{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:52:36Z","timestamp":1725882756042},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811041532"},{"type":"electronic","value":"9789811041549"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-4154-9_47","type":"book-chapter","created":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:29:21Z","timestamp":1489710561000},"page":"404-414","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Design and Evaluation of Chaotic Iterations Based Keyed Hash Function"],"prefix":"10.1007","author":[{"given":"Zhuosheng","family":"Lin","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Guyeux","sequence":"additional","affiliation":[]},{"given":"Simin","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Qianxue","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,18]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","DOI":"10.1201\/b14979","volume-title":"Discrete Dynamical Systems and Chaotic Machines: Theory and Applications","author":"JM Bahi","year":"2013","unstructured":"Bahi, J.M., Guyeux, C.: Discrete Dynamical Systems and Chaotic Machines: Theory and Applications. CRC Press, Boca Raton (2013)"},{"key":"47_CR2","unstructured":"US Department of Commerce\/National Institute of Standards and Technology: Secure Hash Standard (SHS). Fips Publication (1995)"},{"key":"47_CR3","unstructured":"Fang, X., Guyeux, C., Wang, Q., Bahi, J.: Randomness and disorder of chaotic iterations. Applications in information security field. In: NOLTA 2015, International Symposium on Nonlinear Theory and its Applications, Hong Kong, China, December 2015, pp. 1\u20134 (2015)"},{"issue":"10","key":"47_CR4","doi-asserted-by":"publisher","first-page":"3877","DOI":"10.1007\/s11227-015-1479-8","volume":"71","author":"C Guyeux","year":"2015","unstructured":"Guyeux, C., Couturier, R., H\u00e9am, P.C., Bahi, J.M.: Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU. J. Supercomputing 71(10), 3877\u20133903 (2015)","journal-title":"J. Supercomputing"},{"key":"47_CR5","unstructured":"Guyeux, C., Wang, Q., Fang, X., Bahi, J.M.: Introducing the truly chaotic finite state machines and theirs applications in security field. In: Nolta 2014, International Symposium on Nonlinear Theory and ITS Applications (2014)"},{"key":"47_CR6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1186","volume-title":"The MD4 Message Digest Algorithm","author":"R Rivest","year":"1990","unstructured":"Rivest, R.: The MD4 Message Digest Algorithm. Springer, Heidelberg (1990)"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm. RFC Editor (1992)","DOI":"10.17487\/rfc1321"},{"key":"47_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-72540-4_1","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"M Stevens","year":"2007","unstructured":"Stevens, M., Lenstra, A., Weger, B.: Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 1\u201322. Springer, Heidelberg (2007). doi:\n 10.1007\/978-3-540-72540-4_1"},{"key":"47_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_4","volume-title":"Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate","author":"M Stevens","year":"2009","unstructured":"Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., Weger, B.D.: Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2017"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-4154-9_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T13:34:52Z","timestamp":1558445692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-4154-9_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811041532","9789811041549"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-4154-9_47","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"18 March 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Science and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 March 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisa2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icatse.org\/icisa2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}