+@BOOK{Devaney,
+ title = {An Introduction to Chaotic Dynamical Systems},
+ publisher = {Addison-Wesley},
+ year = {1989},
+ author = {Devaney, R. L.},
+ address = {Redwood City, CA},
+ edition = {2nd}
+}
+
+@ARTICLE{Marsaglia2003,
+ author = {Marsaglia, G.},
+ title = {Xorshift RNGs},
+ journal = {Journal of Statistical Software},
+ year = {2003},
+ volume = {8(14)},
+ pages = {1--6},
+ timestamp = {2009.10.28}
+}
+
+@Article{LEcuyerS07,
+ title = "Test{U01}: {A} {C} library for empirical testing of
+ random number generators",
+ author = "L'Ecuyer, P. and Simard, R. J.",
+ journal = "ACM Trans. Math. Softw",
+ year = "2007",
+ number = "4",
+ volume = "33",
+ bibdate = "2007-11-06",
+ bibsource = "DBLP,
+ http://dblp.uni-trier.de/db/journals/toms/toms33.html#LEcuyerS07",
+ URL = "http://doi.acm.org/10.1145/1268776.1268777",
+}
+
+@manual{Nvid10,
+ author = {Nvidia},
+ title = {Cuda cublas library},
+ year = {2011},
+ Note = {Version 4.0},
+ }
+
+@InProceedings{Jenkins96,
+ author = "Jenkins, R. J.",
+ title = "{ISAAC}",
+ booktitle = "IWFSE: International Workshop on Fast Software
+ Encryption, LNCS",
+ year = "1996",
+}
+
+
+@Book{Goldreich,
+ author = {Oded Goldreich},
+ ALTeditor = {},
+ title = {Foundations of Cryptography: Basic Tools},
+ publisher = {Cambridge University Press},
+ year = {2007},
+}
+
+
+@book{kellert1994wake,
+ title={In the wake of chaos: unpredictable order in dynamical systems},
+ author={Kellert, S.H.},
+ isbn={9780226429762},
+ lccn={lc92030355},
+ series={Science and its conceptual foundations},
+ url={http://books.google.fr/books?id=CUpcgo8DqR4C},
+ year={1994},
+ publisher={University of Chicago Press}
+}
+
+
+
+@article{Wu20051195,
+title = "Stochastic properties in Devaney's chaos",
+journal = "Chaos, Solitons and Fractals",
+volume = "23",
+number = "4",
+pages = "1195 - 1199",
+year = "2005",
+note = "",
+issn = "0960-0779",
+doi = "10.1016/j.chaos.2004.06.063",
+url = "http://www.sciencedirect.com/science/article/pii/S0960077904003601",
+author = "Wu, C. and Xu, Z. and Lin, W. and Ruan, J."
+}
+
+
+@book{gleick2011chaos,
+ title={Chaos: Making a New Science},
+ author={Gleick, J.},
+ isbn={9781453210475},
+ url={http://books.google.fr/books?id=OoLNzl4XpPUC},
+ year={2011},
+ publisher={Open Road}
+}
+
+
+
+@article{Werndl01032009,
+author = {Werndl, C},
+title = {What Are the New Implications of Chaos for Unpredictability?},
+volume = {60},
+number = {1},
+pages = {195-220},
+year = {2009},
+doi = {10.1093/bjps/axn053},
+URL = {http://bjps.oxfordjournals.org/content/60/1/195.abstract},
+eprint = {http://bjps.oxfordjournals.org/content/60/1/195.full.pdf+html},
+journal = {The British Journal for the Philosophy of Science}
+}
+
+
+@article{bg10:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACLI},
+impact-factor ={#},
+isi-acro = {#},
+author = {Bahi, J. and Guyeux, C.},
+title = {Hash Functions Using Chaotic Iterations},
+journal = {Journal of Algorithms and Computational Technology},
+pages = {167--181},
+volume = 4,
+number = 2,
+doi = {10.1260/1748-3018.4.2.167},
+url = {http://dx.doi.org/10.1260/1748-3018.4.2.167},
+year = 2010,
+}
+
+
+@Article{ guyeux10,
+ author = "Bahi, J. and Guyeux, C.",
+ title = "Topological chaos and chaotic iterations, application to Hash functions",
+ booktitle = "WCCI'10, IEEE World Congress on Computational Intelligence",
+ year = "2010",
+ pages = "1--7",
+ address = "Barcelona, Spain",
+ month = jul,
+ publisher = "IEEE",
+ journal = "Neural Networks (IJCNN2010)",
+ equipe = "and",
+ inhal = "no",
+ owner = "christophe",
+ timestamp = "2010.04.11"
+}
+
+@Book{ Robert1986,
+ title = "Discrete Iterations: A Metric Study",
+ year = "1986",
+ editor = "Springer-Verlag",
+ author = "Robert, F.",
+ volume = "6",
+ series = "Springer Series in Computational Mathematics",
+ owner = "guyeux",
+ timestamp = "17/02/2008"
+}
+
+
+
+@PhDThesis{ GuyeuxThese10,
+ author = "Guyeux, C.",
+ title = "Le d{\'e}sordre des it{\'e}rations chaotiques et leur utilit{\'e} en s{\'e}curit{\'e} informatique",
+ school = "Universit{\'e} de Franche-Comt{\'e}",
+ year = "2010",
+ owner = "christophe",
+ timestamp = "2010.12.21"
+}
+
+
+@inproceedings{bgw09:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, J and Guyeux, C. and Wang, Q.},
+title = {A novel pseudo-random generator based on discrete chaotic iterations},
+booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
+pages = {71--76},
+doi = {10.1109/INTERNET.2009.18},
+url = {http://dx.doi.org/10.1109/INTERNET.2009.18},
+address = {Cannes, France},
+month = aug,
+year = 2009,
+}
+
+
+@article{bfgw11:ij,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACLNI},
+impact-factor ={#},
+isi-acro = {#},
+author = {Bahi, J. and Fang, X. and Guyeux, C. and Wang, Q.},
+title = {Evaluating Quality of Chaotic Pseudo-Random Generators. Application to Information Hiding},
+journal = {IJAS, International Journal On Advances in Security},
+volume = 4,
+number = {1-2},
+pages = {118--130},
+abstract = {Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we described a generator based on chaotic iterations which behaves chaotically as defined by Devaney. In this paper which is an extension of the work presented at the conference Internet`10, the proposal is to improve the speed, the security, and the evaluation of this generator, to make its use more relevant in the Internet security context. In order to do so, a comparative study between various generators is carried out and statistical results are improved. Finally, an application in the information hiding framework is presented with details, to give an illustrative example of the use of such a generator in the Internet security field.},
+year = 2011,
+
+}
+
+@inproceedings{bgw10:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, J. and Guyeux, C. and Wang, Q.},
+title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application to Watermarking},
+booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
+pages = {202--211},
+series = {LNCS},
+volume = 6318,
+url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26},
+doi = {10.1007/978-3-642-16515-3_26},
+address = {Sanya, China},
+month = oct,
+year = 2010,
+
+}
+
+
+@inproceedings{bfg12a:ip,
+inhal = {no},
+domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
+equipe = {and},
+classement = {ACTI},
+author = {Bahi, J. and Fang, X. and Guyeux, C.},
+title = {An optimization technique on pseudorandom generators based on chaotic iterations},
+booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
+pages = {31--36},
+address = {Venice, Italy},
+month = jun,
+year = 2012,
+
+}