-. Rc, ) ) alternative map Points x (i) x ( j) ErrorL1 ErrorL2 ErrorL3, Table 1.3 Numerical, pp.4-5

J. Abraham, P. Abreu, M. Aglietta, C. Aguirre, D. Allard et al., Allekotte: Correlation of the highest-energy cosmic rays with nearby extragalactic objects, Science, vol.5852, pp.938-943, 2007.

G. Alvarez and S. Li, SOME BASIC CRYPTOGRAPHIC REQUIREMENTS FOR CHAOS-BASED CRYPTOSYSTEMS, International Journal of Bifurcation and Chaos, vol.16, issue.08, pp.2129-2151, 2006.
DOI : 10.1142/S0218127406015970

M. R. Ariffin and M. S. Noorani, Modified Baptista type chaotic cryptosystem via matrix secret key, Physics Letters A, vol.372, issue.33, pp.5427-5430, 2008.
DOI : 10.1016/j.physleta.2008.06.077

S. Banerjee, D. Kastha, S. Das, G. Vivek, and C. Grebogi, Robust chaos-the theoretical formulation and experimental evidence, ISCAS'99. Proceedings of the 1999 IEEE International Symposium on Circuits and Systems VLSI (Cat. No.99CH36349), pp.293-296, 1999.
DOI : 10.1109/ISCAS.1999.777567

J. Banks, J. Brooks, G. Cairns, G. Davis, and P. Stacey, On Devaney's Definition of Chaos, The American Mathematical Monthly, vol.99, issue.4, pp.332-334, 1992.
DOI : 10.2307/2324899

M. Baptista, Cryptography with chaos, Physics Letters A, vol.240, issue.1-2, pp.50-54, 1998.
DOI : 10.1016/S0375-9601(98)00086-3

D. Boneh and B. , Waters: Constrained pseudorandom functions and their applications, Advances in Cryptology-Asiacrypt, pp.280-300, 2013.
DOI : 10.1007/978-3-642-42045-0_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

F. Dachselt and W. S. Schwarz, Chaos and cryptography. Circuits and Systems I: Fundamental Theory and Applications, IEEE Transactions on, vol.48, pp.1498-1509, 2001.
DOI : 10.1109/tcsi.2001.972857

R. Dogan, A. T. Murgan, S. Ortmann, and M. Glesner, Searching for robust chaos in discrete time neural networks using weight space exploration, Proceedings of International Conference on Neural Networks (ICNN'96), pp.688-693, 1996.
DOI : 10.1109/ICNN.1996.548979

E. H. Dowell and C. Pezeshki, On the Understanding of Chaos in Duffings Equation Including a Comparison With Experiment, Journal of Applied Mechanics, vol.53, issue.1, pp.5-9, 1986.
DOI : 10.1115/1.3171739

M. Feki, An adaptive chaos synchronization scheme applied to secure communication, Chaos, Solitons & Fractals, vol.18, issue.1, pp.141-148, 2003.
DOI : 10.1016/S0960-0779(02)00585-4

M. Feigenbaum, The universal metric properties of nonlinear transformations, Journal of Statistical Physics, vol.12, issue.6, pp.669-706, 1979.
DOI : 10.1007/BF01107909

D. R. Frey and W. Schwarz, Chaotic digital encoding: an approach to secure communication. Circuits and Systems II: Analog and Digital Signal Processing, IEEE Transactions on, vol.40, pp.660-666, 1993.

O. Garasym, I. Taralova, and R. Lozi, Application of nonlinear dynamics to chaotic prng design, European conferance on iteration theory (ECIT), 2014 International Conference on, p.20, 2014.

C. Li and G. Chen, Chaos in the fractional order Chen system and its control, Chaos, Solitons & Fractals, vol.22, issue.3, pp.549-554, 2004.
DOI : 10.1016/j.chaos.2004.02.035

G. Heidari-bateni and C. D. , A chaotic direct-sequence spread-spectrum communication system, IEEE Transactions on Communications, vol.42, issue.2/3/4, pp.1524-1527, 1994.
DOI : 10.1109/TCOMM.1994.582834

T. Holenstein, Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness, Theory of Cryptography, pp.443-461, 2006.
DOI : 10.1007/11681878_23

Z. Hong and X. Ling, Generating Chaotic Secure Sequences with Desired Statistical Properties and High Security, International Journal of Bifurcation and Chaos, vol.07, issue.01, pp.205-213, 1997.
DOI : 10.1142/S0218127497000145

S. Jarecki and X. Liu, Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection, Theory of Cryptography, pp.577-594, 2009.
DOI : 10.1007/978-3-642-00457-5_34

Z. Xiongj and . Yang, Chaos caused by a topologically mixing map. International Centre for Theoretical Physics, 1991.

O. Katz, D. A. Ramon, and I. A. Wagner, A robust random number generator based on a differential current-mode chaos, IEEE Transactions, vol.16, pp.1677-1686, 2008.

I. Lanford and O. , Informal Remarks on the Orbit Structure of Discrete Approximations to Chaotic Maps, Experimental Mathematics, vol.88, issue.4, pp.317-324, 1998.
DOI : 10.1080/10586458.1998.10504377

C. Li, Y. Chen, T. Chang, L. Deng, and T. , Kiwing: Period extension and randomness enhancement using high-throughput reseeding-mixing PRNG. Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, vol.20, issue.2, pp.385-389, 2012.

W. Liebert and H. G. Schuster, Proper choice of the time delay for the analysis of chaotic time series, Physics Letters A, vol.142, issue.2-3, pp.107-111, 1989.
DOI : 10.1016/0375-9601(89)90169-2

R. Lozi, Chaotic pseudo random number generators via ultra weak coupling of chaotic maps and double threshold sampling sequences, ICCSA 2009, 3rd Conference on Complex Systems and Applications, pp.20-24, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00386292

R. Lozi and E. Cherrier, Noise-resisting ciphering based on a chaotic multi-stream pseudorandom number generator, n Internet Technology and Secured Transactions (ICITST), 2011 International Conference for, pp.91-96, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00617051

R. Lozi, EMERGENCE OF RANDOMNESS FROM CHAOS, International Journal of Bifurcation and Chaos, vol.22, issue.02, pp.1250021-1250022, 2012.
DOI : 10.1142/S0218127412500216

URL : https://hal.archives-ouvertes.fr/hal-01326704

R. Lozi, Can we trust in numerical computations of chaotic solutions of dynamical systems ?, Topology and dynamics of Chaos, pp.63-98, 2013.
DOI : 10.1142/9789814434867_0004

URL : https://hal.archives-ouvertes.fr/hal-00682818

R. Lozi and I. , Taralova: From chaos to randomness via geometric undersampling, ESAIM: Proceedings and surveys, pp.177-195, 2014.

H. Ma and C. Han, Selection of embedding dimension and delay time in phase space reconstruction. Frontiers of Electrical and Electronic Engineering in China 1, pp.111-114, 2006.

R. May, Stability and Complexity of Models Ecosystems, Princeton NJ, 1973.

R. May, Biological Populations with Nonoverlapping Generations: Stable Points, Stable Cycles, and Chaos, Science, vol.186, issue.4164, pp.645-647, 1974.
DOI : 10.1126/science.186.4164.645

A. J. Menezes and P. C. , Van Oorschot: Handbook of applied cryptography, 1996.

H. Nejati, A. Beirami, and Y. , Massoud: A realizable modified tent map for true random number generation, Circuits and Systems, pp.621-624, 2008.

R. Nillsen, Randomness and recurrence in dynamical systems, AMC, vol.10, pp.12-30, 2010.
DOI : 10.5948/UPO9781614440000

H. Noura, S. Assad, and C. , Vladeanu: Design of a fast and robust chaos-based cryptosystem for image encryption, 8th International Conference on, pp.423-426, 2010.

Z. M. Odibat, N. Corson, M. A. Aziz-alaoui, and C. , SYNCHRONIZATION OF CHAOTIC FRACTIONAL-ORDER SYSTEMS VIA LINEAR CONTROL, International Journal of Bifurcation and Chaos, vol.20, issue.01, pp.81-97, 2010.
DOI : 10.1142/S0218127410025429

URL : https://hal.archives-ouvertes.fr/hal-00430513

L. Pichler and H. J. Pradlwarter, Evolution of probability densities in the phase space for reliability analysis of non-linear structures, Structural Safety, vol.31, issue.4, pp.316-324, 2009.
DOI : 10.1016/j.strusafe.2008.09.002

O. Reingold, Theory of Cryptography, 6th theory of cryptography conference, tcc, pp.15-17, 2009.
DOI : 10.1007/978-3-642-00457-5

A. Rojas, I. Taralova, and R. Lozi, New alternate ring-coupled map for multirandom number generation, Journal of Nonlinear Systems and Applications, vol.4, issue.1, pp.64-69, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00816336

A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, A statistical test suite for random and pseudorandom number generators for cryptographic applications. Booz-allen and hamilton inc mclean va, 2010.

S. Sato, M. Sano, and Y. Sawada, Practical Methods of Measuring the Generalized Dimension and the Largest Lyapunov Exponent in High Dimensional Chaotic Systems, Progress of Theoretical Physics, vol.77, issue.1, pp.1-5, 1987.
DOI : 10.1143/PTP.77.1

L. Shengqiang, C. Zhixiong, S. Rong, and X. I. Guozhen, In the randomness of generalized cyclotomic sequences of order two, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, vol.90, pp.2037-2041, 2007.

A. Singh and R. Gilhotra, Data Security Using Private Key Encryption System Based on Arithmetic Coding, International Journal of Network Security & Its Applications, vol.3, issue.3, pp.58-67, 2011.
DOI : 10.5121/ijnsa.2011.3305

J. C. Sprott, Chaos and time-series analysis, 2003.

B. Sudret, Global sensitivity analysis using polynomial chaos expansions, Reliability Engineering & System Safety, vol.93, issue.7, pp.964-979, 2008.
DOI : 10.1016/j.ress.2007.04.002

URL : https://hal.archives-ouvertes.fr/hal-01432217

V. Sundarapandian and I. , Pehlivan: Analysis, control, synchronization, and circuit design of a novel chaotic system, Mathematical and Computer Modelling, vol.12, 1904.

J. Thiffeault, M. D. Finn, E. Gouillart, and T. , Hall: Topology of chaotic mixing patterns, Chaos: An Interdisciplinary Journal of Nonlinear Science, vol.18, 2008.

S. Wang, J. Kuang, J. Li, Y. Luo, H. Lu et al., Chaos-based secure communications in a large community, Physical Review E, vol.66, issue.6, p.65202, 2002.
DOI : 10.1103/PhysRevE.66.065202

W. K. Wong, L. P. Lee, and K. W. , Wong: A modified chaotic cryptographic method, Communications and Multimedia Security Issues of the New Century, pp.123-126, 2001.

G. Yuan and J. Yorke, Collapsing of chaos in one dimensional maps, Physica D: Nonlinear Phenomena, vol.136, issue.1-2, pp.18-30, 2000.
DOI : 10.1016/S0167-2789(99)00147-5

A. A. Zaher and A. Abdulnasser, On the design of chaos-based secure communication systems, Communications in Nonlinear Science and Numerical Simulation, vol.16, issue.9, pp.3721-3737, 2011.
DOI : 10.1016/j.cnsns.2010.12.032

X. Zhou and X. , Tang: Research and implementation of RSA algorithm for encryption and decryption, Strategic Technology (IFOST), 2011 6th International Forum on, pp.1118-1121, 2011.

O. Garasym and I. T. Irccyn, NANTES France oleg.garasym@irccyn.ec-nantes.fr Ina.Taralova@irccyn.ec-nantes