{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:24:41Z","timestamp":1761582281491,"version":"3.37.3"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T00:00:00Z","timestamp":1685145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T00:00:00Z","timestamp":1685145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100011065","name":"Shahid Rajaee Teacher Training University","doi-asserted-by":"publisher","award":["400235"],"award-info":[{"award-number":["400235"]}],"id":[{"id":"10.13039\/501100011065","id-type":"DOI","asserted-by":"publisher"}]},{"name":"State Government of Uttar Pradesh, India under the \u201cResearch and Development\u201d scheme grant sanctioned vide the Government","award":["-89\/2022\/1585\/sattar-4-2022\/001-4-32-2022 dated 10\/11\/2022"],"award-info":[{"award-number":["-89\/2022\/1585\/sattar-4-2022\/001-4-32-2022 dated 10\/11\/2022"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s12083-023-01467-z","type":"journal-article","created":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T00:02:05Z","timestamp":1685145725000},"page":"1785-1802","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["$$\\chi$$perbp: a cloud-based lightweight mutual authentication protocol"],"prefix":"10.1007","volume":"16","author":[{"given":"Morteza","family":"Adeli","sequence":"first","affiliation":[]},{"given":"Nasour","family":"Bagheri","sequence":"additional","affiliation":[]},{"given":"Sadegh","family":"Sadeghi","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,27]]},"reference":[{"issue":"5","key":"1467_CR1","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/LCOMM.2012.031212.120237","volume":"16","author":"Y Tian","year":"2012","unstructured":"Tian Y, Chen G, Li J (2012) A new ultra-lightweight RFID authentication protocol with permutation. IEEE Comm. Letters 16(5):702\u2013705","journal-title":"IEEE Comm. Letters"},{"issue":"3","key":"1467_CR2","doi-asserted-by":"publisher","first-page":"1787","DOI":"10.1007\/s11277-014-1958-x","volume":"79","author":"X Zhuang","year":"2014","unstructured":"Zhuang X, Zhu Y, Chang C (2014) A new ultra-lightweight RFID protocol for low-cost tags: R2 AP. Wireless Personal Comm. 79(3):1787\u20131802","journal-title":"Wireless Personal Comm."},{"key":"1467_CR3","doi-asserted-by":"crossref","unstructured":"Khokhar UM, Najam-ul-Islam M, Shami MA (2015) RCIA: a new ultralightweight RFID authentication protocol using recursive hash. IJDSN\u00a02015:642180:1\u2013642180:8","DOI":"10.1155\/2015\/642180"},{"key":"1467_CR4","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.future.2018.07.004","volume":"90","author":"Y Liu","year":"2019","unstructured":"Liu Y, Ezerman M, Wang H (2019) Double verification protocol via secret sharing for low-cost RFID tags. Futur Gener Comput Syst 90:118\u2013128","journal-title":"Futur Gener Comput Syst"},{"key":"1467_CR5","doi-asserted-by":"crossref","unstructured":"Ahmadian Z, Salmasizadeh M, Aref MR (2013) Desynchronization attack on RAPP ultra-lightweight auth protocol. Inf Process Lett\u00a0113(7):205\u2013209","DOI":"10.1016\/j.ipl.2013.01.003"},{"issue":"6","key":"1467_CR6","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1002\/sec.803","volume":"7","author":"N Bagheri","year":"2014","unstructured":"Bagheri N, Safkhani M, Peris-Lopez P, Tapiador JE (2014) Weaknesses in a new ultralightweight RFID authentication protocol with permutation - RAPP. Secur. Commun. Networks 7(6):945\u2013949","journal-title":"Secur. Commun. Networks"},{"key":"1467_CR7","unstructured":"Safkhani M, Bagheri N (2016) Generalized desynchronization attack on UMAP: application to rcia, kmap, SLAP and sasi$${}^{\\text{+}}$$ protocols. IACR Cryptology ePrint Archive. http:\/\/eprint.iacr.org\/2016\/905"},{"key":"1467_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107558","volume":"181","author":"M Safkhani","year":"2020","unstructured":"Safkhani M, Rostampour S, Bendavid Y, Bagheri N (2020) Iot in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity. Comput. Networks 181","journal-title":"Comput. Networks"},{"key":"1467_CR9","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.ins.2019.08.006","volume":"527","author":"K Fan","year":"2020","unstructured":"Fan K, Luo Q, Zhang K, Yang Y (2020) Cloud-based lightweight secure rfid mutual authentication protocol in iot. Inform Sci 527:329\u2013340","journal-title":"Inform Sci"},{"key":"1467_CR10","doi-asserted-by":"crossref","unstructured":"Adeli M, Bagheri N (2020) Mdsbsp: a search protocol based on mds codes for rfid-based internet of vehicle. J Supercomput","DOI":"10.1007\/s11227-020-03302-1"},{"key":"1467_CR11","doi-asserted-by":"publisher","first-page":"8376","DOI":"10.1109\/ACCESS.2018.2890282","volume":"7","author":"L Gao","year":"2019","unstructured":"Gao L, Zhang L, Lin F, Ma M (2019) Secure rfid authentication schemes based on security analysis and improvements of the usi protocol. IEEE Access 7:8376\u20138384","journal-title":"IEEE Access"},{"key":"1467_CR12","doi-asserted-by":"crossref","unstructured":"Vahedi E, Ward RK, Blake IF (2011) Security analysis and complexity comparison of some recent lightweight rfid protocols. In \u00c1.Herrero and E.Corchado, editors, Computational Intelligence in Security for Information Systems, pages 92\u201399, Berlin, Heidelberg. Springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-21323-6_12"},{"issue":"18","key":"1467_CR13","doi-asserted-by":"publisher","first-page":"5148","DOI":"10.3390\/s20185148","volume":"20","author":"MM Islam","year":"2020","unstructured":"Islam MM, Hossain MS, Hasan MK, Shahjalal M, Jang YM (2020) Design and implementation of high-performance ecc processor with unified point addition on twisted edwards curve. Sensors 20(18):5148","journal-title":"Sensors"},{"key":"1467_CR14","doi-asserted-by":"publisher","first-page":"3086","DOI":"10.1007\/s11227-019-03086-z","volume":"76","author":"M Nikooghadam","year":"2020","unstructured":"Nikooghadam M, Amintoosi H (2020) Perfect forward secrecy via an ecc-based authentication scheme for sip in voip. J Supercomput 76:3086\u20133104","journal-title":"J Supercomput"},{"key":"1467_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11277-009-9786-0","volume":"55","author":"ME Hoque","year":"2010","unstructured":"Hoque ME, Rahman F, Ahamed SI, Park JH (2010) Enhancing privacy and security of rfid system with serverless authentication and search protocols in pervasive environments. Wireless Pers Commun 55:65\u201379","journal-title":"Wireless Pers Commun"},{"key":"1467_CR16","series-title":"pp","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/978-3-319-01273-5_119","volume-title":"Mechatronics and Automatic Control Systems","author":"M Deng","year":"2014","unstructured":"Deng M, Yang W, Zhu W (2014) Weakness in a serverless authentication protocol for radio frequency identification. In: Wang W (ed) Mechatronics and Automatic Control Systems. Springer International Publishing, Cham, pp 1055\u20131061"},{"key":"1467_CR17","series-title":"pp","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-319-68542-7_25","volume-title":"Cloud Computing and Security","author":"J Li","year":"2017","unstructured":"Li J, Zhou Z, Wang P (2017) Server-less lightweight authentication protocol for rfid system. In: Sun X, Chao H-C, You X, Bertino E (eds) Cloud Computing and Security. Springer International Publishing, Cham, pp 305\u2013314"},{"issue":"4","key":"1467_CR18","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1109\/TWC.2008.061012","volume":"7","author":"CC Tan","year":"2008","unstructured":"Tan CC, Sheng B, Li Q (2008) Secure and serverless rfid authentication and search protocols. IEEE Trans Wirel Commun 7(4):1400\u20131407","journal-title":"IEEE Trans Wirel Commun"},{"key":"1467_CR19","series-title":"Interactive Systems and Applications","first-page":"842","volume-title":"Advances in Intelligent","author":"C-H Wei","year":"2019","unstructured":"Wei C-H, Yang C-Y, Hwang M-S (2019) Cryptanalysis of the serverless rfid authentication and search protocols. In: Xhafa F, Patnaik S, Tavana M (eds) Advances in Intelligent. Springer International Publishing, Cham, pp 842\u2013846"},{"issue":"16","key":"1467_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3323","volume":"30","author":"PK Dhillon","year":"2017","unstructured":"Dhillon PK, Kalra S (2017) Secure multi-factor remote user authentication scheme for internet of things environments. Int J Commun Syst 30(16)","journal-title":"Int J Commun Syst"},{"key":"1467_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106888","volume":"88","author":"K Mahmood","year":"2020","unstructured":"Mahmood K, Akram W, Shafiq A, Altaf I, Lodhi MA, Islam SH (2020) An enhanced and provably secure multi-factor authentication scheme for internet-of-multimedia-things environments. Comput Electr Eng 88","journal-title":"Comput Electr Eng"},{"key":"1467_CR22","unstructured":"VanLint JH (1998) Introduction to coding theory, volume 86. Springer Science & Business Media"},{"key":"1467_CR23","doi-asserted-by":"crossref","unstructured":"Anderson DR (2008) Information theory and entropy. Model based inference in the life sciences: A primer on evidence, pp 51\u201382","DOI":"10.1007\/978-0-387-74075-1_3"},{"key":"1467_CR24","unstructured":"Bertoni G, Daemen J, Peeters M, Assche GV (2013) Keccak. In T.Johansson and P.Q. Nguyen, editors, Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, volume 7881 of Lecture Notes in Computer Science, pp 313\u2013314. Springer"},{"key":"1467_CR25","doi-asserted-by":"crossref","unstructured":"Guo J, Peyrin T, Poschmann A (2011) The PHOTON family of lightweight hash functions. In P.Rogaway, editor, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings, volume 6841 of Lecture Notes in Computer Science, pp 222\u2013239. Springer","DOI":"10.1007\/978-3-642-22792-9_13"},{"issue":"1","key":"1467_CR26","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18\u201336","journal-title":"ACM Trans Comput Syst"},{"key":"1467_CR27","doi-asserted-by":"publisher","unstructured":"Cremers CJF (2008) The Scyther tool: Verification, falsification, and analysis of security protocols. In: Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA, Proc. Lecture Notes in Computer Science, vol 5123. Springer, pp 414\u2013418. https:\/\/doi.org\/10.1007\/978-3-540-70545-1_38","DOI":"10.1007\/978-3-540-70545-1_38"},{"key":"1467_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78636-8","volume-title":"Operational Semantics and Verification of Security Protocols","author":"C Cremers","year":"2012","unstructured":"Cremers C, Mauw S, Samarin A (2012) Operational Semantics and Verification of Security Protocols. Information Security and Cryptography. Springer-Verlag, Berlin Heidelberg"},{"key":"1467_CR29","series-title":"Autonomous Spontaneous Security, and Security Assurance","first-page":"147","volume-title":"Data Privacy Management","author":"S Abughazalah","year":"2015","unstructured":"Abughazalah S, Markantonakis K, Mayes K (2015) Secure improved cloud-based rfid authentication protocol. In: Garcia-Alfaro J, Herrera-Joancomart\u00ed J, Lupu E, Posegga J, Aldini A, Martinelli F, Suri N (eds) Data Privacy Management. Springer International Publishing, Cham, pp 147\u2013164"},{"issue":"5","key":"1467_CR30","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1007\/s12652-017-0574-5","volume":"9","author":"M Mohammedi","year":"2018","unstructured":"Mohammedi M, Omar M, Bouabdallah A (2018) Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments. J Ambient Intell Humaniz Comput 9(5):1527\u20131539","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"4","key":"1467_CR31","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1109\/TII.2018.2794996","volume":"14","author":"K Fan","year":"2018","unstructured":"Fan K, Jiang W, Li H, Yang Y (2018) Lightweight rfid protocol for medical privacy protection in iot. IEEE Trans Industr Inf 14(4):1656\u20131665","journal-title":"IEEE Trans Industr Inf"},{"key":"1467_CR32","doi-asserted-by":"crossref","unstructured":"Fan K, Kang J, Zhu S, Li H, Yang Y (2019) Permutation matrix encryption based ultralightweight secure RFID scheme in internet of vehicles. Sensors, 19(1)","DOI":"10.3390\/s19010152"},{"key":"1467_CR33","unstructured":"Kintex-7 product advantage. https:\/\/www.xilinx.com\/products\/silicon-devices\/fpga\/kintex-7.html. Accessed: 30 Sept\u00a02010"},{"key":"1467_CR34","unstructured":"P.J. Ashenden. The designer\u2019s guide to VHDL. Morgan kaufmann, 2010"},{"key":"1467_CR35","unstructured":"Kintex-7 product advantage. https:\/\/www.xilinx.com\/support\/download.html. Accessed: 30 Sept\u00a02010"},{"key":"1467_CR36","doi-asserted-by":"crossref","unstructured":"Diehl W, Farahmand F, Yalla P, Kaps J, Gaj K (2017) Comparison of hardware and software implementations of selected lightweight block ciphers. In 2017 27th International Conference on Field Programmable Logic and Applications (FPL), pp 1\u20134","DOI":"10.23919\/FPL.2017.8056808"},{"key":"1467_CR37","doi-asserted-by":"crossref","unstructured":"Jungk\u00a0B, Apfelbeck J (2011) Area-efficient fpga implementations of the sha-3 finalists. In 2011 International Conference on Reconfigurable Computing and FPGAs, pp 235\u2013241","DOI":"10.1109\/ReConFig.2011.16"},{"issue":"1","key":"1467_CR38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of des-like cryptosystems. J Cryptol 4(1):3\u201372","journal-title":"J Cryptol"},{"key":"1467_CR39","doi-asserted-by":"crossref","unstructured":"Matsui\u00a0M (1993) Linear cryptanalysis method for des cipher. In Workshop on the Theory and Application of of Cryptographic Techniques, pages 386\u2013397. Springer","DOI":"10.1007\/3-540-48285-7_33"},{"key":"1467_CR40","doi-asserted-by":"crossref","unstructured":"Biham E, Biryukov A, Shamir A (1999) Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In International Conference on the Theory and Applications of Cryptographic Techniques, pp 12\u201323. Springer","DOI":"10.1007\/3-540-48910-X_2"},{"key":"1467_CR41","unstructured":"Knudsen\u00a0L (1998) Deal-a 128-bit block cipher. Complexity\u00a0258(2):216"},{"issue":"3","key":"1467_CR42","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10623-012-9697-z","volume":"70","author":"A Bogdanov","year":"2014","unstructured":"Bogdanov A, Rijmen V (2014) Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des Codes Crypt 70(3):369\u2013383","journal-title":"Des Codes Crypt"},{"key":"1467_CR43","doi-asserted-by":"crossref","unstructured":"Mouha N, Wang Q, Gu D, Preneel B (2011) Differential and linear cryptanalysis using mixed-integer linear programming. In International Conference on Information Security and Cryptology, pages 57\u201376. Springer","DOI":"10.1007\/978-3-642-34704-7_5"},{"key":"1467_CR44","doi-asserted-by":"crossref","unstructured":"Sun S, Hu L, Wang P, Qiao K, Ma X, Song L (2014) Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block ciphers. In International Conference on the Theory and Application of Cryptology and Information Security, pp 158\u2013178. Springer","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"1467_CR45","first-page":"551","volume":"2011","author":"S Wu","year":"2011","unstructured":"Wu S, Wang M (2011) Security evaluation against differential cryptanalysis for block cipher structures. IACR Cryptology ePrint Archive 2011:551","journal-title":"IACR Cryptology ePrint Archive"},{"key":"1467_CR46","first-page":"689","volume":"2016","author":"T Cui","year":"2016","unstructured":"Cui T, Jia K, Fu K, Chen S, Wang M (2016) New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations. IACR Cryptol. ePrint Arch. 2016:689","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"1467_CR47","doi-asserted-by":"crossref","unstructured":"Sasaki Y, Todo Y (2017) New impossible differential search tool from design and cryptanalysis aspects. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp 185\u2013215. Springer","DOI":"10.1007\/978-3-319-56617-7_7"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01467-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01467-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01467-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T04:19:00Z","timestamp":1689135540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01467-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,27]]},"references-count":47,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["1467"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01467-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2023,5,27]]},"assertion":[{"value":"1 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal ethics"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no conflict of interest\/competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}