{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:35:21Z","timestamp":1729647321309,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/codit.2017.8102758","type":"proceedings-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T11:15:31Z","timestamp":1511867731000},"page":"1168-1173","source":"Crossref","is-referenced-by-count":7,"title":["FPGA implementation of an enhanced SNOW-3G stream cipher based on a hyperchaotic system"],"prefix":"10.1109","author":[{"given":"Mahdi","family":"Madani","sequence":"first","affiliation":[]},{"given":"Ilyas","family":"Benkhaddra","sequence":"additional","affiliation":[]},{"given":"Camel","family":"Tanougast","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Chitroub","sequence":"additional","affiliation":[]},{"given":"Loic","family":"Sieler","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183106008625"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127405013988"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.05.030"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.physleta.2007.02.024","article-title":"Hyperchaos generated from the lorenz chaotic system and its control","volume":"366","author":"qiang","year":"2007","journal-title":"Physics Letters A"},{"key":"ref14","first-page":"3751","article-title":"A hyperchaos generated from lorenz systeml","volume":"387","author":"wang","year":"2008","journal-title":"Physics Letters A"},{"key":"ref15","article-title":"Modified snow 3g: Stream cipher algorithm using piecewise linear chaotic map","volume":"1707","author":"muhammad","year":"2016","journal-title":"AIP Conference Proceedings"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.1999.797933"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0469(1963)020<0130:DNF>2.0.CO;2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/81.721254"},{"journal-title":"ug702 Xilinx","article-title":"Virtex 5 fpga configuration user guide","year":"2012","key":"ref19"},{"key":"ref4","first-page":"7","article-title":"Statistical evaluation of stream cipher snow 3g. In “Con-stantin Brancusi","author":"patrick","year":"2008","journal-title":"University of Targu Jiu ENGINEERING FACULTY SCIENTIFIC CONFERENCE with international participation Targu Jiu"},{"key":"ref3","first-page":"2014","article-title":"3g security; specification of the 3gpp confidentiality and integrity algorithms; document 1: f8 and f9 specification","year":"0","journal-title":"Technical specification (TS) TS 35 216 V12 0 0 3GPP"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2012.12.018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2528\/PIERC12080906"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2004.02.030"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(79)90150-6"},{"key":"ref2","first-page":"2014","article-title":"Specification of the 3gpp confidentiality and integrity algorithms uea2 & uia2; document 1: Uea2 and uia2 specifications","year":"0","journal-title":"Technical specification (TS) TS 35 215 V12 0 0 3GPP"},{"key":"ref1","first-page":"2014","article-title":"Specification of the 3gpp confidentiality and integrity algorithms uea2 & uia2; document 2: Snow 3g specification","year":"0","journal-title":"Technical specification (TS) TS 35 216 V12 0 0 3GPP"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2005.09.039"},{"key":"ref20","article-title":"The marsaglia random number cdrom, with the diehard battery of tests of randomness","author":"marsaglia","year":"1985","journal-title":"Florida State University under a grant from The National Science Foundation"},{"key":"ref22","first-page":"800","article-title":"A statistical test suite for the random and pseudorandom number generators for cryptographic applications (tech-nology administration u.s. department of commerce)","author":"rukhin","year":"2010","journal-title":"NIST Special Publication"},{"journal-title":"Information security institute crypt-x","year":"1998","key":"ref21"},{"journal-title":"European schemes for signatures integrity and encryption (nessie)","year":"0","key":"ref23"}],"event":{"name":"2017 4th International Conference on Control, Decision and Information Technologies (CoDIT)","start":{"date-parts":[[2017,4,5]]},"location":"Barcelona","end":{"date-parts":[[2017,4,7]]}},"container-title":["2017 4th International Conference on Control, Decision and Information Technologies (CoDIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8091148\/8102545\/08102758.pdf?arnumber=8102758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T20:17:37Z","timestamp":1570393057000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8102758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/codit.2017.8102758","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}