{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:35:42Z","timestamp":1775421342720,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10489-022-03904-7","type":"journal-article","created":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T11:02:52Z","timestamp":1659956572000},"page":"9344-9367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A symmetric neural cryptographic key generation scheme for Iot security"],"prefix":"10.1007","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4951-4729","authenticated-orcid":false,"given":"Arindam","family":"Sarkar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,8]]},"reference":[{"key":"3904_CR1","unstructured":"Perrig A (1999) Efficient collaborative key management protocols for secure autonomous group communication. In: International workshop on cryptographic techniques and electronic commerce. University of Hong Kong Press, pp 192\u2013202"},{"key":"3904_CR2","unstructured":"Boyd C, Mathuria A (2013) Protocols for authentication and key establishment Springer books"},{"key":"3904_CR3","doi-asserted-by":"crossref","unstructured":"Dolecki M, Kozera R (2015) The impact of the TPM weights distribution on network synchronization time. In: Computerinformation systems and industrial management. Springer international publishing, vol 9339. pp 451\u2013460","DOI":"10.1007\/978-3-319-24369-6_37"},{"issue":"11","key":"3904_CR4","doi-asserted-by":"publisher","first-page":"4999","DOI":"10.1109\/TNNLS.2019.2955165","volume":"31","author":"T Dong","year":"2020","unstructured":"Dong T, Huang T (2020) Neural cryptography based on complex-valued neural network. IEEE Trans Neural Netw Learn Syst 31(11):4999\u20135004","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"4","key":"3904_CR5","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/JCN.2012.6292248","volume":"14","author":"X Gu","year":"2012","unstructured":"Gu X, Zhao Y, Yang J (2012) Reducing rekeying time using an integrated group key agreement scheme. J Commun Netw 14(4):418\u2013428","journal-title":"J Commun Netw"},{"key":"3904_CR6","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","volume":"97","author":"AA Heidari","year":"2019","unstructured":"Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Huiling C (2019) Harris hawks optimization: Algorithm and applications. Futur Gener Comput Syst 97:849\u2013872","journal-title":"Futur Gener Comput Syst"},{"key":"3904_CR7","doi-asserted-by":"crossref","unstructured":"Ingemarsson I, Tang D, Wong C (1982) A conference key distribution system. IEEE Trans:714\u2013720","DOI":"10.1109\/TIT.1982.1056542"},{"issue":"5","key":"3904_CR8","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1109\/TPDS.2010.128","volume":"22","author":"S Jarecki","year":"2011","unstructured":"Jarecki S, Kim J, Tsudik G (2011) Flexible robust group key agreement. IEEE Trans Parallel DistribSyst 22(5):879\u2013886","journal-title":"IEEE Trans Parallel DistribSyst"},{"key":"3904_CR9","doi-asserted-by":"crossref","unstructured":"Jeong Sooyong, Park Cheolhee, Hong Dowon, Seo Changho, Jho Namsu (2021) Neural cryptography based on generalized tree parity machine for real-life systems. Secur Commun Netw, 2021","DOI":"10.1155\/2021\/6680782"},{"key":"3904_CR10","first-page":"385","volume":"1838","author":"A Joux","year":"2000","unstructured":"Joux A (2000) A one round protocol for tripartite Diffie -Hellman\u201d algorithmic number theory. 4th International Symposium ANTS-IV 1838:385\u2013393","journal-title":"4th International Symposium ANTS-IV"},{"key":"3904_CR11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.chaos.2018.12.021","volume":"119","author":"B Karakaya","year":"2019","unstructured":"Karakaya B, G\u00fclten A, Frasca M (2019) A true random bit generator based on a Memristive chaotic circuit analysis, design and FPGA implementation. Chaos Solit Fractals 119:143\u2013149","journal-title":"Chaos Solit Fractals"},{"key":"3904_CR12","doi-asserted-by":"crossref","unstructured":"Kelsey J, Schneier B, Wagner D, Hall C (1998) Cryptanalytic attacks on pseudorandom number generators. Fast Software Encryption:168\u2013188","DOI":"10.1007\/3-540-69710-1_12"},{"key":"3904_CR13","doi-asserted-by":"crossref","unstructured":"Kim Y, Tsudik G (2000) Simple and fault tolerant key agreement for dynamic collaborative groups. 7th ACM Conf Comput Com Sec ACM Press:235\u2013244","DOI":"10.1145\/352600.352638"},{"key":"3904_CR14","doi-asserted-by":"crossref","unstructured":"Konstantinou E (2013) An efficient constant round id-based group key agreement protocol for Ad hoc networks\u201d. In: and others, editor, Proc of NSS 2013, vol 7873. of LNCS, pp 563\u2013 574","DOI":"10.1007\/978-3-642-38631-2_41"},{"key":"3904_CR15","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1080\/09720529.2019.1637154","volume":"22","author":"A Kumar","year":"2019","unstructured":"Kumar A (2019) An enhanced quantum key distribution protocol for security authentication. J Discret Math Sci Cryptogr 22:499\u2013507","journal-title":"J Discret Math Sci Cryptogr"},{"key":"3904_CR16","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/iet-ifs.2014.0192","volume":"10","author":"L Liu","year":"2016","unstructured":"Liu L, Miao S, Hu H, Deng Y (2016) Pseudo-random bit generator based on non-stationary logistic maps. IET Inf Secur 10:87\u201394","journal-title":"IET Inf Secur"},{"issue":"8","key":"3904_CR17","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/TNNLS.2018.2884620","volume":"30","author":"P Liu","year":"2019","unstructured":"Liu P, Zeng Z, Wang J (2019) Global synchronization of coupled fractional-order recurrent neural networks. EEE Trans Neural Netw Learn Syst 30(8):2358\u20132368","journal-title":"EEE Trans Neural Netw Learn Syst"},{"issue":"11","key":"3904_CR18","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1016\/j.sysarc.2008.04.003","volume":"54","author":"S M\u00fchlbach","year":"2008","unstructured":"M\u00fchlbach S, Wallner S (2008) Secure communication in microcomputer bus systems for embedded devices. J Syst Archit 54(11):1065\u20131076","journal-title":"J Syst Archit"},{"key":"3904_CR19","unstructured":"NIST (2020) NIST Statistical Test"},{"key":"3904_CR20","first-page":"441","volume":"33","author":"V Patidar","year":"2009","unstructured":"Patidar V, Sud KK, Pareek NK (2009) A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica 33:441\u2013452","journal-title":"Informatica"},{"key":"3904_CR21","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11063-021-10443-8","volume":"53","author":"A Sarkar","year":"2021","unstructured":"Sarkar A. (2021) Deep learning guided double hidden layer neural synchronization through mutual learning. Neural Process Lett 53:1355\u20131384","journal-title":"Neural Process Lett"},{"key":"3904_CR22","doi-asserted-by":"publisher","first-page":"107369","DOI":"10.1016\/j.compeleceng.2021.107369","volume":"95","author":"A Sarkar","year":"2021","unstructured":"Sarkar A, Khan MZ, Noorwali A (2021) CMOS technology-based energy efficient artificial neural session key synchronization for securing IoT. Comput Electr Eng 95:107369","journal-title":"Comput Electr Eng"},{"key":"3904_CR23","doi-asserted-by":"crossref","unstructured":"Shacham LN, Klein E, Mislovaty R, Kanter I, Kinzel W (2004) Cooperating attackers in neural cryptography. Physical Review E, vol 69(6)","DOI":"10.1103\/PhysRevE.69.066137"},{"key":"3904_CR24","doi-asserted-by":"crossref","unstructured":"Steiner M, Tsudik G, Waidner M (1996) Diffie-hellman key distribution extended to group communication. 3rd ACM ACM Conf Comput Commun Secur ACM press:31\u201337","DOI":"10.1145\/238168.238182"},{"issue":"8","key":"3904_CR25","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/71.877936","volume":"11","author":"M Steiner","year":"2000","unstructured":"Steiner M, Tsudik G, Waidner M (2000) Key agreement in dynamic peer groups. IEEE Trans Parallel Distrib Syst 11(8):769\u2013780","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"3904_CR26","doi-asserted-by":"crossref","unstructured":"Teodoro AAM, Gomes OSM, Saadi M et al (2021) An FPGA-based performance evaluation of artificial neural network architecture algorithm for IoT. Wirel Pers Commun","DOI":"10.1007\/s11277-021-08566-1"},{"issue":"4","key":"3904_CR27","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TC.2005.70","volume":"54","author":"M Volkmer","year":"2005","unstructured":"Volkmer M, Wallner S (2005) Tree parity machine rekeying architectures. IEEE Trans Comput 54(4):421\u2013427","journal-title":"IEEE Trans Comput"},{"key":"3904_CR28","doi-asserted-by":"crossref","unstructured":"Wu Q, Mu Y, Susilo W, Qin B, Domingo-Ferrer J (2009) Asymmetric group key agreement\u201d. In: Iand others, editor, Proc of Eurocrypt \u201909, vol 5479. of LNCS, pp 153\u201370","DOI":"10.1007\/978-3-642-01001-9_9"},{"issue":"19","key":"3904_CR29","doi-asserted-by":"publisher","first-page":"4318","DOI":"10.1016\/j.ins.2011.05.009","volume":"181","author":"L Zhang","year":"2011","unstructured":"Zhang L, Wu Q, Qin B, Domingo-Ferrer J (2011) Provably secure one-round identity-based authenticated asymmetric group key agreement protocol\u201d. Inf Sci 181(19):4318\u201329","journal-title":"Inf Sci"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03904-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03904-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03904-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T09:24:34Z","timestamp":1682846674000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03904-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,8]]},"references-count":29,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["3904"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03904-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,8]]},"assertion":[{"value":"14 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of Interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}