-title":"Nature"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.036207"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(99)00175-9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1063\/1.1821671"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.90.047903"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/82.246163"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2004.842870"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.71.65"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2312477"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.10.033"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1049\/iet-ipr.2012.0586","article-title":"Hardware stream cipher with controllable chaos generator for colour image encryption","volume":"8","author":"barakat","year":"2014","journal-title":"IET Image Process"},{"key":"ref42","first-page":"2289","article-title":"Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals","author":"hamalainen","year":"2000","journal-title":"Proc Eur Signal Proc Conf"},{"key":"ref24","first-page":"156","article-title":"Chaos-based one-time pad cryptography","author":"miyano","year":"2016","journal-title":"Proc 2016 Int Symp Information Technology and its Applications (ISITA2016)"},{"year":"0","author":"cho","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2365767"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(94)90114-7"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1142\/S021812741750184X"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664361.pdf?arnumber=8664361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T01:32:24Z","timestamp":1643247144000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":42,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664361","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}