{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T12:32:51Z","timestamp":1770985971655,"version":"3.50.1"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030882372","type":"print"},{"value":"9783030882389","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88238-9_6","type":"book-chapter","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T08:17:47Z","timestamp":1632903467000},"page":"108-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in\u00a0PQC Candidates"],"prefix":"10.1007","author":[{"given":"Mojtaba","family":"Bisheh-Niasar","sequence":"first","affiliation":[]},{"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[]},{"given":"Mehran","family":"Mozaffari-Kermani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"key":"6_CR1","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20\u201322 November 1994, pp. 124\u2013134 (1994)"},{"key":"6_CR2","unstructured":"Avanzi, R., et al.: CRYSTALS-Kyber: algorithm specification and supporting documentation (version 3.0). Submission to the NIST post-quantum cryptography standardization project (2020)"},{"issue":"3","key":"6_CR3","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s10623-014-9938-4","volume":"75","author":"A Langlois","year":"2015","unstructured":"Langlois, A., Stehl\u00e9, D.: Worst-case to average-case reductions for module lattices. Des. Codes Cryptogr. 75(3), 565\u2013599 (2015)","journal-title":"Des. Codes Cryptogr."},{"key":"6_CR4","unstructured":"NIST: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process. National Institute of Standards and Technology (2016)"},{"issue":"4","key":"6_CR5","doi-asserted-by":"publisher","first-page":"17","DOI":"10.46586\/tches.v2019.i4.17-61","volume":"2019","author":"U Banerjee","year":"2019","unstructured":"Banerjee, U., Ukyab, T.S., Chandrakasan, A.P.: Sapphire: a configurable crypto-processor for post-quantum lattice-based protocols. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4), 17\u201361 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"4","key":"6_CR6","doi-asserted-by":"publisher","first-page":"239","DOI":"10.46586\/tches.v2020.i4.239-280","volume":"2020","author":"T Fritzmann","year":"2020","unstructured":"Fritzmann, T., Sigl, G., Sep\u00falveda, J.: RISQ-V: tightly coupled RISC-V accelerators for post-quantum cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 239\u2013280 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"3","key":"6_CR7","doi-asserted-by":"publisher","first-page":"219","DOI":"10.46586\/tches.v2020.i3.219-242","volume":"2020","author":"E Alkim","year":"2020","unstructured":"Alkim, E., Evkan, H., Lahr, N., Niederhagen, R., Petri, R.: ISA extensions for finite field arithmetic accelerating Kyber and NewHope on RISC-V. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 219\u2013242 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Bisheh Niasar, M., Elkhatib, R., Azarderakhsh, R., Mozaffari Kermani, M.: Fast, small, and area-time efficient architectures for key-exchange on Curve25519. In: 27th IEEE Symposium on Computer Arithmetic, ARITH 2020, Portland, OR, USA, 7\u201310 June 2020, pp. 72\u201379 (2020)","DOI":"10.1109\/ARITH48897.2020.00019"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-030-65277-7_10","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2020","author":"M Bisheh Niasar","year":"2020","unstructured":"Bisheh Niasar, M., Azarderakhsh, R., Kermani, M.M.: Efficient hardware implementations for elliptic curve cryptography over curve448. In: Bhargavan, K., Oswald, E., Prabhakaran, M. (eds.) INDOCRYPT 2020. LNCS, vol. 12578, pp. 228\u2013247. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65277-7_10"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., Mozaffari-Kermani, M.: Cryptographic accelerators for digital signature based on Ed25519. IEEE Trans. Very Large Scale Integr. Syst. 29(7), 1297\u20131305 (2021)","DOI":"10.1109\/TVLSI.2021.3077885"},{"key":"6_CR11","unstructured":"Basu, K., Soni, D., Nabeel, M., Karri, R.: NIST post-quantum cryptography-a hardware evaluation study. IACR Cryptol. ePrint Arch. 2019, 47 (2019)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Banerjee, U., Ukyab, T.S., Chandrakasan, A.P.: Sapphire: a configurable crypto-processor for post-quantum lattice-based protocols (extended version). IACR Cryptol. ePrint Arch. 2019, 1140 (2019)","DOI":"10.46586\/tches.v2019.i4.17-61"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Xin, G., et al.: VPQC: a domain-specific vector processor for post-quantum cryptography based on RISC-V architecture. IEEE Trans. Circuits Syst. I Regul. Pap. 67-I(8), 2672\u20132684 (2020)","DOI":"10.1109\/TCSI.2020.2983185"},{"key":"6_CR14","unstructured":"Dang, V.B., Farahmand, F., Andrzejczak, M., Mohajerani, K., Nguyen, D.T., Gaj, K.: Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software\/hardware co-design approaches. IACR Cryptol. ePrint Arch. 2020, 795 (2020)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Huang, Y., Huang, M., Lei, Z., Wu, J.: A pure hardware implementation of CRYSTALS-Kyber PQC algorithm through resource reuse. IEICE Electronics Express advpub (2020)","DOI":"10.1587\/elex.17.20200234"},{"issue":"2","key":"6_CR16","doi-asserted-by":"publisher","first-page":"328","DOI":"10.46586\/tches.v2021.i2.328-356","volume":"2021","author":"Y Xing","year":"2021","unstructured":"Xing, Y., Li, S.: A compact hardware implementation of CCA-secure key exchange mechanism CRYSTALS-KYBER on FPGA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2), 328\u2013356 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., Mozaffari-Kermani, M.: High-speed NTT-based polynomial multiplication accelerator for CRYSTALS-Kyber post-quantum cryptography. IACR Cryptol. ePrint Arch. 2021, 563 (2021)","DOI":"10.1109\/ARITH51176.2021.00028"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Chen, Z., Ma, Y., Chen, T., Lin, J., Jing, J.: Towards efficient Kyber on FPGAs: a processor for vector of polynomials. In: 25th Asia and South Pacific Design Automation Conference, ASP-DAC 2020, Beijing, China, 13\u201316 January 2020, pp. 247\u2013252 (2020)","DOI":"10.1109\/ASP-DAC47756.2020.9045459"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Karabulut, E., Aysu, A.: RANTT: A RISC-V architecture extension for the number theoretic transform. In: 2020 30th International Conference on Field-Programmable Logic and Applications (FPL), pp. 26\u201332 (2020)","DOI":"10.1109\/FPL50879.2020.00016"},{"key":"6_CR20","unstructured":"Mert, A.C., Karabulut, E., \u00d6zt\u00fcrk, E., Savas, E., Aysu, A.: An extensive study of flexible design methods for the number theoretic transform. IEEE Trans. Comput., 1\u20131 (2020)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Fritzmann, T., Sep\u00falveda, J.: Efficient and flexible low-power NTT for lattice-based cryptography. In: IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2019, McLean, VA, USA, 5\u201310 May 2019, pp. 141\u2013150 (2019)","DOI":"10.1109\/HST.2019.8741027"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-030-23696-0_11","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2019","author":"L Botros","year":"2019","unstructured":"Botros, L., Kannwischer, M.J., Schwabe, P.: Memory-efficient high-speed implementation of kyber on cortex-M4. In: Buchmann, J., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2019. LNCS, vol. 11627, pp. 209\u2013228. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23696-0_11"},{"issue":"3","key":"6_CR23","doi-asserted-by":"publisher","first-page":"336","DOI":"10.46586\/tches.v2020.i3.336-357","volume":"2020","author":"E Alkim","year":"2020","unstructured":"Alkim, E., Bilgin, Y.A., Cenk, M., G\u00e9rard, F.: Cortex-m4 optimizations for R, M LWE schemes. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 336\u2013357 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"6_CR24","unstructured":"Kannwischer, M.J., Rijneveld, J., Schwabe, P., Stoffelen, K.: PQM4: post-quantum crypto library for the ARM Cortex-M4 (2018)"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Xing, Y., Li, S.: An efficient implementation of the NewHope key exchange on FPGAs. IEEE Trans. Circuits Syst. I Regul. Pap. 67-I(3), 866\u2013878 (2020)","DOI":"10.1109\/TCSI.2019.2956651"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Bos, J.W., et al.: CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, 24\u201326 April 2018, pp. 353\u2013367 (2018)","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"E Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537\u2013554. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_34"},{"key":"6_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-33481-8_8","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"T P\u00f6ppelmann","year":"2012","unstructured":"P\u00f6ppelmann, T., G\u00fcneysu, T.: Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware. In: Hevia, A., Neven, G. (eds.) LATINCRYPT 2012. LNCS, vol. 7533, pp. 139\u2013158. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33481-8_8"},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-662-44709-3_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"SS Roy","year":"2014","unstructured":"Roy, S.S., Vercauteren, F., Mentens, N., Chen, D.D., Verbauwhede, I.: Compact ring-LWE cryptoprocessor. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 371\u2013391. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3_21"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, N., Yang, B., Chen, C., Yin, S., Wei, S., Liu, L.: Highly efficient architecture of NewHope-NIST on FPGA using low-complexity NTT\/INTT. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2), 49\u201372 (2020)","DOI":"10.46586\/tches.v2020.i2.49-72"},{"key":"6_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-319-48965-0_8","volume-title":"Cryptology and Network Security","author":"P Longa","year":"2016","unstructured":"Longa, P., Naehrig, M.: Speeding up the number theoretic transform for faster ideal lattice-based cryptography. In: Foresti, S., Persiano, G. (eds.) CANS 2016. LNCS, vol. 10052, pp. 124\u2013139. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48965-0_8"},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"J Cooley","year":"1965","unstructured":"Cooley, J., Tukey, J.W.: An algorithm for the machine calculation of complex Fourier series. Math. Comput. 19, 297\u2013301 (1965)","journal-title":"Math. Comput."},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Gentleman, W.M., Sande, G.: Fast Fourier transforms: for fun and profit. In: American Federation of Information Processing Societies: Proceedings of the AFIPS 1966 Fall Joint Computer Conference, San Francisco, California, USA, 7\u201310 November 1966, pp. 563\u2013578 (1966)","DOI":"10.1145\/1464291.1464352"},{"key":"6_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-319-22174-8_19","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2015","author":"T P\u00f6ppelmann","year":"2015","unstructured":"P\u00f6ppelmann, T., Oder, T., G\u00fcneysu, T.: High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers. In: Lauter, K., Rodr\u00edguez-Henr\u00edquez, F. (eds.) LATINCRYPT 2015. LNCS, vol. 9230, pp. 346\u2013365. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22174-8_19"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Du, C., Bai, G.: Towards efficient polynomial multiplication for lattice-based cryptography. In: IEEE International Symposium on Circuits and Systems, ISCAS 2016, Montr\u00e9al, QC, Canada, 22\u201325 May 2016, pp. 1178\u20131181 (2016)","DOI":"10.1109\/ISCAS.2016.7527456"},{"key":"6_CR36","unstructured":"Bertoni, G., Daemen, J., Hoffert, S., Peeters, M., Assche, G.V.: Keccak in VHDL (2020)"},{"key":"6_CR37","unstructured":"Kuo, P.C., et al.: High performance post-quantum key exchange on FPGAs. IACR Cryptology ePrint Archive, 690 (2017)"},{"key":"6_CR38","unstructured":"Synopsys. http:\/\/Synopsys.com"},{"key":"6_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-642-28368-0_20","volume-title":"Cryptography and Security: From Theory to Applications","author":"V van der Leest","year":"2012","unstructured":"van der Leest, V., van der Sluis, E., Schrijen, G.-J., Tuyls, P., Handschuh, H.: Efficient implementation of true random number generator based on SRAM PUFs. In: Naccache, D. (ed.) Cryptography and Security: From Theory to Applications. LNCS, vol. 6805, pp. 300\u2013318. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28368-0_20"},{"key":"6_CR40","doi-asserted-by":"publisher","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., Mozaffari-Kermani, M.: Area-time efficient hardware architecture for signature based on Ed448. IEEE Trans. Circ. Syst. II Express Briefs, 68(8), 2942\u20132946 (2021). https:\/\/doi.org\/10.1109\/TCSII.2021.3068136","DOI":"10.1109\/TCSII.2021.3068136"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Anastasova, M., Azarderakhsh, R., Mozaffari Kermani, M.: Fast strategies for the implementation of SIKE round 3 on ARM Cortex-M4. IACR Cryptol. ePrint Arch. 2021, 115 (2021)","DOI":"10.1007\/978-3-030-90022-9_24"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Seo, H., Anastasova, M., Jalali, A., Azarderakhsh, R.: Supersingular isogeny key encapsulation (SIKE) round 2 on ARM Cortex-M4. IACR Cryptol. ePrint Arch. 2020, 410 (2020)","DOI":"10.1109\/TC.2020.3023045"},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Elkhatib, R., Azarderakhsh, R., Mozaffari Kermani, M.: Highly optimized montgomery multiplier for SIKE primes on FPGA. In: 27th IEEE Symposium on Computer Arithmetic, ARITH 2020, Portland, OR, USA, 7\u201310 June 2020, pp. 64\u201371 (2020)","DOI":"10.1109\/ARITH48897.2020.00018"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Howe, J., Martinoli, M., Oswald, E., Regazzoni, F.: Exploring parallelism to improve the performance of frodokem in hardware. Cryptology ePrint Archive, Report 2021\/155 (2021)","DOI":"10.1007\/s13389-021-00258-7"},{"key":"6_CR45","unstructured":"Zhu, Y., et al.: A high-performance hardware implementation of saber based on Karatsuba algorithm. IACR Cryptol. ePrint Arch. 2020, 1037 (2020)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88238-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:14:16Z","timestamp":1710267256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88238-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030882372","9783030882389"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88238-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LATINCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Information Security in Latin America","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bogot\u00e1","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"latincrypt2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/urosario.edu.co\/Latin-Crypt\/inicio\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"websubrev","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference took place virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}