{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:16:28Z","timestamp":1742919388106,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031544088"},{"type":"electronic","value":"9783031544095"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54409-5_8","type":"book-chapter","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T06:08:12Z","timestamp":1708582092000},"page":"148-165","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Coprocessors as\u00a0Noise Engines in\u00a0Off-the-Shelf Microcontrollers"],"prefix":"10.1007","author":[{"given":"Balazs","family":"Udvarhelyi","sequence":"first","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","unstructured":"Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.: On the cost of lazy engineering for masked software implementations. In: Joye, M., Moradi, A. (eds.) CARDIS. Lecture Notes in Computer Science, vol. 8968, pp. 64\u201381. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-319-16763-3_5","DOI":"10.1007\/978-3-319-16763-3_5"},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Battistello, A., Coron, J., Prouff, E., Zeitoun, R.: Horizontal side-channel attacks and countermeasures on the ISW masking scheme. In: Gierlichs, B., Poschmann, A. (eds.) CHES. Lecture Notes in Computer Science, vol. 9813, pp. 23\u201339. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_2","DOI":"10.1007\/978-3-662-53140-2_2"},{"key":"8_CR3","doi-asserted-by":"publisher","unstructured":"B\u00e9guinot, J., et al.: Removing the field size loss from duc et al\u2019.s conjectured bound for masked encodings. In: Kavun, E.B., Pehl, M. (eds.) COSADE. Lecture Notes in Computer Science, vol. 13979, pp. 86\u2013104. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-29497-6_5","DOI":"10.1007\/978-3-031-29497-6_5"},{"issue":"4","key":"8_CR4","doi-asserted-by":"publisher","first-page":"553","DOI":"10.46586\/tches.v2022.i4.553-588","volume":"2022","author":"O Bronchain","year":"2022","unstructured":"Bronchain, O., Cassiers, G.: Bitslicing arithmetic\/boolean masking conversions for fun and profit with application to lattice-based kems. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 553\u2013588 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Bronchain, O., Hendrickx, J.M., Massart, C., Olshevsky, A., Standaert, F.: Leakage certification revisited: Bounding model errors in side-channel security evaluations. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO (1). Lecture Notes in Computer Science, vol. 11692, pp. 713\u2013737. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_25","DOI":"10.1007\/978-3-030-26948-7_25"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"641","DOI":"10.46586\/tches.v2021.i3.641-676","volume":"2021","author":"O Bronchain","year":"2021","unstructured":"Bronchain, O., Momin, C., Peters, T., Standaert, F.: Improved leakage-resistant authenticated encryption based on hardware AES coprocessors. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 641\u2013676 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Bronchain, O., Standaert, F.: Breaking masked implementations with many shares on 32-bit software platforms or when the security order does not matter. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), 202\u2013234 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i3.202-234","DOI":"10.46586\/tches.v2021.i3.202-234"},{"issue":"10","key":"8_CR8","doi-asserted-by":"publisher","first-page":"1677","DOI":"10.1109\/TC.2020.3022979","volume":"70","author":"G Cassiers","year":"2021","unstructured":"Cassiers, G., Gr\u00e9goire, B., Levi, I., Standaert, F.: Hardware private circuits: from trivial composition to full verification. IEEE Trans. Comput. 70(10), 1677\u20131690 (2021)","journal-title":"IEEE Trans. Comput."},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"2542","DOI":"10.1109\/TIFS.2020.2971153","volume":"15","author":"G Cassiers","year":"2020","unstructured":"Cassiers, G., Standaert, F.: Trivially and efficiently composing masked gadgets with probe isolating non-interference. IEEE Trans. Inf. Forensics Secur. 15, 2542\u20132555 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"136","DOI":"10.46586\/tches.v2021.i2.136-158","volume":"2021","author":"G Cassiers","year":"2021","unstructured":"Cassiers, G., Standaert, F.: Provably secure hardware masking in the transition- and glitch-robust probing model: better safe than sorry. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2), 136\u2013158 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"3","key":"8_CR11","doi-asserted-by":"publisher","first-page":"270","DOI":"10.46586\/tches.v2023.i3.270-293","volume":"2023","author":"G Cassiers","year":"2023","unstructured":"Cassiers, G., Devillez, H., Standaert, F.X., Udvarhelyi, B.: Efficient regression-based linear discriminant analysis for side-channel security evaluations: towards analytical attacks against 32-bit implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3), 270\u2013293 (2023)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"8_CR12","doi-asserted-by":"publisher","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26","DOI":"10.1007\/3-540-48405-1_26"},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: CHES. Lecture Notes in Computer Science, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36400-5_3","DOI":"10.1007\/3-540-36400-5_3"},{"key":"8_CR14","doi-asserted-by":"publisher","unstructured":"Choudary, M.O., Kuhn, M.G.: Efficient stochastic methods: Profiled attacks beyond 8 bits. In: Joye, M., Moradi, A. (eds.) CARDIS. Lecture Notes in Computer Science, vol. 8968, pp. 85\u2013103. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-319-16763-3_6","DOI":"10.1007\/978-3-319-16763-3_6"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Coron, J., et al.: Conversion of security proofs from one leakage model to another: a new issue. In: Schindler, W., Huss, S.A. (eds.) COSADE. Lecture Notes in Computer Science, vol. 7275, pp. 69\u201381. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29912-4_6","DOI":"10.1007\/978-3-642-29912-4_6"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Duc, A., Dziembowski, S., Faust, S.: Unifying leakage models: From probing attacks to noisy leakage. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT. Lecture Notes in Computer Science, vol. 8441, pp. 423\u2013440. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_24","DOI":"10.1007\/978-3-642-55220-5_24"},{"key":"8_CR17","doi-asserted-by":"publisher","unstructured":"Duc, A., Faust, S., Standaert, F.: Making masking security proofs concrete - or how to evaluate the security of any leaking device. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT (1). Lecture Notes in Computer Science, vol. 9056, pp. 401\u2013429. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_16","DOI":"10.1007\/978-3-662-46800-5_16"},{"issue":"4","key":"8_CR18","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1007\/s00145-018-9277-0","volume":"32","author":"A Duc","year":"2019","unstructured":"Duc, A., Faust, S., Standaert, F.: Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version. J. Cryptol. 32(4), 1263\u20131297 (2019)","journal-title":"J. Cryptol."},{"key":"8_CR19","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd Edn. Wiley, Hoboken (2001)"},{"issue":"3","key":"8_CR20","doi-asserted-by":"publisher","first-page":"89","DOI":"10.46586\/tches.v2018.i3.89-120","volume":"2018","author":"S Faust","year":"2018","unstructured":"Faust, S., Grosso, V., Pozo, S.M.D., Paglialonga, C., Standaert, F.: Composable masking schemes in the presence of physical defaults & the robust probing model. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 89\u2013120 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"1","key":"8_CR21","first-page":"152","volume":"2020","author":"S Gao","year":"2020","unstructured":"Gao, S., Marshall, B., Page, D., Oswald, E.: Share-slicing: friend or foe? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1), 152\u2013174 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Goubin, L., Patarin, J.: DES and differential power analysis (the \u201cduplication\u201d method). In: Koc, C.K., Paar, C. (eds.) CHES. Lecture Notes in Computer Science, vol. 1717, pp. 158\u2013172. Springer (1999). https:\/\/doi.org\/10.1007\/3-540-48059-5_15","DOI":"10.1007\/3-540-48059-5_15"},{"key":"8_CR23","doi-asserted-by":"publisher","unstructured":"Goudarzi, D., Rivain, M.: How fast can higher-order masking be in software? In: Coron, J.S., Nielsen, J. (eds.) EUROCRYPT (1). Lecture Notes in Computer Science, vol. 10210, pp. 567\u2013597. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-56620-7_20","DOI":"10.1007\/978-3-319-56620-7_20"},{"key":"8_CR24","doi-asserted-by":"publisher","unstructured":"Herbst, C., Oswald, E., Mangard, S.: An AES smart card implementation resistant to power analysis attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS. Lecture Notes in Computer Science, vol. 3989, pp. 239\u2013252. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11767480_16","DOI":"10.1007\/11767480_16"},{"key":"8_CR25","doi-asserted-by":"publisher","unstructured":"Ishai, Y., Sahai, A., Wagner, D.A.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO. Lecture Notes in Computer Science, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"8_CR26","doi-asserted-by":"publisher","unstructured":"Mangard, S.: Hardware countermeasures against DPA ? A statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA. Lecture Notes in Computer Science, vol. 2964, pp. 222\u2013235. Springer, Heidelberg (2004). DOI: https:\/\/doi.org\/10.1007\/978-3-540-24660-2_18","DOI":"10.1007\/978-3-540-24660-2_18"},{"issue":"2","key":"8_CR27","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S Mangard","year":"2011","unstructured":"Mangard, S., Oswald, E., Standaert, F.: One for all - all for one: unifying standard differential power analysis attacks. IET Inf. Secur. 5(2), 100\u2013110 (2011)","journal-title":"IET Inf. Secur."},{"issue":"2","key":"8_CR28","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s00145-010-9085-7","volume":"24","author":"S Nikova","year":"2011","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Secure hardware implementation of nonlinear functions in the presence of glitches. J. Cryptol. 24(2), 292\u2013321 (2011)","journal-title":"J. Cryptol."},{"key":"8_CR29","doi-asserted-by":"publisher","unstructured":"Poussier, R., Standaert, F., Grosso, V.: Simple key enumeration (and rank estimation) using histograms: an integrated approach. In: Gierlichs, B., Poschmann, A. (eds.) CHES. Lecture Notes in Computer Science, vol. 9813, pp. 61\u201381. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_4","DOI":"10.1007\/978-3-662-53140-2_4"},{"key":"8_CR30","doi-asserted-by":"publisher","unstructured":"Prest, T., Goudarzi, D., Martinelli, A., Passel\u00e8gue, A.: Unifying leakage models on a r\u00e9nyi day. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO (1). Lecture Notes in Computer Science, vol. 11692, pp. 683\u2013712. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_24","DOI":"10.1007\/978-3-030-26948-7_24"},{"key":"8_CR31","doi-asserted-by":"publisher","unstructured":"Prouff, E., Rivain, M.: Masking against side-channel attacks: a formal security proof. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT. Lecture Notes in Computer Science, vol. 7881, pp. 142\u2013159. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_9","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"8_CR32","doi-asserted-by":"publisher","unstructured":"Schindler, W., Lemke, K., Paar, C.: A stochastic model for differential side channel cryptanalysis. In: Johansson, T., Nguyen, P.Q. (eds.) CHES. Lecture Notes in Computer Science, vol. 3659, pp. 30\u201346. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_9","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"8_CR33","doi-asserted-by":"publisher","unstructured":"Standaert, F., Archambeau, C.: Using subspace-based template attacks to compare and combine power and electromagnetic information leakages. In: Oswald, E., Rohatgi, P. (eds.) CHES. Lecture Notes in Computer Science, vol. 5154, pp. 411\u2013425. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_26","DOI":"10.1007\/978-3-540-85053-3_26"},{"key":"8_CR34","doi-asserted-by":"publisher","unstructured":"Standaert, F., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux, A. (ed.) EUROCRYPT. Lecture Notes in Computer Science, vol. 5479, pp. 443\u2013461. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_26","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"8_CR35","doi-asserted-by":"publisher","unstructured":"Unterstein, F., Heyszl, J., Santis, F.D., Specht, R.: Dissecting leakage resilient prfs with multivariate localized EM attacks - a practical security evaluation on FPGA. In: Guilley, S. (ed.) COSADE. Lecture Notes in Computer Science, vol. 10348, pp. 34\u201349. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-64647-3_3","DOI":"10.1007\/978-3-319-64647-3_3"},{"key":"8_CR36","doi-asserted-by":"publisher","unstructured":"Unterstein, F., Heyszl, J., Santis, F.D., Specht, R., Sigl, G.: High-resolution EM attacks against leakage-resilient prfs explained - and an improved construction. In: Smart, N. (ed.) CT-RSA. Lecture Notes in Computer Science, vol. 10808, pp. 413\u2013434. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-319-76953-0_22","DOI":"10.1007\/978-3-319-76953-0_22"},{"key":"8_CR37","doi-asserted-by":"publisher","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.: Soft analytical side-channel attacks. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT (1). Lecture Notes in Computer Science, vol. 8873, pp. 282\u2013296. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_15","DOI":"10.1007\/978-3-662-45611-8_15"},{"key":"8_CR38","doi-asserted-by":"publisher","unstructured":"Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.: Shuffling against side-channel attacks: a comprehensive study with cautionary note. In: Wang, X., Sako, K. (eds.) ASIACRYPT. Lecture Notes in Computer Science, vol. 7658, pp. 740\u2013757. Springer (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_44","DOI":"10.1007\/978-3-642-34961-4_44"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54409-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,31]],"date-time":"2024-03-31T12:02:11Z","timestamp":1711886531000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54409-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031544088","9783031544095"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54409-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CARDIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Card Research and Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cardis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}