1. Bahi, J.M., Guyeux, C.: Discrete Dynamical Systems and Chaotic Machines: Theory and Applications. CRC Press, Boca Raton (2013)
2. US Department of Commerce/National Institute of Standards and Technology: Secure Hash Standard (SHS). Fips Publication (1995)
3. Fang, X., Guyeux, C., Wang, Q., Bahi, J.: Randomness and disorder of chaotic iterations. Applications in information security field. In: NOLTA 2015, International Symposium on Nonlinear Theory and its Applications, Hong Kong, China, December 2015, pp. 1–4 (2015)
4. Guyeux, C., Couturier, R., Héam, P.C., Bahi, J.M.: Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU. J. Supercomputing 71(10), 3877–3903 (2015)
5. Guyeux, C., Wang, Q., Fang, X., Bahi, J.M.: Introducing the truly chaotic finite state machines and theirs applications in security field. In: Nolta 2014, International Symposium on Nonlinear Theory and ITS Applications (2014)