{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:47:38Z","timestamp":1761947258504,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icecs.2004.1399654","type":"proceedings-article","created":{"date-parts":[[2005,3,31]],"date-time":"2005-03-31T18:26:51Z","timestamp":1112293611000},"page":"219-221","source":"Crossref","is-referenced-by-count":6,"title":["Security of neural cryptography"],"prefix":"10.1109","author":[{"given":"R.","family":"Mislovaty","sequence":"first","affiliation":[]},{"given":"E.","family":"Klein","sequence":"additional","affiliation":[]},{"given":"I.","family":"Kanter","sequence":"additional","affiliation":[]},{"given":"W.","family":"Kinzel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","first-page":"118701","DOI":"10.1103\/PhysRevLett.91.118701","volume":"91","author":"mislovaty","year":"2003","journal-title":"Phys Rev Lett"},{"key":"14","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1209\/epl\/i1999-00364-5","volume":"46","author":"copelli","year":"1999","journal-title":"Europhys Lett"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/28\/7\/012"},{"journal-title":"Asiacrypt 2002","year":"0","author":"klimov","key":"12"},{"year":"0","key":"3"},{"key":"2","doi-asserted-by":"crossref","first-page":"66102","DOI":"10.1103\/PhysRevE.66.066102","volume":"66","author":"mislovaty","year":"2002","journal-title":"Phys Rev E"},{"key":"1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1209\/epl\/i2002-00552-9","volume":"57","author":"kanter","year":"2002","journal-title":"Europhys Lett"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139164542"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.62.2555"},{"key":"6","doi-asserted-by":"crossref","first-page":"4769","DOI":"10.1088\/0305-4470\/29\/16\/005","volume":"29","author":"biehl","year":"1996","journal-title":"J Phys A"},{"journal-title":"Introduction to the Theory of Neural Computation","year":"1991","author":"hertz","key":"5"},{"key":"4","doi-asserted-by":"crossref","first-page":"4225","DOI":"10.1103\/PhysRevE.52.4225","volume":"52","author":"saad","year":"1995","journal-title":"Phys Rev E"},{"key":"9","doi-asserted-by":"crossref","first-page":"66135","DOI":"10.1103\/PhysRevE.66.066135","volume":"66","author":"rosen-zvi","year":"2002","journal-title":"Phys Rev E"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1088\/0305-4470\/33\/14\/101","volume":"33","author":"kinzel","year":"2000","journal-title":"J Phys A"}],"event":{"name":"2004 11th IEEE International Conference on Electronics, Circuits and Systems, 2004. ICECS 2004.","location":"Tel Aviv, Israel"},"container-title":["Proceedings of the 2004 11th IEEE International Conference on Electronics, Circuits and Systems, 2004. ICECS 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9627\/30421\/01399654.pdf?arnumber=1399654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T17:51:05Z","timestamp":1497635465000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1399654\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icecs.2004.1399654","relation":{},"subject":[]}}