{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:58:26Z","timestamp":1775145506548,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030346171","type":"print"},{"value":"9783030346188","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-34618-8_9","type":"book-chapter","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T00:10:58Z","timestamp":1574381458000},"page":"256-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["A Critical Analysis of ISO 17825 (\u2018Testing Methods for the Mitigation of Non-invasive Attack Classes Against Cryptographic Modules\u2019)"],"prefix":"10.1007","author":[{"given":"Carolyn","family":"Whitnall","sequence":"first","affiliation":[]},{"given":"Elisabeth","family":"Oswald","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,22]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809163","volume-title":"Introduction to Software Testing","author":"P Ammann","year":"2008","unstructured":"Ammann, P., Offutt, J.: Introduction to Software Testing, 1st edn. Cambridge University Press, New York (2008)","edition":"1"},{"key":"9_CR2","unstructured":"Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: IEEE Symposium on Security and Privacy, pp. 3\u201311. IEEE Computer Society (2004)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Bhasin, S., Danger, J.L., Guilley, S., Najm, Z.: Side-channel leakage and trace compression using normalized inter-class variance. In: Lee, R.B., Shi, W. (eds.) HASP 2014, Hardware and Architectural Support for Security and Privacy, pp. 7:1\u20137:9. ACM (2014)","DOI":"10.1145\/2611765.2611772"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1186\/s12859-016-0994-9","volume":"17","author":"R Bi","year":"2016","unstructured":"Bi, R., Liu, P.: Sample size calculation while controlling false discovery rate for differential expression analysis with RNA-sequencing experiments. BMC Bioinform. 17(1), 146 (2016)","journal-title":"BMC Bioinform."},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MSP.2009.54","volume":"7","author":"J Brouchier","year":"2009","unstructured":"Brouchier, J., Kean, T., Marsh, C., Naccache, D.: Temperature attacks. IEEE Secur. Priv. 7(2), 79\u201382 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-12002-2_33","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"K Chatzikokolakis","year":"2010","unstructured":"Chatzikokolakis, K., Chothia, T., Guha, A.: Statistical measurement of information leakage. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol. 6015, pp. 390\u2013404. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12002-2_33"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Chothia, T., Guha, A.: A statistical test for information leaks using continuous mutual information. In: CSF, pp. 177\u2013190 (2011)","DOI":"10.1109\/CSF.2011.19"},{"key":"9_CR8","unstructured":"Cohen, J.: Statistical Power Analysis for the Behavioral Sciences. Routledge (1988)"},{"key":"9_CR9","unstructured":"Danger, J.-L., Duc, G., Guilley, S., Sauvage, L.: Education and open benchmarking on side-channel analysis with the DPA contests. In: NIST Non-Invasive Attack Testing Workshop (2011)"},{"issue":"2","key":"9_CR10","doi-asserted-by":"crossref","first-page":"123","DOI":"10.46586\/tches.v2018.i2.123-148","volume":"2018","author":"T De Cnudde","year":"2018","unstructured":"De Cnudde, T., Ender, M., Moradi, A.: Hardware masking, revisited. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2), 123\u2013148 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-75208-2_7","volume-title":"Smart Card Research and Advanced Applications","author":"AA Ding","year":"2018","unstructured":"Ding, A.A., Zhang, L., Durvaux, F., Standaert, F.-X., Fei, Y.: Towards sound and optimal leakage detection procedure. In: Eisenbarth, T., Teglia, Y. (eds.) CARDIS 2017. LNCS, vol. 10728, pp. 105\u2013122. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75208-2_7"},{"issue":"293","key":"9_CR12","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1080\/01621459.1961.10482090","volume":"56","author":"OJ Dunn","year":"1961","unstructured":"Dunn, O.J.: Multiple comparisons among means. J. Am. Stat. Assoc. 56(293), 52\u201364 (1961)","journal-title":"J. Am. Stat. Assoc."},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-662-49890-3_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"F Durvaux","year":"2016","unstructured":"Durvaux, F., Standaert, F.-X.: From improved leakage detection to the detection of points of interests in leakage traces. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 240\u2013262. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_10"},{"issue":"4","key":"9_CR14","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1214\/009053606000001460","volume":"35","author":"B Efron","year":"2007","unstructured":"Efron, B.: Size, power and false discovery rates. Ann. Stat. 35(4), 1351\u20131377 (2007)","journal-title":"Ann. Stat."},{"issue":"3","key":"9_CR15","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1049\/iet-ifs:20080038","volume":"2","author":"J. Ferrigno","year":"2008","unstructured":"Ferrigno, J., Hlav\u00e1c\u0306, M.: When AES blinks: introducing optical side channel. IET Inf. Secur. 2(3), 94\u201398 (2008)","journal-title":"IET Information Security"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"K Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: concrete results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251\u2013261. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_21"},{"key":"9_CR17","unstructured":"Goodwill, G., Jun, B., Jaffe, J., Rohatgi, P.: A testing methodology for side-channel resistance validation. In: NIST Non-Invasive Attack Testing Workshop (2011)"},{"issue":"1","key":"9_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1198\/000313001300339897","volume":"55","author":"JM Hoenig","year":"2001","unstructured":"Hoenig, J.M., Heisey, D.M.: The abuse of power. Am. Stat. 55(1), 19\u201324 (2001)","journal-title":"Am. Stat."},{"key":"9_CR19","first-page":"65","volume":"6","author":"S Holm","year":"1979","unstructured":"Holm, S.: A simple sequentially rejective multiple test procedure. Scand. J. Stat. 6, 65\u201370 (1979)","journal-title":"Scand. J. Stat."},{"key":"9_CR20","unstructured":"Information technology - Security techniques - Testing methods for the mitigation of non-invasive attack classes against cryptographic modules. Standard, International Organization for Standardization, Geneva, CH (2016)"},{"key":"9_CR21","unstructured":"Information technology - Security techniques - Security requirements for cryptographic modules. Standard, International Organization for Standardization, Geneva, CH (2012)"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"issue":"6","key":"9_CR24","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1093\/bioinformatics\/btl664","volume":"23","author":"P Liu","year":"2007","unstructured":"Liu, P., Hwang, J.T.G.: Quick calculation for sample size while controlling false discovery rate with application to microarray analysis. Bioinformatics 23(6), 739\u2013746 (2007)","journal-title":"Bioinformatics"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-642-42033-7_25","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"L Mather","year":"2013","unstructured":"Mather, L., Oswald, E., Bandenburg, J., W\u00f3jcik, M.: Does my device leak information? An a priori statistical power analysis of leakage detection tests. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8269, pp. 486\u2013505. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-42033-7_25"},{"issue":"2","key":"9_CR26","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/366246.366248","volume":"6","author":"JC Miller","year":"1963","unstructured":"Miller, J.C., Maloney, C.J.: Systematic mistake analysis of digital computer programs. Commun. ACM 6(2), 58\u201363 (1963)","journal-title":"Commun. ACM"},{"key":"9_CR27","first-page":"1","volume":"11","author":"KE Porter","year":"2017","unstructured":"Porter, K.E.: Statistical power in evaluations that investigate effects on multiple outcomes: A guide for researchers. J. Res. Educ. Eff. 11, 1\u201329 (2017)","journal-title":"J. Res. Educ. Eff."},{"issue":"23","key":"9_CR28","doi-asserted-by":"publisher","first-page":"4263","DOI":"10.1093\/bioinformatics\/bti699","volume":"21","author":"S Pounds","year":"2005","unstructured":"Pounds, S., Cheng, C.: Sample size determination for the false discovery rate. Bioinformatics 21(23), 4263\u20134271 (2005)","journal-title":"Bioinformatics"},{"key":"9_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Smart Card Programming and Security","author":"J-J Quisquater","year":"2001","unstructured":"Quisquater, J.-J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and counter-measures for smart cards. In: Attali, I., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200\u2013210. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45418-7_17"},{"issue":"2","key":"9_CR30","doi-asserted-by":"publisher","first-page":"597","DOI":"10.22237\/jmasm\/1257035100","volume":"8","author":"SS Sawilowsky","year":"2009","unstructured":"Sawilowsky, S.S.: New effect size rules of thumb. J. Mod. Appl. Stat. Methods 8(2), 597\u2013599 (2009)","journal-title":"J. Mod. Appl. Stat. Methods"},{"key":"9_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11545262_3","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"W Schindler","year":"2005","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_3"},{"key":"9_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-662-48324-4_25","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"T Schneider","year":"2015","unstructured":"Schneider, T., Moradi, A.: Leakage assessment methodology. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 495\u2013513. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_25"},{"key":"9_CR33","unstructured":"Shamir, A., Tromer, E.: Acoustic cryptanalysis (website). http:\/\/theory.csail.mit.edu\/~tromer\/acoustic\/. Accessed 9 Sept 2019"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Skorobogatov, S.: Using optical emission analysis for estimating contribution to power analysis. In: Breveglieri, L., Koren, I., Naccache, D., Oswald, E., Seifert, J.-P. (eds.) Fault Diagnosis and Tolerance in Cryptography - FDTC 2009, pp. 111\u2013119. IEEE Computer Society (2009)","DOI":"10.1109\/FDTC.2009.39"},{"key":"9_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-00730-9_16","volume-title":"Information Security and Cryptology \u2013 ICISC 2008","author":"F-X Standaert","year":"2009","unstructured":"Standaert, F.-X., Gierlichs, B., Verbauwhede, I.: Partition vs. comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 253\u2013267. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00730-9_16"},{"key":"9_CR36","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-14452-3_5","volume-title":"Towards Hardware-Intrinsic Security: Foundations and Practice","author":"F-X Standaert","year":"2010","unstructured":"Standaert, F.-X., Pereira, O., Yu, Y., Quisquater, J.-J., Yung, M., Oswald, E.: Leakage resilient cryptography in practice. In: Sadeghi, A.-R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security: Foundations and Practice, pp. 99\u2013134. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14452-3_5"},{"issue":"4","key":"9_CR37","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/54.936247","volume":"18","author":"S Tasiran","year":"2001","unstructured":"Tasiran, S., Keutzer, K.: Coverage metrics for functional validation of hardware designs. IEEE Des. Test 18(4), 36\u201345 (2001)","journal-title":"IEEE Des. Test"},{"key":"9_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-40349-1_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"A Thillard","year":"2013","unstructured":"Thillard, A., Prouff, E., Roche, T.: Success through confidence: Evaluating the effectiveness of a side-channel attack. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 21\u201336. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40349-1_2"},{"key":"9_CR39","doi-asserted-by":"publisher","first-page":"1960","DOI":"10.1002\/sim.3237","volume":"27","author":"T Tong","year":"2008","unstructured":"Tong, T., Zhao, H.: Practical guidelines for assessing power and false discovery rate for fixed sample size in microarray experiments. Stat. Med. 27, 1960\u20131972 (2008)","journal-title":"Stat. Med."},{"issue":"318","key":"9_CR40","first-page":"626","volume":"62","author":"Z \u0160id\u00e1k","year":"1967","unstructured":"\u0160id\u00e1k, Z.: Rectangular confidence regions for the means of multivariate normal distributions. J. Am. Stat. Assoc. 62(318), 626\u2013633 (1967)","journal-title":"J. Am. Stat. Assoc."},{"issue":"1\u20132","key":"9_CR41","first-page":"28","volume":"34","author":"BL Welch","year":"1947","unstructured":"Welch, B.L.: The generalization of \u201cStudent\u2019s\u201d problem when several different population variances are involved. Biometrika 34(1\u20132), 28\u201335 (1947)","journal-title":"Biometrika"},{"key":"9_CR42","unstructured":"Whitnall, C., Oswald, E.: A cautionary note regarding the usage of leakage detection tests in security evaluation. IACR Cryptology ePrint Archive, Report 2019\/703 (2019). https:\/\/eprint.iacr.org\/2019\/703"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34618-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:23:13Z","timestamp":1710354193000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-34618-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030346171","9783030346188"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34618-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"22 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kobe","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"IACR Web submission software","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"307","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}