{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:48:57Z","timestamp":1770886137393,"version":"3.50.1"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031229114","type":"print"},{"value":"9783031229121","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22912-1_23","type":"book-chapter","created":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T15:38:49Z","timestamp":1672501129000},"page":"517-540","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Improved Quantum Analysis of\u00a0SPECK and\u00a0LowMC"],"prefix":"10.1007","author":[{"given":"Kyungbae","family":"Jang","sequence":"first","affiliation":[]},{"given":"Anubhab","family":"Baksi","sequence":"additional","affiliation":[]},{"given":"Hyunji","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hwajeong","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,1]]},"reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-662-46800-5_17","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"MR Albrecht","year":"2015","unstructured":"Albrecht, M.R., Rechberger, C., Schneider, T., Tiessen, T., Zohner, M.: Ciphers for MPC and FHE. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 430\u2013454. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_17"},{"issue":"5","key":"23_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1864-3","volume":"17","author":"M Almazrooie","year":"2018","unstructured":"Almazrooie, M., Samsudin, A., Abdullah, R., Mutter, K.N.: Quantum reversible circuit of AES-128. Quant. Inf. Process. 17(5), 1\u201330 (2018). https:\/\/doi.org\/10.1007\/s11128-018-1864-3","journal-title":"Quant. Inf. Process."},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-319-69453-5_18","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"M Amy","year":"2017","unstructured":"Amy, M., Di Matteo, O., Gheorghiu, V., Mosca, M., Parent, A., Schanck, J.: Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 317\u2013337. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_18"},{"key":"23_CR4","doi-asserted-by":"publisher","unstructured":"Amy, M., Maslov, D., Mosca, M., Roetteler, M., Roetteler, M.: A meet-in-the-middle algorithm for fast synthesis of depth-optimal quantum circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 32(6), 818\u2013830 (2013). https:\/\/doi.org\/10.1109\/tcad.2013.2244643","DOI":"10.1109\/tcad.2013.2244643"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-030-92518-5_9","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2021","author":"R Anand","year":"2021","unstructured":"Anand, R., Maitra, A., Maitra, S., Mukherjee, C.S., Mukhopadhyay, S.: Quantum resource estimation for\u00a0FSR based symmetric ciphers and\u00a0related Grover\u2019s attacks. In: Adhikari, A., K\u00fcsters, R., Preneel, B. (eds.) INDOCRYPT 2021. LNCS, vol. 13143, pp. 179\u2013198. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92518-5_9"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-030-65277-7_18","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2020","author":"R Anand","year":"2020","unstructured":"Anand, R., Maitra, A., Mukhopadhyay, S.: Evaluation of quantum cryptanalysis on SPECK. In: Bhargavan, K., Oswald, E., Prabhakaran, M. (eds.) INDOCRYPT 2020. LNCS, vol. 12578, pp. 395\u2013413. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65277-7_18"},{"issue":"9","key":"23_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02844-w","volume":"19","author":"R Anand","year":"2020","unstructured":"Anand, R., Maitra, A., Mukhopadhyay, S.: Grover on $$SIMON$$. Quant. Inf. Process. 19(9), 1\u201317 (2020). https:\/\/doi.org\/10.1007\/s11128-020-02844-w","journal-title":"Quant. Inf. Process."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Baksi, A., Bhattacharjee, A., Breier, J., Isobe, T., Nandi, M.: Big brother is watching you: a closer look at backdoor construction. Cryptology ePrint Archive, Paper 2022\/953 (2022). https:\/\/eprint.iacr.org\/2022\/953","DOI":"10.1007\/978-3-031-22829-2_5"},{"issue":"12","key":"23_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03307-6","volume":"20","author":"A Baksi","year":"2021","unstructured":"Baksi, A., Jang, K., Song, G., Seo, H., Xiang, Z.: Quantum implementation and resource estimates for Rectangle and Knot. Quant. Inf. Process. 20(12), 1\u201324 (2021). https:\/\/doi.org\/10.1007\/s11128-021-03307-6","journal-title":"Quant. Inf. Process."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Banegas, G., Bernstein, D.J., Van Hoof, I., Lange, T.: Concrete quantum cryptanalysis of binary elliptic curves. Cryptology ePrint Archive (2020)","DOI":"10.46586\/tches.v2021.i1.451-472"},{"issue":"12","key":"23_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03322-7","volume":"20","author":"B Bathe","year":"2021","unstructured":"Bathe, B., Anand, R., Dutta, S.: Evaluation of Grover\u2019s algorithm toward quantum cryptanalysis on ChaCha. Quant. Inf. Process. 20(12), 1\u201319 (2021). https:\/\/doi.org\/10.1007\/s11128-021-03322-7","journal-title":"Quant. Inf. Process."},{"key":"23_CR12","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013\/404 (2013). https:\/\/eprint.iacr.org\/2013\/404"},{"key":"23_CR13","unstructured":"Bijwe, S., Chauhan, A.K., Sanadhya, S.K.: Quantum search for lightweight block ciphers: gift, skinny, saturnin. Cryptology ePrint Archive, Paper 2020\/1485 (2020). https:\/\/eprint.iacr.org\/2020\/1485"},{"key":"23_CR14","doi-asserted-by":"publisher","unstructured":"Boyer, M., Brassard, G., H\u00f8yer, P., Tapp, A.: Tight bounds on quantum searching. Fortschritte der Physik 46(4\u20135), 493\u2013505 (1998). https:\/\/doi.org\/10.1002\/(SICI)1521-3978(199806)46:4\/5<493::AID-PROP493>3.0.CO;2-P","DOI":"10.1002\/(SICI)1521-3978(199806)46:4\/5<493::AID-PROP493>3.0.CO;2-P"},{"key":"23_CR15","unstructured":"Cuccaro, S., Draper, T., Kutin, S., Moulton, D.: A new quantum ripple-carry addition circuit. arXiv (2008). https:\/\/arxiv.org\/pdf\/quant-ph\/0410184.pdf"},{"key":"23_CR16","unstructured":"Gidney, C.: Factoring with n+2 clean qubits and n-1 dirty qubits. arXiv preprint arXiv:1706.07884 (2017)"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-29360-8_3","volume-title":"Post-Quantum Cryptography","author":"M Grassl","year":"2016","unstructured":"Grassl, M., Langenberg, B., Roetteler, M., Steinwandt, R.: Applying Grover\u2019s algorithm to AES: quantum resource estimates. In: Takagi, T. (ed.) PQCrypto 2016. LNCS, vol. 9606, pp. 29\u201343. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29360-8_3"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212\u2013219 (1996)","DOI":"10.1145\/237814.237866"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-3-030-44223-1_23","volume-title":"Post-Quantum Cryptography","author":"T H\u00e4ner","year":"2020","unstructured":"H\u00e4ner, T., Jaques, S., Naehrig, M., Roetteler, M., Soeken, M.: Improved quantum circuits for elliptic curve discrete logarithms. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 425\u2013444. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_23"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"H\u00e4ner, T., Roetteler, M., Svore, K.M.: Factoring using 2n+ 2 qubits with toffoli based modular multiplication. arXiv preprint arXiv:1611.07995 (2016)","DOI":"10.26421\/QIC17.7-8-7"},{"issue":"7","key":"23_CR21","doi-asserted-by":"publisher","first-page":"2350","DOI":"10.1007\/s10773-017-3389-4","volume":"56","author":"Y He","year":"2017","unstructured":"He, Y., Luo, M.X., Zhang, E., Wang, H.K., Wang, X.F.: Decompositions of n-qubit toffoli gates with linear circuit complexity. Int. J. Theor. Phys. 56(7), 2350\u20132361 (2017)","journal-title":"Int. J. Theor. Phys."},{"key":"23_CR22","unstructured":"Huang, Z., Sun, S.: Synthesizing quantum circuits of AES with lower t-depth and less qubits. Cryptology ePrint Archive, Report 2022\/620 (2022). https:\/\/eprint.iacr.org\/2022\/620"},{"key":"23_CR23","doi-asserted-by":"publisher","unstructured":"Jang, K., Choi, S., Kwon, H., Kim, H., Park, J., Seo, H.: Grover on Korean block ciphers. Appl. Sci. 10(18) (2020). https:\/\/doi.org\/10.3390\/app10186407","DOI":"10.3390\/app10186407"},{"key":"23_CR24","unstructured":"Jang, K., Baksi, A., Breier, J., Seo, H., Chattopadhyay, A.: Quantum implementation and analysis of default. Cryptology ePrint Archive, Paper 2022\/647 (2022). https:\/\/eprint.iacr.org\/2022\/647"},{"key":"23_CR25","unstructured":"Jang, K., Baksi, A., Kim, H., Seo, H., Chattopadhyay, A.: Improved quantum analysis of speck and LOWMC (full version). Cryptology ePrint Archive, Paper 2022\/1427 (2022). https:\/\/eprint.iacr.org\/2022\/1427"},{"key":"23_CR26","unstructured":"Jang, K., Baksi, A., Kim, H., Song, G., Seo, H., Chattopadhyay, A.: Quantum analysis of AES. Cryptology ePrint Archive, Paper 2022\/683 (2022). https:\/\/eprint.iacr.org\/2022\/683"},{"key":"23_CR27","unstructured":"Jang, K., Choi, S., Kwon, H., Seo, H.: Grover on SPECK: quantum resource estimates. Cryptology ePrint Archive, Report 2020\/640 (2020). https:\/\/eprint.iacr.org\/2020\/640"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Jang, K., Song, G., Kim, H., Kwon, H., Kim, H., Seo, H.: Efficient implementation of PRESENT and GIFT on quantum computers. Appl. Sci. 11(11) (2021). https:\/\/www.mdpi.com\/2076-3417\/11\/11\/4776","DOI":"10.3390\/app11114776"},{"key":"23_CR29","unstructured":"Jang, K., Song, G., Kim, H., Kwon, H., Kim, H., Seo, H.: Parallel quantum addition for Korean block cipher. IACR Cryptology ePrint Archive, p. 1507 (2021). https:\/\/eprint.iacr.org\/2021\/1507"},{"issue":"10","key":"23_CR30","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.3390\/electronics10101194","volume":"10","author":"K Jang","year":"2021","unstructured":"Jang, K., et al.: Grover on PIPO. Electronics 10(10), 1194 (2021)","journal-title":"Electronics"},{"key":"23_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-030-45724-2_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2020","author":"S Jaques","year":"2020","unstructured":"Jaques, S., Naehrig, M., Roetteler, M., Virdia, F.: Implementing Grover oracles for quantum key search on AES and LowMC. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020. LNCS, vol. 12106, pp. 280\u2013310. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45724-2_10"},{"key":"23_CR32","doi-asserted-by":"publisher","unstructured":"Langenberg, B., Pham, H., Steinwandt, R.: Reducing the cost of implementing the advanced encryption standard as a quantum circuit. IEEE Trans. Quant. Eng. 1, 1\u201312 (2020). https:\/\/doi.org\/10.1109\/TQE.2020.2965697","DOI":"10.1109\/TQE.2020.2965697"},{"key":"23_CR33","unstructured":"NIST.: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process (2016). https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/call-for-proposals-final-dec-2016.pdf"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Putranto, D.S.C., Wardhani, R.W., Larasati, H.T., Kim, H.: Another concrete quantum cryptanalysis of binary elliptic curves. Cryptology ePrint Archive (2022)","DOI":"10.1109\/ACCESS.2023.3273601"},{"key":"23_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TQE.2022.3140376","volume":"3","author":"M Rahman","year":"2022","unstructured":"Rahman, M., Paul, G.: Grover on katan: quantum resource estimation. IEEE Trans. Quant. Eng. 3, 1\u20139 (2022)","journal-title":"IEEE Trans. Quant. Eng."},{"issue":"4","key":"23_CR36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.042302","volume":"87","author":"P Selinger","year":"2013","unstructured":"Selinger, P.: Quantum circuits of t-depth one. Phys. Rev. A 87(4), 042302 (2013)","journal-title":"Phys. Rev. A"},{"key":"23_CR37","doi-asserted-by":"publisher","unstructured":"Selinger, P.: Quantum circuits of $$t$$-depth one. Phys. Rev. A 87, 042302 (2013). https:\/\/doi.org\/10.1103\/PhysRevA.87.042302","DOI":"10.1103\/PhysRevA.87.042302"},{"key":"23_CR38","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE (1994)"},{"key":"23_CR39","doi-asserted-by":"crossref","unstructured":"Song, G., Jang, K., Kim, H., Lee, W., Hu, Z., Seo, H.: Grover on SM3. IACR Cryptology ePrint Archive (2021). https:\/\/eprint.iacr.org\/2021\/668","DOI":"10.1007\/978-3-031-08896-4_22"},{"key":"23_CR40","unstructured":"Takahashi, Y., Tani, S., Kunihiro, N.: Quantum addition circuits and unbounded fan-out (2009). https:\/\/arxiv.org\/abs\/0910.2530"},{"key":"23_CR41","unstructured":"Zaverucha, G., et al.: The Picnic signature algorithm. Submission to PQC Third Round (2020). https:\/\/github.com\/microsoft\/Picnic\/blob\/master\/spec\/spec-v3.0.pdf"},{"issue":"5","key":"23_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-022-03518-5","volume":"21","author":"J Zou","year":"2022","unstructured":"Zou, J., Li, L., Wei, Z., Luo, Y., Liu, Q., Wu, W.: New quantum circuit implementations of SM4 and sm3. Quant. Inf. Process. 21(5), 1\u201338 (2022)","journal-title":"Quant. Inf. Process."},{"key":"23_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/978-3-030-64834-3_24","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"J Zou","year":"2020","unstructured":"Zou, J., Wei, Z., Sun, S., Liu, X., Wu, W.: Quantum circuit implementations of AES with fewer qubits. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12492, pp. 697\u2013726. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_24"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22912-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,3]],"date-time":"2023-12-03T20:24:12Z","timestamp":1701635052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22912-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031229114","9783031229121"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22912-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.tcgcrest.org\/indocrypt-2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.22","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.59","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}