{"id":"https://openalex.org/W2124918032","doi":"https://doi.org/10.1109/ijcnn.2010.5596512","title":"Topological chaos and chaotic iterations application to hash functions","display_name":"Topological chaos and chaotic iterations application to hash functions","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2124918032","doi":"https://doi.org/10.1109/ijcnn.2010.5596512","mag":"2124918032"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn.2010.5596512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2010.5596512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2010 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1511.00117","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033093688","display_name":"Christophe Guyeux","orcid":"https://orcid.org/0000-0003-0195-4378"},"institutions":[{"id":"https://openalex.org/I90843659","display_name":"Universit\u00e9 de franche-comt\u00e9","ror":"https://ror.org/03pcc9z86","country_code":"FR","type":"education","lineage":["https://openalex.org/I90843659"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Christophe Guyeux","raw_affiliation_strings":["Computer Science Laboratory LIFC, University of Franche-Comte, Besancon, France","Computer Science Laboratory LIFC, University of Franche-Comte, 16, route de Gray - 25030 Besan\u00e7on, France"],"affiliations":[{"raw_affiliation_string":"Computer Science Laboratory LIFC, University of Franche-Comte, Besancon, France","institution_ids":["https://openalex.org/I90843659"]},{"raw_affiliation_string":"Computer Science Laboratory LIFC, University of Franche-Comte, 16, route de Gray - 25030 Besan\u00e7on, France","institution_ids":["https://openalex.org/I90843659"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5106787222","display_name":"Jacques M. Bahi","orcid":null},"institutions":[{"id":"https://openalex.org/I90843659","display_name":"Universit\u00e9 de franche-comt\u00e9","ror":"https://ror.org/03pcc9z86","country_code":"FR","type":"education","lineage":["https://openalex.org/I90843659"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jacques M. Bahi","raw_affiliation_strings":["Computer Science Laboratory LIFC, University of Franche-Comte, Besancon, France","Computer Science Laboratory LIFC, University of Franche-Comte, 16, route de Gray - 25030 Besan\u00e7on, France"],"affiliations":[{"raw_affiliation_string":"Computer Science Laboratory LIFC, University of Franche-Comte, Besancon, France","institution_ids":["https://openalex.org/I90843659"]},{"raw_affiliation_string":"Computer Science Laboratory LIFC, University of Franche-Comte, 16, route de Gray - 25030 Besan\u00e7on, France","institution_ids":["https://openalex.org/I90843659"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5033093688"],"corresponding_institution_ids":["https://openalex.org/I90843659"],"apc_list":null,"apc_paid":null,"fwci":7.1127,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.97511507,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11574","display_name":"Artificial Intelligence in Games","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.8247015476226807},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.815627932548523},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6507267355918884},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5628228187561035},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5354862809181213},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.4923640489578247},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4239163100719452},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41928428411483765},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.30793291330337524},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16157996654510498}],"concepts":[{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.8247015476226807},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.815627932548523},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6507267355918884},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5628228187561035},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5354862809181213},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.4923640489578247},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4239163100719452},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41928428411483765},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.30793291330337524},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16157996654510498},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ijcnn.2010.5596512","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn.2010.5596512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2010 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1511.00117","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1511.00117","pdf_url":"https://arxiv.org/pdf/1511.00117","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1511.00117","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1511.00117","pdf_url":"https://arxiv.org/pdf/1511.00117","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1059167973","https://openalex.org/W1550847639","https://openalex.org/W1551183135","https://openalex.org/W1556027180","https://openalex.org/W1607928869","https://openalex.org/W1855499363","https://openalex.org/W1998538686","https://openalex.org/W2001954559","https://openalex.org/W2025762398","https://openalex.org/W2037556301","https://openalex.org/W2039720560","https://openalex.org/W2054836173","https://openalex.org/W2144905348","https://openalex.org/W2237515727","https://openalex.org/W2315759974","https://openalex.org/W4239398473","https://openalex.org/W4251606455"],"related_works":["https://openalex.org/W2320196587","https://openalex.org/W4243901518","https://openalex.org/W4383267773","https://openalex.org/W3110439525","https://openalex.org/W4251075027","https://openalex.org/W2393451533","https://openalex.org/W2159024673","https://openalex.org/W2776913024","https://openalex.org/W2954599081","https://openalex.org/W2290993309"],"abstract_inverted_index":{"This":[0,70],"paper":[1],"introduces":[2],"a":[3,46],"new":[4],"notion":[5,53],"of":[6,35,54,65,83,116],"chaotic":[7,18,26,49],"algorithms.":[8],"These":[9],"algorithms":[10,66,73,98],"are":[11,14,29,75,87],"iterative":[12],"and":[13,51],"based":[15],"on":[16,25],"so-called":[17],"iterations.":[19],"Contrary":[20],"to":[21,72,101],"all":[22],"existing":[23],"studies":[24],"iterations,":[27],"we":[28,58,86,110],"not":[30],"interested":[31,88],"in":[32,39,89,113],"stable":[33],"states":[34],"such":[36],"iterations":[37,50],"but":[38],"their":[40],"possible":[41],"unpredictable":[42],"behaviors.":[43],"By":[44],"establishing":[45],"link":[47],"between":[48],"the":[52,80,96,114],"Devaney's":[55],"topological":[56,68,107],"chaos,":[57,108],"give":[59,99],"conditions":[60],"ensuring":[61],"that":[62,74,104],"these":[63],"kind":[64],"produce":[67,105],"chaos.":[69],"leads":[71],"highly":[76],"unpredictable.":[77],"After":[78],"presenting":[79],"theoretical":[81,97],"foundations":[82],"our":[84],"approach,":[85],"its":[90],"practical":[91],"aspects.":[92],"We":[93],"show":[94],"how":[95],"rise":[100],"computer":[102],"programs":[103],"true":[106],"then":[109],"propose":[111],"applications":[112],"area":[115],"information":[117],"security.":[118]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":6}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
