<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462004000200006</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Secuencias Cifrantes de Números Metálicos a partir de Fracciones Contínuas]]></article-title>
<article-title xml:lang="en"><![CDATA[Sequences Cifrantes of Metallic Numbers to leave of Continuous Fractions]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Romero]]></surname>
<given-names><![CDATA[F.J.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Vázquez]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Instituto Politécnico Nacional CECyT ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<aff id="A02">
<institution><![CDATA[,Universidad Autónoma Metropolitana Departamento de Ingeniería Eléctrica ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2004</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2004</year>
</pub-date>
<volume>7</volume>
<numero>4</numero>
<fpage>272</fpage>
<lpage>284</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462004000200006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462004000200006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462004000200006&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[En este artículo se presenta el análisis de secuencias binarias generadas a partir de la representación en fracciones continuas de algunos números irracionales algebraicos (Razón dorada, Número de plata, Número de bronce). Este análisis se hace usando la función de auto-correlación y de la transformada de fourier. Posibles aplicaciones de estas secuencias serían en cifrados de flujo, sistemas de espectro disperso ó bien, en cajas de difusión o permutación. &#966;. Razón dorada &#963;. Número de plata &#948;. Número de bronce FCIS. Fracción continua infinita simple. FCS. Fracción continua Simple]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[In this article the analysis of binary sequences is presented generated starting from the representation in continuous fractions of some algebraic irrational numbers (golden Reason, silver Number, brass Number). This analysis is made using the auto-correlation function and of the one transformed of fourier. Possible applications of these sequences would be in stream cipher, systems of dispersed spectrum or well, in diffusion boxes or exchange. &#966;. Golden Reason &#963;. Silver Number &#948;. Brass Number FCIS. Infinita Simple Continuos Fraction. FCS. Simple Continuos Fraction]]></p></abstract>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Art&iacute;culo</font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>Secuencias Cifrantes de N&uacute;meros Met&aacute;licos a partir de Fracciones Cont&iacute;nuas</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><b><i>Sequences Cifrantes of Metallic Numbers to leave of Continuous Fractions</i></b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>F.J. Romero <sup>1</sup> y R. V&aacute;zquez<sup> 2</sup></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>1 </sup>CECyT "Cuauht&eacute;moc" Instituto Polit&eacute;cnico Nacional. E&#150;mail: <a href="mailto:roifxav@hotmail.com">roifxav@hotmail.com</a></i></font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>2 </sup>Departamento de Ingenier&iacute;a El&eacute;ctrica Universidad Aut&oacute;noma Metropolitana.</i></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2">Art&iacute;culo recibido en Diciembre 12, 2003    <br> Aceptado en Febrero 12, 2004 </font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">En este art&iacute;culo se presenta el an&aacute;lisis de secuencias binarias generadas a partir de la representaci&oacute;n en fracciones continuas de algunos n&uacute;meros irracionales algebraicos (Raz&oacute;n dorada, N&uacute;mero de plata, N&uacute;mero de bronce). Este an&aacute;lisis se hace usando la funci&oacute;n de auto&#150;correlaci&oacute;n y de la transformada de fourier. Posibles aplicaciones de estas secuencias ser&iacute;an en cifrados de flujo, sistemas de espectro disperso &oacute; bien, en cajas de difusi&oacute;n o permutaci&oacute;n.</font></p>     <p align="justify"><font face="verdana" size="2"><i> &phi;</i>. Raz&oacute;n dorada</font></p>     <p align="justify"><font face="verdana" size="2"><i>&sigma;</i>. N&uacute;mero de plata</font></p>     <p align="justify"><font face="verdana" size="2"><i>&delta;</i>. N&uacute;mero de bronce</font></p>     <p align="justify"><font face="verdana" size="2"><i>FCIS. </i>Fracci&oacute;n continua infinita simple.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><i>FCS. </i>Fracci&oacute;n continua Simple</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">In this article the analysis of binary sequences is presented generated starting from the representation in continuous fractions of some algebraic irrational numbers (golden Reason, silver Number, brass Number). This analysis is made using the auto&#150;correlation function and of the one transformed of fourier. Possible applications of these sequences would be in stream cipher, systems of dispersed spectrum or well, in diffusion boxes or exchange.</font></p>     <p align="justify"><font face="verdana" size="2"><i>&phi;</i>.<i> </i>Golden Reason</font></p>     <p align="justify"><font face="verdana" size="2"><i>&sigma;</i>.<i> </i>Silver Number</font></p>     <p align="justify"><font face="verdana" size="2"><i>&delta;</i>.<i> </i>Brass Number</font></p>     <p align="justify"><font face="verdana" size="2"><i>FCIS</i>. Infinita Simple Continuos Fraction.</font></p>     <p align="justify"><font face="verdana" size="2"><i>FCS</i>. Simple Continuos Fraction</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v7n4/v7n4a6.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Referencias</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1. <b>Alan V. </b>and <b>Alan S. Willsky, </b><i>"Se&ntilde;alesy Sistemas", </i>Primera Edici&oacute;n, Prentice Hall Inc., 1994 pp 62, 155.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036833&pid=S1405-5546200400020000600001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2. <b>Gray R. </b>"Georg <i>Cantor and Transcendental Number": </i>Amer Math Monthly, p. 101, 819&#150;832, 1994.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036834&pid=S1405-5546200400020000600002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3. <b>Harold Davenport </b><i>"The Higher Arithmetic by Harold Davenport", </i>Cambridge University Press, (7th edition) 1999.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036835&pid=S1405-5546200400020000600003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4. <b>Kappraff J. </b><i>"Architecture and Mathematics" </i>Ed. Kim Williams, 1996.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036836&pid=S1405-5546200400020000600004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5. <b>Kimberling C, </b><i>"A visual Euclidean algorithm in Mathematics Teacher", </i>vol 76 (1983) pages 108&#150;109.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036837&pid=S1405-5546200400020000600005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6. <b>Long C. T. </b>and <b>Jordan J. H., </b><i>"A Limited Arithmetic on Simple Continued Fractions", </i>Fibonacci Quarterly, Vol 5, 1967, pp 113&#150;128.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036838&pid=S1405-5546200400020000600006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7. <b>Lorentzen Lisa, </b>and <b>Waadeland Haakon, </b><i>"Continued Fractions With Applications", </i>North&#150;Holland (1992), pp 10&#150;25.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036839&pid=S1405-5546200400020000600007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8. <b>Lucena L&oacute;pez M. </b><i>"Criptograf&iacute;a y Seguridad en Computadoras", </i>3er edici&oacute;n, versi&oacute;n 1. junio del 2001.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036840&pid=S1405-5546200400020000600008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9. <b>Romero Ibarra </b>y<b> V&aacute;zquez Medina, </b><i>"Evaluaci&oacute;n y an&aacute;lisis de secuencias cifrantes irracionales usando la prueba universal de Maurer", </i>IPN, SEPI ESIME CULHUACAN. Art&iacute;culo presentado en el congreso CITEL 2002, 25&#150;29 de noviembre, La Habana Cuba.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036841&pid=S1405-5546200400020000600009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10. <b>Romero Ibarra </b>y<b> V&aacute;zquez Medina, </b><i>"An&aacute;lisis de secuencias cifrantes generadas a partir de n&uacute;meros irracionales, utilizando los Postulados de Golomb", </i>IPN, SEPI ESIME CULHUACAN. Art&iacute;culo presentado en el congreso IEEE ROC &amp; C 2002. 1&#150;6 de octubre, Acapulco.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036842&pid=S1405-5546200400020000600010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11. <b>Romero Ibarra </b>y<b> V&aacute;zquez Medina, </b><i>"Secuencias cifrantes generadas a partir de n&uacute;meros irracionales trascendentales", </i>IPN, SEPI ESIME CULHUACAN. Art&iacute;culo presentado en el congreso ELECTRO 2002, 21&#150;25 de octubre, Chihuahua.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036843&pid=S1405-5546200400020000600011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12. <b>Simon M. K. </b>et al., <i>"Spread Spectrum Communications", </i>vol. 1 Rockville, MD: Computer Science Press, 1985.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036844&pid=S1405-5546200400020000600012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13. <b>Ueli M. Maurer. </b><i>"A Universal Statiscal Test for Random Generators", </i>Journal of Cryptology. Vol. 5, No. 2, p. 89&#150;105, 1992.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036845&pid=S1405-5546200400020000600013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">14. <b>Vera W. de Spinadel, </b><i>"From the Golden Mean to Chaos", </i>Nueva Libreria, 1998.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2036846&pid=S1405-5546200400020000600014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alan]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Willsky]]></surname>
<given-names><![CDATA[Alan S]]></given-names>
</name>
</person-group>
<source><![CDATA[Señalesy Sistemas]]></source>
<year>1994</year>
<edition>Primera</edition>
<page-range>62, 155</page-range><publisher-name><![CDATA[Prentice Hall Inc]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gray]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Georg Cantor and Transcendental Number: Amer Math Monthly]]></source>
<year>1994</year>
<page-range>101, 819-832</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Davenport]]></surname>
<given-names><![CDATA[Harold]]></given-names>
</name>
</person-group>
<source><![CDATA[The Higher Arithmetic by Harold Davenport]]></source>
<year>1999</year>
<edition>7</edition>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kappraff]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Architecture and Mathematics]]></source>
<year>1996</year>
<publisher-name><![CDATA[Kim Williams]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kimberling]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[A visual Euclidean algorithm in Mathematics Teacher]]></source>
<year>1983</year>
<volume>76</volume>
<page-range>108-109</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Long]]></surname>
<given-names><![CDATA[C. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Jordan]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Limited Arithmetic on Simple Continued Fractions]]></source>
<year>1967</year>
<volume>5</volume>
<page-range>113-128</page-range><publisher-name><![CDATA[Fibonacci Quarterly]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lorentzen]]></surname>
<given-names><![CDATA[Lisa]]></given-names>
</name>
<name>
<surname><![CDATA[Waadeland]]></surname>
<given-names><![CDATA[Haakon]]></given-names>
</name>
</person-group>
<source><![CDATA[Continued Fractions With Applications]]></source>
<year>1992</year>
<page-range>10-25</page-range><publisher-loc><![CDATA[North-Holland ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lucena López]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Criptografía y Seguridad en Computadoras]]></source>
<year>2001</year>
<edition>3</edition>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Romero Ibarra]]></surname>
</name>
<name>
<surname><![CDATA[Vázquez Medina]]></surname>
</name>
</person-group>
<source><![CDATA[Evaluación y análisis de secuencias cifrantes irracionales usando la prueba universal de Maurer]]></source>
<year></year>
<conf-name><![CDATA[ Artículo presentado en el congreso CITEL 2002]]></conf-name>
<conf-loc>La Habana </conf-loc>
<publisher-name><![CDATA[IPN, SEPI ESIME CULHUACAN]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Romero]]></surname>
<given-names><![CDATA[Ibarra]]></given-names>
</name>
<name>
<surname><![CDATA[Vázquez]]></surname>
<given-names><![CDATA[Medina]]></given-names>
</name>
</person-group>
<source><![CDATA[Análisis de secuencias cifrantes generadas a partir de números irracionales, utilizando los Postulados de Golomb]]></source>
<year></year>
<conf-name><![CDATA[ Artículo presentado en el congreso IEEE ROC & C 2002]]></conf-name>
<conf-loc>Acapulco </conf-loc>
<publisher-name><![CDATA[IPN, SEPI ESIME CULHUACAN]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Romero]]></surname>
<given-names><![CDATA[Ibarra]]></given-names>
</name>
<name>
<surname><![CDATA[Vázquez]]></surname>
<given-names><![CDATA[Medina]]></given-names>
</name>
</person-group>
<source><![CDATA[Secuencias cifrantes generadas a partir de números irracionales trascendentales]]></source>
<year></year>
<conf-name><![CDATA[ Artículo presentado en el congreso ELECTRO 2002]]></conf-name>
<conf-loc>Chihuahua </conf-loc>
<publisher-name><![CDATA[IPN, SEPI ESIME CULHUACAN]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simon]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Spread Spectrum Communications]]></source>
<year>1985</year>
<volume>1</volume>
<publisher-loc><![CDATA[Rockville^eMD MD]]></publisher-loc>
<publisher-name><![CDATA[Computer Science Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maurer]]></surname>
<given-names><![CDATA[Ueli M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A Universal Statiscal Test for Random Generators]]></article-title>
<source><![CDATA[Journal of Cryptology]]></source>
<year>1992</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>89-105</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vera]]></surname>
<given-names><![CDATA[W. de Spinadel]]></given-names>
</name>
</person-group>
<source><![CDATA[From the Golden Mean to Chaos]]></source>
<year>1998</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
