{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T05:43:05Z","timestamp":1673588585273},"reference-count":7,"publisher":"Elsevier BV","issue":"16-18","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["60573172"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Superior University Doctor Subject Special Scientific Research Foundation of China","award":["20070141014"]},{"name":"Natural Science Foundation of Liaoning","award":["20082165"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1016\/j.neucom.2010.05.011","type":"journal-article","created":{"date-parts":[[2010,6,24]],"date-time":"2010-06-24T09:10:12Z","timestamp":1277370612000},"page":"3224-3228","source":"Crossref","is-referenced-by-count":23,"title":["Cryptanalysis on a parallel keyed hash function based on chaotic neural network"],"prefix":"10.1016","volume":"73","author":[{"given":"Xing-yuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jian-feng","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2010.05.011_bib1","series-title":"Applied Cryptography,: Protocol, Algorithms and Source Code in C","author":"Schneier","year":"1996"},{"key":"10.1016\/j.neucom.2010.05.011_bib2","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1997"},{"key":"10.1016\/j.neucom.2010.05.011_bib3","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/S0375-9601(02)01770-X","article-title":"A combined chaotic cryptographic and hashing scheme","volume":"307","author":"Wong","year":"2003","journal-title":"Phys. Lett. A"},{"key":"10.1016\/j.neucom.2010.05.011_bib4","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.physleta.2006.10.052","article-title":"Chaotic keyed hash function based on feedforward\u2013feedback nonlinear digital filter","volume":"362","author":"Zhang","year":"2007","journal-title":"Phys. Lett. A"},{"key":"10.1016\/j.neucom.2010.05.011_bib5","doi-asserted-by":"crossref","first-page":"4682","DOI":"10.1016\/j.physleta.2008.04.060","article-title":"Parallel keyed hash function construction based on chaotic maps","volume":"372","author":"Xiao","year":"2008","journal-title":"Phys. Lett. A"},{"key":"10.1016\/j.neucom.2010.05.011_bib6","doi-asserted-by":"crossref","first-page":"3201","DOI":"10.1016\/j.physleta.2009.07.016","article-title":"Cryptanalysis on a parallel keyed hash function based on chaotic maps","volume":"373","author":"Guo","year":"2009","journal-title":"Phys. Lett. A"},{"key":"10.1016\/j.neucom.2010.05.011_bib7","doi-asserted-by":"crossref","first-page":"2288","DOI":"10.1016\/j.neucom.2008.12.031","article-title":"Parallel keyed hash function construction based on chaotic neural network","volume":"72","author":"Xiao","year":"2009","journal-title":"Neurocomputing"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231210002523?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231210002523?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T05:52:29Z","timestamp":1544421149000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231210002523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":7,"journal-issue":{"issue":"16-18","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["S0925231210002523"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2010.05.011","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2010,10]]}}}