{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T19:21:11Z","timestamp":1775157671860,"version":"3.50.1"},"reference-count":73,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"<jats:p>In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as Tent-Map. However, these generators still suffer from common issues when generating random numbers, including issues related to speed, randomness, lack of statistical properties, and lack of uniformity. Therefore, this paper introduces an efficient pseudo-random number generator, called State-Based Tent-Map (SBTM), based on a modified Tent-Map, which addresses this and other limitations by providing highly robust sequences suitable for cryptographic applications. The proposed generator is specifically designed to generate sequences with exceptional statistical properties and a high degree of security. It utilizes a modified 1D chaotic Tent-Map with enhanced attributes to produce the chaotic sequences. Rigorous randomness testing using the Dieharder test suite confirmed the promising results of the generated keystream bits. The comprehensive evaluation demonstrated that approximately 97.4% of the tests passed successfully, providing further evidence of the SBTM\u2019s capability to produce sequences with sufficient randomness and statistical properties.<\/jats:p>","DOI":"10.3390\/jsan12050073","type":"journal-article","created":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T06:14:04Z","timestamp":1696918444000},"page":"73","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5240-286X","authenticated-orcid":false,"given":"Ahmad","family":"Al-Daraiseh","sequence":"first","affiliation":[{"name":"Computer Science Department, School of Information Technology, American University of Madaba, Amman 11821, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4442-1865","authenticated-orcid":false,"given":"Yousef","family":"Sanjalawe","sequence":"additional","affiliation":[{"name":"Cybersecurity Department, School of Information Technology, American University of Madaba, Amman 11821, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2134-4158","authenticated-orcid":false,"given":"Salam","family":"Al-E\u2019mari","sequence":"additional","affiliation":[{"name":"Information Security Department, Faculty of Information Technology, University of Petra, Amman 11196, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1025-7868","authenticated-orcid":false,"given":"Salam","family":"Fraihat","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Research Center (AIRC), College of Engineering and Information Technology, Ajman University, Ajman P.O. Box 346, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8748-0243","authenticated-orcid":false,"given":"Mohammad","family":"Bany Taha","sequence":"additional","affiliation":[{"name":"Department of Data Science and Artificial Intelligence, School of Information Technology, American University of Madaba, Amman 11821, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1845-4364","authenticated-orcid":false,"given":"Muhammed","family":"Al-Muhammed","sequence":"additional","affiliation":[{"name":"Computer Science Department, School of Information Technology, American University of Madaba, Amman 11821, Jordan"}]}],"member":"1968","published-online":{"date-parts":[[2023,10,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"108205","DOI":"10.1016\/j.compeleceng.2022.108205","article-title":"A novel trust-based security and privacy model for internet of vehicles using encryption and steganography","volume":"102","author":"Rathore","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"7291250","DOI":"10.1155\/2022\/7291250","article-title":"An improved secure key generation using enhanced identity-based encryption for cloud computing in large-scale 5G","volume":"2022","author":"Gupta","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/978-981-15-0184-5_34","article-title":"Analysis of spatial domain image steganography based on pixel-value differencing method","volume":"Volume 2","author":"Nisha","year":"2020","journal-title":"Soft Computing for Problem Solving: SocProS 2018"},{"key":"ref_4","first-page":"217","article-title":"A review of image steganalysis techniques for digital forensics","volume":"40","author":"Karampidis","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Hosny, K.M., Zaki, M.A., Lashin, N.A., and Hamza, H.M. (2022). Fast colored video encryption using block scrambling and multi-key generation. Vis. Comput., 1\u201332.","DOI":"10.1007\/s00371-022-02711-y"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"15901","DOI":"10.1007\/s11042-018-6407-5","article-title":"Secure data hiding techniques: A survey","volume":"79","author":"Singh","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"4775","DOI":"10.1007\/s11831-022-09749-0","article-title":"A systematic review of computational image steganography approaches","volume":"29","author":"Kaur","year":"2022","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_8","first-page":"103299","article-title":"A pseudo-random bit generator based on chaotic maps enhanced with a bit-XOR operation","volume":"69","author":"Sharma","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_9","first-page":"58","article-title":"A pseudo-random number generator for integer chaotic map","volume":"45","author":"Wang","year":"2022","journal-title":"J. Beijing Univ. Posts Telecommun."},{"key":"ref_10","first-page":"108908","article-title":"Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)","volume":"206","author":"Rustad","year":"2022","journal-title":"Signal Process."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Fridrich, J. (2009). Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press.","DOI":"10.1017\/CBO9781139192903"},{"key":"ref_12","unstructured":"Bhavani, Y., Kamakshi, P., Kavya Sri, E., and Sindhu Sai, Y. (2022). Intelligent Data Communication Technologies and Internet of Things: Proceedings of ICICI 2021, Springer Nature."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"124053","DOI":"10.1109\/ACCESS.2022.3224745","article-title":"A novel steganography technique for digital images using the least significant bit substitution method","volume":"10","author":"Rahman","year":"2022","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1038\/s41566-022-01105-9","article-title":"Resolution of 100 photons and quantum generation of unbiased random numbers","volume":"17","author":"Eaton","year":"2023","journal-title":"Nat. Photonics"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"025013","DOI":"10.1088\/2058-9565\/ab0fd9","article-title":"High speed continuous variable source-independent quantum random number generation","volume":"4","author":"Xu","year":"2019","journal-title":"Quantum Sci. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ding, J., Chen, K., Wang, Y., Zhao, N., Zhang, W., and Yu, N. (2023, January 21\u201325). Discop: Provably Secure Steganography in Practice Based on \u201cDistribution Copies\u201d. Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP46215.2023.10179287"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Daoui, A., Yamni, M., Chelloug, S.A., Wani, M.A., and El-Latif, A.A.A. (2023). Efficient image encryption scheme using novel 1D multiparametric dynamical tent map and parallel computing. Mathematics, 11.","DOI":"10.3390\/math11071589"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"107326","DOI":"10.1016\/j.optlastec.2021.107326","article-title":"An efficient color\/grayscale image encryption scheme based on hybrid chaotic maps","volume":"143","author":"Khalil","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hazell, P., Mather, P., Longstaff, A., and Fletcher, S. (2020). Digital System Performance Enhancement of a Tent Map-Based ADC for Monitoring Photovoltaic Systems. Electronics, 9.","DOI":"10.3390\/electronics9091554"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Kanwal, S., Inam, S., Othman, M.T.B., Waqar, A., Ibrahim, M., Nawaz, F., and Hamam, H. (2020). An effective color image encryption based on Henon map, tent chaotic map, and orthogonal matrices. Sensors, 22.","DOI":"10.3390\/s22124359"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.ins.2021.12.030","article-title":"A highly secure stream cipher based on analog-digital hybrid chaotic system","volume":"587","author":"Zheng","year":"2022","journal-title":"Inf. Sci."},{"key":"ref_22","first-page":"4988","article-title":"Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map","volume":"12","author":"Maolood","year":"2022","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_23","first-page":"8136","article-title":"A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations","volume":"34","author":"Alawida","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.vlsi.2022.08.002","article-title":"High-performance hardware architecture of a robust encryption block-cipher algorithm based on different chaotic maps and DNA sequence encoding","volume":"87","author":"Amdouni","year":"2022","journal-title":"Integration"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"El-Meligy, N.E., Diab, T.O., Mohra, A.S., Hassan, A.Y., and El-Sobky, W.I. (2022). A novel dynamic mathematical model applied in hash function based on DNA algorithm and chaotic maps. Mathematics, 10.","DOI":"10.3390\/math10081333"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Zellagui, A., Hadj-Said, N., and Ali-Pacha, A. (2022). A new hash function inspired by sponge construction using chaotic maps. J. Discret. Math. Sci. Cryptogr., 1\u201331.","DOI":"10.1080\/09720529.2021.1961900"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2250004","DOI":"10.1142\/S0218127422500043","article-title":"A sensitive image encryption algorithm based on a higher-dimensional chaotic map and steganography","volume":"32","author":"Liu","year":"2022","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Bhandari, M., Panday, S., Bhatta, C.P., and Panday, S.P. (2022, January 23\u201325). Image steganography approach based ant colony optimization with triangular chaotic map. Proceedings of the 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), Gautam Buddha Nagar, India.","DOI":"10.1109\/ICIPTM54933.2022.9753917"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"6159","DOI":"10.1007\/s11042-021-11725-y","article-title":"A secure dual-color image watermarking scheme based 2D DWT, SVD and Chaotic map","volume":"81","author":"Wang","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"24347","DOI":"10.1007\/s11042-022-12282-8","article-title":"Robust color image watermarking using multiple fractional-order moments and chaotic map","volume":"81","author":"Hosny","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11071-016-3051-3","article-title":"A novel pseudorandom number generator based on pseudorandomly enhanced logistic map","volume":"87","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Wang, L., and Cheng, H. (2019). Pseudo-random number generator based on logistic chaotic system. Entropy, 21.","DOI":"10.3390\/e21100960"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"16177","DOI":"10.1007\/s11042-018-6948-7","article-title":"A fast hybrid image cryptosystem based on random generator and modified logistic map","volume":"78","author":"Hemdan","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_34","first-page":"996","article-title":"Randomness enhancement using digitalized modified logistic map","volume":"57","author":"Chen","year":"2010","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Liu, J., Liang, Z., Luo, Y., Cao, L., Zhang, S., Wang, Y., and Yang, S. (2020). A hardware pseudo-random number generator using stochastic computing and logistic map. Micromachines, 12.","DOI":"10.3390\/mi12010031"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2119","DOI":"10.1007\/s11071-015-2303-y","article-title":"Pseudo-random bit generator based on multi-modal maps","volume":"82","year":"2015","journal-title":"Nonlinear Dyn."},{"key":"ref_37","first-page":"413","article-title":"Hyperchaotic encryption based on multi-scroll piecewise linear systems","volume":"270","year":"2015","journal-title":"Appl. Math. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"411","DOI":"10.12988\/astp.2015.5342","article-title":"Novel secure pseudo-random number generation scheme based on two tinkerbell maps","volume":"9","author":"Stoyanov","year":"2015","journal-title":"Adv. Stud. Theor. Phys."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Tutueva, A., Pesterev, D., Karimov, A., Butusov, D., and Ostrovskii, V. (2019, January 5\u20138). Adaptive Chirikov map for pseudo-random number generation in chaos-based stream encryption. Proceedings of the 2019 25th Conference of Open Innovations Association (FRUCT), Helsinki, Finland.","DOI":"10.23919\/FRUCT48121.2019.8981516"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Cardoso, M.B., da Silva, S.S., Nardo, L.G., Passos, R.M., Nepomuceno, E.G., and Arias-Garcia, J. (2021, January 22\u201328). A new PRNG hardware architecture based on an exponential chaotic map. Proceedings of the 2021 IEEE International Symposium on Circuits and Systems (ISCAS), Daegu, Republic of Korea.","DOI":"10.1109\/ISCAS51556.2021.9401653"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"181884","DOI":"10.1109\/ACCESS.2019.2956573","article-title":"Design and FPGA implementation of a pseudorandom number generator based on a four-wing memristive hyperchaotic system and Bernoulli map","volume":"7","author":"Yu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.aeue.2018.10.024","article-title":"Reconfigurable chaotic pseudo random number generator based on FPGA","volume":"98","author":"Rezk","year":"2019","journal-title":"AEU-Int. J. Electron. Commun."},{"key":"ref_43","first-page":"291","article-title":"Chaos-based bitwise dynamical pseudorandom number generator on FPGA","volume":"68","author":"Aldea","year":"2018","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Hobincu, R., and Datcu, O. (2018, January 8\u20139). FPGA implementation of a chaos based PRNG targetting secret communication. Proceedings of the 2018 International Symposium on Electronics and Telecommunications (ISETC), Timisoara, Romania.","DOI":"10.1109\/ISETC.2018.8583863"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"9551","DOI":"10.1016\/j.ijleo.2016.07.044","article-title":"Analog circuit and microcontroller based RNG application of a new easy realizable 4D chaotic system","volume":"127","year":"2016","journal-title":"Optik"},{"key":"ref_46","first-page":"115","article-title":"Chaotic random bit generator realized with a microcontroller","volume":"3","author":"Volos","year":"2013","journal-title":"J. Comput. Model."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TII.2020.2992438","article-title":"Initials-boosted coexisting chaos in a 2-D sine map and its hardware implementation","volume":"17","author":"Bao","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_48","first-page":"320","article-title":"Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map","volume":"47","author":"Nesa","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.1007\/s11071-020-05804-2","article-title":"A stream cipher algorithm based on 2D coupled map lattice and partitioned cellular automata","volume":"101","author":"Liu","year":"2020","journal-title":"Nonlinear Dyn."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1007\/s11071-012-0747-x","article-title":"A novel block cryptosystem based on the coupled chaotic map lattice","volume":"72","author":"Wang","year":"2013","journal-title":"Nonlinear Dyn."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1007\/s13369-021-05450-9","article-title":"Secure communication based on microcontroller unit with a novel five-dimensional hyperchaotic system","volume":"47","author":"Peng","year":"2021","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s11071-015-1893-8","article-title":"Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator","volume":"80","author":"Som","year":"2015","journal-title":"Nonlinear Dyn."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"9305","DOI":"10.1016\/j.ijleo.2016.07.024","article-title":"An efficient chaos pseudo-random number generator applied to video encryption","volume":"127","author":"Xu","year":"2016","journal-title":"Optik"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1550021","DOI":"10.1142\/S0218127415500212","article-title":"Attack on a chaos-based random number generator using anticipating synchronization","volume":"25","year":"2015","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1007\/s10836-018-5767-0","article-title":"Security analysis of the efficient chaos pseudo-random number generator applied to video encryption","volume":"34","author":"Ahmad","year":"2018","journal-title":"J. Electron. Test."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Erg\u00fcn, S. (2016, January 29\u201330). Cryptanalysis and improvement of a chaos based random number generator. Proceedings of the 2016 International Symposium on Electronics and Smart Devices (ISESD), Bandung, Indonesia.","DOI":"10.1109\/ISESD.2016.7886719"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"1850114","DOI":"10.1142\/S0218127418501146","article-title":"Cryptanalysis of chaos-based cryptosystem from the hardware perspective","volume":"28","author":"Luo","year":"2018","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/s42452-021-04919-4","article-title":"A novel pseudo-random number generator for IoT based on a coupled map lattice system using the generalised symmetric map","volume":"4","author":"Zia","year":"2022","journal-title":"SN Appl. Sci."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1016\/j.cnsns.2010.04.039","article-title":"Self-shrinking chaotic stream ciphers","volume":"16","author":"Kanso","year":"2011","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/0161-118991863745","article-title":"On the derivation of a \u201cchaotic\u201d encryption algorithm","volume":"13","author":"Matthews","year":"1989","journal-title":"Cryptologia"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","article-title":"Synchronization in chaotic systems","volume":"64","author":"Pecora","year":"1990","journal-title":"Phys. Rev. Lett."},{"key":"ref_62","unstructured":"Beck, C., and Sch\u00f6gl, F. (1995). Thermodynamics of Chaotic Systems, Cambridge University Press."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Ott, E. (2002). Chaos in Dynamical Systems, Cambridge University Press.","DOI":"10.1017\/CBO9780511803260"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Schuster, H.G., and Just, W. (2006). Deterministic Chaos: An Introduction, John Wiley & Sons.","DOI":"10.1002\/3527604804"},{"key":"ref_65","unstructured":"Zhang, Z. (2016). A Multi-Threaded Cryptographic Pseudorandom Number Generator Test Suite. [Ph.D. Thesis, Naval Postgraduate School]."},{"key":"ref_66","unstructured":"Habutsu, T., Nishio, Y., Sasase, I., and Mori, S. (1991). Advances in Cryptology\u2014EUROCRYPT\u201991: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, 8\u201311 April 1991, Springer. Proceedings 10."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1016\/S0375-9601(99)00747-1","article-title":"New approach to chaotic encryption","volume":"263","author":"Alvarez","year":"1999","journal-title":"Phys. Lett. A"},{"key":"ref_68","unstructured":"Beham, E. (1991). Advances in Cryptology\u2014EUROCRYPT\u201991: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, 8\u201311 April 1991, Springer."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/S0375-9601(00)00642-3","article-title":"Cryptanalysis of a chaotic encryption system","volume":"276","author":"Alvarez","year":"2000","journal-title":"Phys. Lett. A"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Barker, E., and Kelsey, J. (2007). Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised).","DOI":"10.6028\/NIST.SP.800-90"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/0167-2789(85)90011-9","article-title":"Determining Lyapunov exponents from a time series","volume":"16","author":"Wolf","year":"1985","journal-title":"Phys. D Nonlinear Phenom."},{"key":"ref_72","unstructured":"Brown, R., Eddelbuettel, D., and Bauer, D.D. (2018). Dieharder: A Random Number Test Suite, Duke University Physics Department Durham."},{"key":"ref_73","first-page":"327","article-title":"A novel pseudo random bit generator based on chaotic standard map and its testing","volume":"6","author":"Patidar","year":"2009","journal-title":"Electron. J. Theor. Phys."}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/12\/5\/73\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:04:03Z","timestamp":1760130243000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/12\/5\/73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,10]]},"references-count":73,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["jsan12050073"],"URL":"https:\/\/doi.org\/10.3390\/jsan12050073","relation":{},"ISSN":["2224-2708"],"issn-type":[{"value":"2224-2708","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,10]]}}}