Cryptographically secure substitutions based on mixing maps Conference Paper 2004 uri icon