<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0035-001X</journal-id>
<journal-title><![CDATA[Revista mexicana de física]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. mex. fis.]]></abbrev-journal-title>
<issn>0035-001X</issn>
<publisher>
<publisher-name><![CDATA[Sociedad Mexicana de Física]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0035-001X2007000500002</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A generalized chaotic encryption system for multimedia applications]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hasimoto-Beltrán]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Center for Research in Mathematics (CIMAT)  ]]></institution>
<addr-line><![CDATA[Guanajuato Gto]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>10</month>
<year>2007</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>10</month>
<year>2007</year>
</pub-date>
<volume>53</volume>
<numero>5</numero>
<fpage>332</fpage>
<lpage>336</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S0035-001X2007000500002&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S0035-001X2007000500002&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S0035-001X2007000500002&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Recently, several encryption schemes based on 1, 2, and 4 one-dimensional chaotic maps have been presented in the literature (see Ref. 1). The idea of increasing the number of maps is to provide more security and robustness to chaos-based cryptographic systems. In this paper, we propose a generalized encryption scheme based on N one-dimensional coupled chaotic maps, where only a window of <img border=0 src="../../../../../img/revistas/rmf/v53n5/a2s1.jpg">maps at a time (m < N) is active for the encryption process. The m-map window is randomly updated by shifting it circle-wise one map at a time through the entire N-map system. To add more security to the system, we randomly perturb the coupling parameter using current cyphertext output (spatiotemporal or global feedback); so that any change in the input data (plaintext) is reflected instantly in the total system (not only locally). Our generalized implementation is based on the scheme presented in Ref. 1, but it can also be implemented in any chaos based encryption scheme. Our approach adds more robustness to the system, maintaining excellent statistical properties and fast performance for real-time multimedia applications.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Recientemente se han publicado una serie de esquemas de cifrado caotico basados en 1, 2 y 4 mapas caóticos unidimensionales (ver Ref. 1). El proposito de incrementar el número de mapas caóticos es el de dar mayor seguridad y robustez a los sistemas de cifrado basados en caos. En este trabajo se propone un esquema generalizado de N mapas caoticos acoplados donde solo una ventana de<img border=0 src="../../../../../img/revistas/rmf/v53n5/a2s1.jpg"> mapas a la vez es usada en el proceso de cifrado, para m < N. La ventana de<img border=0 src="../../../../../img/revistas/rmf/v53n5/a2s1.jpg">mapas acoplados es actualizada despues de un periodo aleatorio de iteraciones mediante un recorrido circular a traves de los TV mapas en el sistema inicial. Para incrementar la seguridad del sistema, el factor de acoplamiento es perturbado por el valor mas reciente de texto cifrado (conocido como retroalimentación global o espacio-temporal), permitiendo una reaccion rápida y global ante cambios en el texto de entrada original y/o parámetros de los mapas caóticos. La implementación del esquema generalizado es basada en la Ref. 1, pero practicamente cualquier método basado en caos puede ser utilizado. El método propuesto provee mayor robustez, mantiene excelentes propiedades estadísticas y puede facilmente ser aplicado a sistemas de multimedia en tiempo real (video y audio).]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Discrete chaotic encryption]]></kwd>
<kwd lng="en"><![CDATA[block ciphers]]></kwd>
<kwd lng="en"><![CDATA[symmetric encryption]]></kwd>
<kwd lng="en"><![CDATA[coupled maps]]></kwd>
<kwd lng="es"><![CDATA[Cifrado caótico discreto]]></kwd>
<kwd lng="es"><![CDATA[cifrado simétrico]]></kwd>
<kwd lng="es"><![CDATA[mapas acomplados]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Carta</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>A generalized chaotic encryption system for multimedia applications</b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>R. Hasimoto-Beltr&aacute;n</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i>Center for Research in Mathematics (CIMAT), Jalisco s/n, Col. Mineral de Valenciana, 36240 Guanajuato, Gto, M&eacute;xico, Phone: +(52)-(473) 732-7155, Fax: +(52)-(473) 732-5749, </i>e-mail: <i><a href="mailto:hasimoto@cimat.mx">hasimoto@cimat.mx</a></i></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2">Recibido el 3 de julio de 2007     <br> Aceptado el 4 de septiembre de 2007</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">Recently, several encryption schemes based on 1, 2, and 4 one-dimensional chaotic maps have been presented in the literature (see Ref. 1). The idea of increasing the number of maps is to provide more security and robustness to chaos-based cryptographic systems. In this paper, we propose a generalized encryption scheme based on N one-dimensional coupled chaotic maps, where only a window of <img src="/img/revistas/rmf/v53n5/a2s1.jpg">maps at a time <i>(m <u>&lt;</u> N) </i>is active for the encryption process. The <i>m-map </i>window is randomly updated by shifting it circle-wise one map at a time through the entire <i>N-map </i>system. To add more security to the system, we randomly perturb the coupling parameter using current cyphertext output (spatiotemporal or global feedback); so that any change in the input data (plaintext) is reflected instantly in the total system (not only locally). Our generalized implementation is based on the scheme presented in Ref. 1, but it can also be implemented in any chaos based encryption scheme. Our approach adds more robustness to the system, maintaining excellent statistical properties and fast performance for real-time multimedia applications.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords: </b>Discrete chaotic encryption; block ciphers; symmetric encryption; coupled maps.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">Recientemente se han publicado una serie de esquemas de cifrado caotico basados en 1, 2 y 4 mapas ca&oacute;ticos unidimensionales (ver Ref. 1). El proposito de incrementar el n&uacute;mero de mapas ca&oacute;ticos es el de dar mayor seguridad y robustez a los sistemas de cifrado basados en caos. En este trabajo se propone un esquema generalizado de N mapas caoticos acoplados donde solo una ventana de<img src="/img/revistas/rmf/v53n5/a2s1.jpg"> mapas a la vez es usada en el proceso de cifrado, para <i>m <u>&lt;</u> N. </i>La ventana de<img src="/img/revistas/rmf/v53n5/a2s1.jpg">mapas acoplados es actualizada despues de un periodo aleatorio de iteraciones mediante un recorrido circular a traves de los TV mapas en el sistema inicial. Para incrementar la seguridad del sistema, el factor de acoplamiento es perturbado por el valor mas reciente de texto cifrado (conocido como retroalimentaci&oacute;n global o espacio-temporal), permitiendo una reaccion r&aacute;pida y global ante cambios en el texto de entrada original y/o par&aacute;metros de los mapas ca&oacute;ticos. La implementaci&oacute;n del esquema generalizado es basada en la Ref. 1, pero practicamente cualquier m&eacute;todo basado en caos puede ser utilizado. El m&eacute;todo propuesto provee mayor robustez, mantiene excelentes propiedades estad&iacute;sticas y puede facilmente ser aplicado a sistemas de multimedia en tiempo real (video y audio).</font></p>     <p align="justify"><font face="verdana" size="2"><b>Descriptores: </b>Cifrado ca&oacute;tico discreto; cifrado sim&eacute;trico; mapas acomplados.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2">PACS: 05.45.Gg/Pq/Ac</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/rmf/v53n5/v53n5a2.pdf">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a> </font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Reference</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1. R. Hasimoto-Beltr&aacute;n,,Rev. <i>Mex. F&iacute;s. </i><b>53</b> (2007) 58.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334525&pid=S0035-001X200700050000200001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2. G. Chen, Y. Mao, and C.K. Chui, <i>Chaos Solit. &amp; Fract. </i><b>21</b> (2004) 749.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334526&pid=S0035-001X200700050000200002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3. M. Yang, N. Bourbakis, and S. Li, <i>IEEE Potentials </i><b>23 </b>(2004) 28.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334527&pid=S0035-001X200700050000200003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4. R. Matthews, <i>Cryptology </i><b>13</b> (1989) 29.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334528&pid=S0035-001X200700050000200004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5. G. Alvarez, F. Montoya, G. Pastor, and M. Romera, <i>Proc. IEEE Int. Carnahan Conf. Security Technology </i>(1998) 332.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334529&pid=S0035-001X200700050000200005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6. G. Jakimoski and L. Kocarev, <i>IEEE Trans. Circ. Syst.-I </i><b>48</b> (2001) 163.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334530&pid=S0035-001X200700050000200006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7. M.S. Baptista<i>, Physics Letters A </i><b>240</b> (1998) 50.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334531&pid=S0035-001X200700050000200007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8. S. Li, M. Xuanqin, and C. Yuanlong, <i>Lecture Notes in Computer Science </i><b>2247 </b>(2001) 316.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334532&pid=S0035-001X200700050000200008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9. Y. Dobyns and H. Atmanspacher, <i>Chaos Solitons &amp; Fractals </i><b>24 </b>(2005) 313.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334533&pid=S0035-001X200700050000200009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10. M. Dellnitz, M. Field, M. Golubitsky, A. Hohmann, and J. Ma, <i>IEEE Trans. Circ. Sys.-I </i><b>42 </b>(1995) 821.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334534&pid=S0035-001X200700050000200010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11. A. Palacios and H. Juarez, <i>Physics Letters A </i><b>303 </b>(2002) 345.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334535&pid=S0035-001X200700050000200011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12. X. Wang, M. Zhan, X. Gong, and C.H. Lai (2005) Construction of a secure cryptosystem based on spatiotemporal chaos and its applications in public channel cryptography, <A href=http://arxiv.org/abs/nlin/0502026 target="_blank">http://arxiv.org/abs/nlin/0502026</A></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334536&pid=S0035-001X200700050000200012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13. Fog A. Chaotic random number generators with random cycle lengths. <A href=http://www.agner.org/random/theory/chaosran.pdf target="_blank">http://www.agner.org/random/theory/chaosran.pdf</A></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=8334537&pid=S0035-001X200700050000200013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hasimoto-Beltrán]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Rev. Mex. Fís.]]></source>
<year>2007</year>
<numero>53</numero>
<issue>53</issue>
<page-range>58</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Mao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chui]]></surname>
<given-names><![CDATA[C.K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Chaos Solit. & Fract.]]></source>
<year>2004</year>
<numero>21</numero>
<issue>21</issue>
<page-range>749</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bourbakis]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Potentials]]></source>
<year>2004</year>
<numero>23</numero>
<issue>23</issue>
<page-range>28</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matthews]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptology]]></source>
<year>1989</year>
<numero>13</numero>
<issue>13</issue>
<page-range>29</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarez]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Montoya]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Pastor]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Romera]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Proc. IEEE Int. Carnahan Conf. Security Technology]]></source>
<year>1998</year>
<page-range>332</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jakimoski]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Kocarev]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Trans. Circ. Syst.-I]]></source>
<year>2001</year>
<numero>48</numero>
<issue>48</issue>
<page-range>163</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baptista]]></surname>
<given-names><![CDATA[M.S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Physics Letters A]]></source>
<year>1998</year>
<numero>240</numero>
<issue>240</issue>
<page-range>50</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Xuanqin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yuanlong]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2001</year>
<numero>2247</numero>
<issue>2247</issue>
<page-range>316</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dobyns]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Atmanspacher]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Chaos Solitons & Fractals]]></source>
<year>2005</year>
<numero>24</numero>
<issue>24</issue>
<page-range>313</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dellnitz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Field]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Golubitsky]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hohmann]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[IEEE Trans. Circ. Sys.-I]]></source>
<year>1995</year>
<numero>42</numero>
<issue>42</issue>
<page-range>821</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Palacios]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Juarez]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Physics Letters A]]></source>
<year>2002</year>
<numero>303</numero>
<issue>303</issue>
<page-range>345</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gong]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Lai]]></surname>
<given-names><![CDATA[C.H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Construction of a secure cryptosystem based on spatiotemporal chaos and its applications in public channel cryptography]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fog]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Chaotic random number generators with random cycle lengths]]></source>
<year></year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
