“…In general, they are based on logistic [11], [12], [15], [17], [18], [21], [25], sine/cosine [23], [25], [29], memristive [24], henon [29], Chebyshev [32], coupled lattice [10] and cellular automata [31], [40]. As the cryptanalyses are compared among each other, the key-spaces in [10], [19], [22]- [24], [28], [32] can be regarded the shorter, those in [14], [18], [26], [36] are medium and those in [11], [16], [20], [21], [25], [29], [34], [35], [40], [41] are considered the longer. The mean entropy can be quantized better [20], moderate [14], [24]- [31], [41] and worse [10], [11], [15], [18], [19], [21],…”