{"id":"https://openalex.org/W2511422417","doi":"https://doi.org/10.1145/2905055.2905130","title":"Pseudo Random Bit Generator using Logistic and Bernoulli Maps","display_name":"Pseudo Random Bit Generator using Logistic and Bernoulli Maps","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2511422417","doi":"https://doi.org/10.1145/2905055.2905130","mag":"2511422417"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905130","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905130","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"P. Jhansi Rani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210104573","display_name":"CMR University","ror":"https://ror.org/015waqy33","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210104573"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"P. Jhansi Rani","raw_affiliation_strings":["CMR Institute of Technology, Bangalore, India"],"affiliations":[{"raw_affiliation_string":"CMR Institute of Technology, Bangalore, India","institution_ids":["https://openalex.org/I4210104573"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210104573"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07542944,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12946","display_name":"Fractal and DNA sequence analysis","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6952565908432007},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6402717232704163},{"id":"https://openalex.org/keywords/keystream","display_name":"Keystream","score":0.6302943229675293},{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.590854823589325},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.5853608846664429},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5672267079353333},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.551886260509491},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5119239091873169},{"id":"https://openalex.org/keywords/bernoulli-scheme","display_name":"Bernoulli scheme","score":0.47613218426704407},{"id":"https://openalex.org/keywords/bernoullis-principle","display_name":"Bernoulli's principle","score":0.46491819620132446},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.44634294509887695},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.43540069460868835},{"id":"https://openalex.org/keywords/test-suite","display_name":"Test suite","score":0.42524275183677673},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3973974883556366},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33802613615989685},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2909688651561737},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.25602465867996216},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2000720500946045},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14694073796272278},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.107663094997406},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09553927183151245}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6952565908432007},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6402717232704163},{"id":"https://openalex.org/C2776132008","wikidata":"https://www.wikidata.org/wiki/Q1509893","display_name":"Keystream","level":4,"score":0.6302943229675293},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.590854823589325},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.5853608846664429},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5672267079353333},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.551886260509491},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5119239091873169},{"id":"https://openalex.org/C164528419","wikidata":"https://www.wikidata.org/wiki/Q3042439","display_name":"Bernoulli scheme","level":3,"score":0.47613218426704407},{"id":"https://openalex.org/C152361515","wikidata":"https://www.wikidata.org/wiki/Q181328","display_name":"Bernoulli's principle","level":2,"score":0.46491819620132446},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.44634294509887695},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.43540069460868835},{"id":"https://openalex.org/C151552104","wikidata":"https://www.wikidata.org/wiki/Q7705809","display_name":"Test suite","level":4,"score":0.42524275183677673},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3973974883556366},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33802613615989685},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2909688651561737},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.25602465867996216},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2000720500946045},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14694073796272278},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.107663094997406},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09553927183151245},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905130","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905130","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W115326044","https://openalex.org/W162533270","https://openalex.org/W1493193822","https://openalex.org/W1980707418","https://openalex.org/W1987292828","https://openalex.org/W2007944986","https://openalex.org/W2008855788","https://openalex.org/W2024431528","https://openalex.org/W2027199384","https://openalex.org/W2027985618","https://openalex.org/W2033063871","https://openalex.org/W2052107471","https://openalex.org/W2053111047","https://openalex.org/W2058041310","https://openalex.org/W2065249519","https://openalex.org/W2066208760","https://openalex.org/W2075613256","https://openalex.org/W2081024858","https://openalex.org/W2085807870","https://openalex.org/W2102875151","https://openalex.org/W2103463156","https://openalex.org/W2109394932","https://openalex.org/W2214040503","https://openalex.org/W2279304013","https://openalex.org/W2497184922","https://openalex.org/W2564423968","https://openalex.org/W2574026466","https://openalex.org/W2890611432","https://openalex.org/W3109381375","https://openalex.org/W3138265894","https://openalex.org/W4210680333","https://openalex.org/W4255338393","https://openalex.org/W4285719527","https://openalex.org/W6730718829","https://openalex.org/W6754367568","https://openalex.org/W7023946396"],"related_works":["https://openalex.org/W2103272980","https://openalex.org/W2950325680","https://openalex.org/W2163846246","https://openalex.org/W3001214808","https://openalex.org/W2130959496","https://openalex.org/W2614608824","https://openalex.org/W1901549827","https://openalex.org/W3029464614","https://openalex.org/W1583325060","https://openalex.org/W2062048638"],"abstract_inverted_index":{"We":[0],"propose":[1,64],"pseudo":[2,27],"random":[3],"bit":[4],"generator(PRBG)":[5],"by":[6,46],"constructing":[7],"an":[8,59],"ergodic":[9],"orbit":[10,21],"of":[11,29,54,61,89,159,164],"logistic":[12,165],"map":[13,166,172],"generated":[14,45,77],"using":[15,22,78,167],"intermittent":[16],"perturbation":[17,168],"and":[18,117,169],"sampling":[19],"the":[20,30,36,47,52,55,87,90,96,104,111,123,130,133,142],"Bernoulli":[23,170],"shift":[24,171],"map.":[25],"The":[26,42],"randomness":[28],"key":[31,43],"streams":[32,44],"is":[33,100,114,135,145],"tested":[34],"with":[35,148],"standard":[37],"NIST":[38],"statistical":[39],"test":[40,56],"suite.":[41,57],"proposed":[48,143],"PRBG":[49,62,79,144,150],"pass":[50],"all":[51],"tests":[53,69],"As":[58],"application":[60],"we":[63,118,139],"chaotic":[65],"stream":[66,158],"ciphers.":[67,74],"Goodness-of-Fit":[68],"are":[70,80],"conducted":[71],"for":[72],"these":[73],"Stream":[75],"ciphers":[76,84,105],"shown":[81,102],"to":[82,95],"generate":[83],"in":[85],"which":[86],"distribution":[88],"characters":[91],"show":[92,140],"significant":[93],"correlation":[94],"uniform":[97],"distribution.":[98],"It":[99],"also":[101,120],"that":[103,141,157],"exhibit":[106],"good":[107],"avalanche":[108,124],"effect":[109,125],"when":[110],"initial":[112],"seed":[113],"varied":[115],"infinitesimally":[116],"can":[119],"clearly":[121],"observe":[122],"at":[126],"different":[127],"points":[128],"within":[129],"ciphertext":[131,134],"as":[132],"being":[136],"generated.":[137],"Also":[138],"on":[146],"par":[147],"conventional":[149],"RC4.":[151],"This":[152],"indeed":[153],"vindicates":[154],"our":[155],"hypothesis":[156],"bits":[160],"obtained":[161],"from":[162],"orbits":[163],"exhibits":[173],"randomness.":[174]},"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
