{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:44:52Z","timestamp":1761061492483,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030882372"},{"type":"electronic","value":"9783030882389"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88238-9_12","type":"book-chapter","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T08:17:47Z","timestamp":1632903467000},"page":"233-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Autocorrelations of Vectorial Boolean Functions"],"prefix":"10.1007","author":[{"given":"Anne","family":"Canteaut","sequence":"first","affiliation":[]},{"given":"Lukas","family":"K\u00f6lsch","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunlei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kangquan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Longjiang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Friedrich","family":"Wiemer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Bar-On, A., Dunkelman, O., Keller, N., Weizman, A.: DLCT: A New Tool for Differential-linear Cryptanalysis, pp. 313\u2013342, Springer, Cham (2019)","key":"12_CR1","DOI":"10.1007\/978-3-030-17653-2_11"},{"doi-asserted-by":"crossref","unstructured":"Bending, T.D., Fon-Der-Flaass, D.: Crooked functions, bent functions, and distance regular graphs. Electr. J. Combinat. 5 (1998)","key":"12_CR2","DOI":"10.37236\/1372"},{"issue":"9","key":"12_CR3","doi-asserted-by":"publisher","first-page":"4160","DOI":"10.1109\/TIT.2006.880036","volume":"52","author":"TP Berger","year":"2006","unstructured":"Berger, T.P., Canteaut, A., Charpin, P., Laigle-Chapuy, Y.: On almost perfect nonlinear functions over $$\\mathbb{F}_2^n$$. IEEE Trans. Inf. Theory 52(9), 4160\u20134170 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-642-40349-1_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"B Bilgin","year":"2013","unstructured":"Bilgin, B., Bogdanov, A., Kne\u017eevi\u0107, M., Mendel, F., Wang, Q.: Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 142\u2013158. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40349-1_9"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/BFb0053450","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"F Chabaud","year":"1995","unstructured":"Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356\u2013365. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/BFb0053450"},{"doi-asserted-by":"crossref","unstructured":"Boura, C., Canteaut, A.: On the boomerang uniformity of cryptographic sboxes. 2018(3), 290\u2013310 (2018)","key":"12_CR6","DOI":"10.46586\/tosc.v2018.i3.290-310"},{"issue":"4","key":"12_CR7","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.ffa.2010.03.001","volume":"16","author":"C Bracken","year":"2010","unstructured":"Bracken, C., Leander, G.: A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree. Finite Fields Their Appl. 16(4), 231\u2013242 (2010)","journal-title":"Finite Fields Their Appl."},{"doi-asserted-by":"crossref","unstructured":"Budaghyan, L.: Construction and Analysis of Cryptographic Functions. Springer-Verlag, New York (2014)","key":"12_CR8","DOI":"10.1007\/978-3-319-12991-4"},{"issue":"3","key":"12_CR9","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1109\/TIT.2005.864481","volume":"52","author":"L Budaghyan","year":"2006","unstructured":"Budaghyan, L., Carlet, C., Pott, A.: New classes of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inf. Theory 52(3), 1141\u20131152 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"12_CR10","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TIT.2003.814476","volume":"49","author":"A Canteaut","year":"2003","unstructured":"Canteaut, A., Charpin, P.: Decomposing bent functions. IEEE Trans. Inf. Theory 49(8), 2004\u20132019 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"12_CR11","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ffa.2007.02.004","volume":"14","author":"A Canteaut","year":"2008","unstructured":"Canteaut, A., Charpin, P., Kyureghyan, G.M.: A new class of monomial bent functions. Finite Fields Their Appl. 14(1), 221\u2013241 (2008)","journal-title":"Finite Fields Their Appl."},{"doi-asserted-by":"crossref","unstructured":"Canteaut, A., et al.: Autocorrelations of vectorial boolean functions. Cryptol. ePrint Arch. Rep. 2021\/947 (2021). https:\/\/ia.cr\/2021\/947","key":"12_CR12","DOI":"10.1007\/978-3-030-88238-9_12"},{"issue":"3","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1262","DOI":"10.1109\/TIT.2007.915704","volume":"54","author":"C Carlet","year":"2008","unstructured":"Carlet, C.: Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications. IEEE Trans. Inf. Theory 54(3), 1262\u20131272 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean functions for cryptography and error-correcting codes. In: Crama, Y., Hammer, P.L. (eds) Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pp. 257\u2013397. Cambridge University Press, Cambridge (2010)","key":"12_CR14","DOI":"10.1017\/CBO9780511780448.011"},{"issue":"2","key":"12_CR15","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Cryptograph. 15(2), 125\u2013156 (1998)","journal-title":"Des. Codes Cryptograph."},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/BFb0053450","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"F Chabaud","year":"1995","unstructured":"Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 356\u2013365. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/BFb0053450"},{"issue":"2","key":"12_CR17","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.ffa.2005.08.007","volume":"13","author":"P Charpin","year":"2007","unstructured":"Charpin, P., Helleseth, T., Zinoviev, V.: Propagation characteristics of $$x^{-1}\\mapsto x$$ and Kloosterman sums. Finite Fields Their Appl. 13(2), 366\u2013381 (2007)","journal-title":"Finite Fields Their Appl."},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/978-3-319-78375-8_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"C Cid","year":"2018","unstructured":"Cid, C., Huang, T., Peyrin, T., Sasaki, Yu., Song, L.: Boomerang connectivity table: a new cryptanalysis tool. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 683\u2013714. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_22"},{"issue":"1\u20133","key":"12_CR19","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1023\/A:1026435428030","volume":"17","author":"JF Dillon","year":"1999","unstructured":"Dillon, J.F.: Multiplicative difference sets via additive characters. Des. Codes Cryptogr. 17(1\u20133), 225\u2013235 (1999)","journal-title":"Des. Codes Cryptogr."},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-60590-8_5","volume-title":"Fast Software Encryption","author":"H Dobbertin","year":"1995","unstructured":"Dobbertin, H.: Construction of bent functions and balanced Boolean functions with high nonlinearity. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 61\u201374. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60590-8_5"},{"issue":"14","key":"12_CR21","doi-asserted-by":"publisher","first-page":"1540","DOI":"10.1016\/j.disc.2005.06.033","volume":"306","author":"S Gangopadhyay","year":"2006","unstructured":"Gangopadhyay, S., Keskar, P.H., Maitra, S.: Patterson-Wiedemann construction revisited. Discrete Math. 306(14), 1540\u20131556 (2006)","journal-title":"Discrete Math."},{"doi-asserted-by":"crossref","unstructured":"Gong, G., Khoo, K.: Additive autocorrelation of resilient Boolean functions, pp. 275\u2013290 (2004)","key":"12_CR22","DOI":"10.1007\/978-3-540-24654-1_20"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.dam.2015.07.044","volume":"202","author":"S Kavut","year":"2016","unstructured":"Kavut, S.: Correction to the paper: Patterson-Wiedemann construction revisited. Discrete Appl. Math. 202, 185\u2013187 (2016)","journal-title":"Discrete Appl. Math."},{"issue":"2\u20133","key":"12_CR24","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10623-018-0522-1","volume":"87","author":"S Kavut","year":"2019","unstructured":"Kavut, S., Maitra, S., Tang, D.: Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile. Des. Codes Cryptogr. 87(2\u20133), 261\u2013276 (2019)","journal-title":"Des. Codes Cryptogr."},{"issue":"5","key":"12_CR25","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1109\/TIT.2007.894696","volume":"53","author":"S Kavut","year":"2007","unstructured":"Kavut, S., Maitra, S., Y\u00fccel, M.D.: Search for Boolean functions with excellent profiles in the rotation symmetric class. IEEE Trans. Inf. Theory 53(5), 1743\u20131751 (2007)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-48658-5_3","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201994","author":"SK Langford","year":"1994","unstructured":"Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 17\u201325. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48658-5_3"},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-540-73074-3_13","volume-title":"Arithmetic of Finite Fields","author":"G Leander","year":"2007","unstructured":"Leander, G., Poschmann, A.: On the classification of 4 Bit S-Boxes. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp. 159\u2013176. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73074-3_13"},{"issue":"11","key":"12_CR28","doi-asserted-by":"publisher","first-page":"7542","DOI":"10.1109\/TIT.2019.2918531","volume":"65","author":"K Li","year":"2019","unstructured":"Li, K., Longjiang, Q., Sun, B., Li, C.: New results about the boomerang uniformity of permutation polynomials. IEEE Trans. Inf. Theory 65(11), 7542\u20137553 (2019)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"12_CR29","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/18.971756","volume":"48","author":"S Maitra","year":"2002","unstructured":"Maitra, S., Sarkar, P.: Modifications of Patterson-Wiedemann functions for cryptographic applications. IEEE Trans. Inf. Theor 48(1), 278\u2013284 (2002)","journal-title":"IEEE Trans. Inf. Theor"},{"doi-asserted-by":"crossref","unstructured":"Massey, J.L.: SAFER K-64: A Byte-oriented Block-ciphering Algorithm, pp. 1\u201317. Springer (1994)","key":"12_CR30","DOI":"10.1007\/3-540-58108-1_1"},{"issue":"1\u20133","key":"12_CR31","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/0012-365X(72)90032-5","volume":"3","author":"RJ McEliece","year":"1972","unstructured":"McEliece, R.J.: Weight congruences for $$p$$-ary cyclic codes. Discrete Math. 3(1\u20133), 177\u2013192 (1972)","journal-title":"Discrete Math."},{"doi-asserted-by":"publisher","unstructured":"Mesnager, S.: Bent Functions: Fundamentals and Results. Springer International Publishing (2016). https:\/\/doi.org\/10.1007\/978-3-319-32595-8","key":"12_CR32","DOI":"10.1007\/978-3-319-32595-8"},{"unstructured":"Mesnager, S., Tang, C., Xiong, M.: On the boomerang uniformity of quadratic permutations. Cryptology ePrint Achieves Report 2019\/277 (2019). https:\/\/eprint.iacr.org\/2019\/277","key":"12_CR33"},{"key":"12_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201993","author":"K Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55\u201364. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48285-7_6"},{"key":"12_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/3-540-60590-8_9","volume-title":"Fast Software Encryption","author":"K Nyberg","year":"1995","unstructured":"Nyberg, K.: S-boxes and round functions with controllable linearity and differential uniformity. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 111\u2013130. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-60590-8_9"},{"unstructured":"Nyberg, K.: Reverse-engineering hidden assumptions in differential-linear attacks (2015). https:\/\/www.cryptolux.org\/mediawiki-esc2015\/images\/8\/82\/Nyberg_rev.pdf","key":"12_CR36"},{"unstructured":"Nyberg, K.: The extended autocorrelation and boomerang tables and links between nonlinearity properties of vectorial boolean functions. Cryptology ePrint Archieves Report 2019\/1381 (2019) https:\/\/eprint.iacr.org\/2019\/1381","key":"12_CR37"},{"doi-asserted-by":"crossref","unstructured":"Rothaus, O.S.: On \u201cbent\u201d functions. J. Combinat. Theory Ser. A 20(3), 300\u2013305 (1976)","key":"12_CR38","DOI":"10.1016\/0097-3165(76)90024-8"},{"key":"12_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/3-540-45473-X_26","volume-title":"Fast Software Encryption","author":"T Shimoyama","year":"2002","unstructured":"Shimoyama, T., et al.: The block cipher SC2000. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 312\u2013327. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45473-X_26"},{"doi-asserted-by":"crossref","unstructured":"Song, L., Qin, X., Lei, H.: Boomerang connectivity table revisited. IACR Trans. Symmet. Cryptol. 2019(1), 118\u2013141 (2019)","key":"12_CR40","DOI":"10.46586\/tosc.v2019.i1.118-141"},{"issue":"1","key":"12_CR41","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s00200-010-0136-y","volume":"22","author":"G Sun","year":"2009","unstructured":"Sun, G., Chuankun, W.: The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity. Appl. Algebra Eng. Commun. Comput. 22(1), 37\u201345 (2009)","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"doi-asserted-by":"crossref","unstructured":"Tang, D., Maitra, S.: Construction of $$n$$-variable ($$n \\equiv 2$$ mod $$4$$) balanced boolean functions with maximum absolute value in autocorrelation spectra $$< 2^{n\/2}$$. IEEE Trans. Inf. Theory 64(1):393\u2013402 (2018)","key":"12_CR42","DOI":"10.1109\/TIT.2017.2769092"},{"doi-asserted-by":"crossref","unstructured":"Tokareva, N.: Bent Functions: Results and Applications to Cryptography. Academic Press, London (2015)","key":"12_CR43","DOI":"10.1016\/B978-0-12-802318-1.00002-9"},{"doi-asserted-by":"publisher","unstructured":"Zhang, X.M., Zheng, Y.: GAC the criterion for global avalanche characteristics of cryptographic functions. In: Maurer, H., Calude, C., Salomaa, A. (eds.) J.UCS The Journal of Universal Computer Science, pp. 320\u2013337. Springer, Berlin (1996). https:\/\/doi.org\/10.1007\/978-3-642-80350-5_30","key":"12_CR44","DOI":"10.1007\/978-3-642-80350-5_30"},{"issue":"1","key":"12_CR45","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/A:1008359713877","volume":"19","author":"X-M Zhang","year":"2000","unstructured":"Zhang, X.-M., Zheng, Y., Imai, H.: Relating differential distribution tables to other properties of of substitution boxes. Des. Codes Cryptogr. 19(1), 45\u201363 (2000)","journal-title":"Des. Codes Cryptogr."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88238-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:14:54Z","timestamp":1710267294000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88238-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030882372","9783030882389"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88238-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LATINCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Information Security in Latin America","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bogot\u00e1","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"latincrypt2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/urosario.edu.co\/Latin-Crypt\/inicio\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"websubrev","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference took place virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}