{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:11Z","timestamp":1773615671263,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.3103\/s0146411624700536","type":"journal-article","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T06:02:32Z","timestamp":1724824952000},"page":"420-428","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Turbo Codes Design Using Chaotic Interleaver Based on Generalized 2D Chaotic Map"],"prefix":"10.3103","volume":"58","author":[{"family":"Ahmed Sahnoune","sequence":"first","affiliation":[]},{"given":"Sefouane","family":"Chellali","sequence":"additional","affiliation":[]},{"given":"Daoud","family":"Berkani","sequence":"additional","affiliation":[]},{"given":"Elhadj","family":"Zeraoulia","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2024,8,28]]},"reference":[{"key":"7714_CR1","doi-asserted-by":"publisher","unstructured":"Berrou, C., Glavieux, A., and Thitimajshima, P., Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1, Proc. ICC \u201993\u2013IEEE Int. Conf. on Communications, Geneva, 1993, IEEE, 1993, vol. 2, pp.\u00a01064\u20131070. https:\/\/doi.org\/10.1109\/icc.1993.397441","DOI":"10.1109\/icc.1993.397441"},{"key":"7714_CR2","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s12243-008-0037-2","volume":"63","author":"L. Hadj Abderrahmane","year":"2008","unstructured":"Hadj Abderrahmane, L. and Chellali, S., Performance comparison between Gaussian interleaver, Rayleigh interleaver, and dithered golden interleaver, Ann. Telecommun., 2008, vol. 63, nos. 7\u20138, pp. 449\u2013452. https:\/\/doi.org\/10.1007\/s12243-008-0037-2","journal-title":"Ann. Telecommun."},{"key":"7714_CR3","doi-asserted-by":"publisher","unstructured":"Sun, J., Takeshita, O.Y., and Fitz, M.P., Permutation polynomial based deterministic interleavers for turbo codes, IEEE Int. Symp. on Information Theory, Yokohama, Japan, 2003, IEEE, 2003, pp. 319\u2013319. https:\/\/doi.org\/10.1109\/ISIT.2003.1228334","DOI":"10.1109\/ISIT.2003.1228334"},{"key":"7714_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/tit.2004.839478","volume":"51","author":"J. Sun","year":"2005","unstructured":"Sun, J. and Takeshita, O.Y., Interleavers for turbo codes using permutation polynomials over integer rings, IEEE Trans. Inf. Theory, 2005, vol. 51, no. 1, pp. 101\u2013119. https:\/\/doi.org\/10.1109\/tit.2004.839478","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7714_CR5","doi-asserted-by":"crossref","unstructured":"Chen, D. and Zhang, C., Joint channel-security coding based on interleaver and puncturer in turbo code, 2011 3rd Symp. on Web Society, Port Elizabeth, Australia, 2011, IEEE, 2011, pp. 153\u2013157.","DOI":"10.1109\/SWS.2011.6101288"},{"key":"7714_CR6","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s11277-010-0206-2","volume":"64","author":"D. Abbasi-Moghadam","year":"2012","unstructured":"Abbasi-Moghadam, D. and Vakili, V.T., Enhanced secure error correction code schemes in time reversal UWB systems, Wireless Personal Commun., 2012, vol. 64, no. 2, pp. 403\u2013423. https:\/\/doi.org\/10.1007\/s11277-010-0206-2","journal-title":"Wireless Personal Commun."},{"key":"7714_CR7","doi-asserted-by":"publisher","first-page":"236","DOI":"10.4304\/jnw.7.2.236-242","volume":"7","author":"Q. Mao","year":"2012","unstructured":"Mao, Q. and Qin, Ch., A novel turbo-based encryption scheme using dynamic puncture mechanism, J. Networks, 2012, vol. 7, no. 2, p. 236. https:\/\/doi.org\/10.4304\/jnw.7.2.236-242","journal-title":"J. Networks"},{"key":"7714_CR8","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/s42452-021-04147-w","volume":"3","author":"A. Sahnoune","year":"2021","unstructured":"Sahnoune, A. and Berkani, D., On the performance of chaotic interleaver for turbo codes, SN Appl. Sci., 2021, vol. 3, no. 1, p. 106. https:\/\/doi.org\/10.1007\/s42452-021-04147-w","journal-title":"SN Appl. Sci."},{"key":"7714_CR9","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.3390\/sym14122529","volume":"14","author":"C. Urrea","year":"2022","unstructured":"Urrea, C., Kern, J., and L\u00f3pez-Escobar, R., Design of chaotic interleaver based on duffing map for turbo code, Symmetry, 2022, vol. 14, no. 12, p. 2529. https:\/\/doi.org\/10.3390\/sym14122529","journal-title":"Symmetry"},{"key":"7714_CR10","doi-asserted-by":"publisher","unstructured":"Vucetic, B. and Yuan, J., Turbo Codes: Principles and Applications, The Springer International Series in Engineering and Computer Science, vol. 559, Springer, 2012. https:\/\/doi.org\/10.1007\/978-1-4615-4469-2","DOI":"10.1007\/978-1-4615-4469-2"},{"key":"7714_CR11","doi-asserted-by":"publisher","unstructured":"Hanzo, L., Liew, T.H., and Yeap, B.L., Turbo Coding, Turbo Equalisation and Space-Time Coding: For Transmission over Fading Channels, Wiley, 2002. https:\/\/doi.org\/10.1002\/047085474x","DOI":"10.1002\/047085474x"},{"key":"7714_CR12","doi-asserted-by":"publisher","unstructured":"Robertson, P., Villebrun, E., and Hoeher, P., A comparison of optimal and sub-optimal MAP decoding algorithms operating in the log domain, Proc. IEEE Int. Conf. on Communications ICC \u201995, Seattle, Wash., 1995, IEEE, 1995, vol. 2, pp. 1009\u20131013. https:\/\/doi.org\/10.1109\/icc.1995.524253","DOI":"10.1109\/icc.1995.524253"},{"key":"7714_CR13","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s12243-014-0441-8","volume":"70","author":"S. Chellali","year":"2015","unstructured":"Chellali, S. and Chouireb, F., A d-dimensional irregular compact interleaver design for turbo code, Ann. Telecommun., 2015, vol. 70, nos. 5\u20136, pp. 233\u2013237. https:\/\/doi.org\/10.1007\/s12243-014-0441-8","journal-title":"Ann. Telecommun."},{"key":"7714_CR14","doi-asserted-by":"publisher","unstructured":"Sahnoune, A., Berkani, D., and Zeraoulia, E., Secure turbo code design based on chaotic interleavers, 2023 2nd\u00a0Int. Conf. on Electronics, Energy and Measurement (IC2EM), Medea, Algeria, 2023, IEEE, 2023. https:\/\/doi.org\/10.1109\/ic2em59347.2023.10419762","DOI":"10.1109\/ic2em59347.2023.10419762"},{"key":"7714_CR15","doi-asserted-by":"publisher","first-page":"1504","DOI":"10.1016\/j.chaos.2007.06.018","volume":"39","author":"L. Dos Santos Coelho","year":"2009","unstructured":"Dos Santos Coelho, L., Tuning of PID controller for an automatic regulator voltage system using chaotic optimization approach, Chaos, Solitons Fractals, 2009, vol. 39, no. 4, pp. 1504\u20131514. https:\/\/doi.org\/10.1016\/j.chaos.2007.06.018","journal-title":"Chaos, Solitons Fractals"},{"key":"7714_CR16","first-page":"50","volume":"1","author":"E. Zeraoulia","year":"2011","unstructured":"Zeraoulia, E. and Sprott, J.C., A unified piecewise smooth chaotic mapping that contains the H\u00e9non and the Lozi systems, Annu. Rev. Chaos Theory, Bifurcations \n               Dyn. Syst., 2011, vol. 1, pp. 50\u201360.","journal-title":"Dyn. Syst."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700536.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700536","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700536.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:05Z","timestamp":1773612185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700536"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["7714"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700536","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]},"assertion":[{"value":"15 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}