{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:36:31Z","timestamp":1760524591699,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031547720"},{"type":"electronic","value":"9783031547737"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54773-7_17","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:02:47Z","timestamp":1709164967000},"page":"433-459","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Masked Iterate-Fork-Iterate: A New Design Paradigm for\u00a0Tweakable Expanding Pseudorandom Function"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0964-8711","authenticated-orcid":false,"given":"Elena","family":"Andreeva","sequence":"first","affiliation":[]},{"given":"Beno\u00eet","family":"Cogliati","sequence":"additional","affiliation":[]},{"given":"Virginie","family":"Lallemand","sequence":"additional","affiliation":[]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[]},{"given":"Antoon","family":"Purnal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3284-7076","authenticated-orcid":false,"given":"Arnab","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"17_CR1","unstructured":"Advanced Encryption Standard (AES). National Institute of Standards and Technology, NIST FIPS PUB 197, U.S. Department of Commerce (2001)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Andreeva, E., Bhati, A.S., Preneel, B., Viz\u00e1r, D.: 1, 2, 3, fork: counter mode variants based on a generalized forkcipher. IACR Trans. Symmetric Cryptol. 2021(3), 1\u201335 (2021)","DOI":"10.46586\/tosc.v2021.i3.1-35"},{"key":"17_CR3","unstructured":"Andreeva, E., Cogliati, B., Lallemand, V., Minier, M., Purnal, A., Roy, A.: Masked iterate-fork-iterate: a new design paradigm for tweakable expanding pseudorandom function. Cryptology ePrint Archive, Report 2022\/1534 (2022). https:\/\/eprint.iacr.org\/2022\/1534"},{"key":"17_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-030-34621-8_6","volume-title":"ASIACRYPT 2019, Part II","author":"E Andreeva","year":"2019","unstructured":"Andreeva, E., Lallemand, V., Purnal, A., Reyhanitabar, R., Roy, A., Viz\u00e1r, D.: Forkcipher: a new primitive for authenticated encryption of very short messages. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019, Part II. LNCS, vol. 11922, pp. 153\u2013182. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-34621-8_6"},{"key":"17_CR5","unstructured":"Andreeva, E., Reyhanitabar, R., Varici, K., Viz\u00e1r, D.: Forking a blockcipher for authenticated encryption of very short messages. Cryptology ePrint Archive, Report 2018\/916 (2018). https:\/\/eprint.iacr.org\/2018\/916"},{"key":"17_CR6","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-33491-7_1","volume-title":"ACNS 2023, Part II","author":"E Andreeva","year":"2023","unstructured":"Andreeva, E., Weninger, A.: A forkcipher-based pseudo-random number generator. In: Tibouchi, M., Wang, X. (eds.) ACNS 2023, Part II. LNCS, vol. 13906, pp. 3\u201331. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-33491-7_1"},{"issue":"3","key":"17_CR7","first-page":"1","volume":"2018","author":"S Banik","year":"2018","unstructured":"Banik, S., Bogdanov, A., Luykx, A., Tischhauser, E.: SUNDAE: small universal deterministic authenticated encryption for the internet of things. IACR Trans. Symm. Cryptol. 2018(3), 1\u201335 (2018)","journal-title":"IACR Trans. Symm. Cryptol."},{"key":"17_CR8","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-030-21568-2_3","volume-title":"ACNS 2019","author":"S Banik","year":"2019","unstructured":"Banik, S., et al.: Cryptanalysis of ForkAES. In: Deng, R.H., Gauthier-Uma\u00f1a, V., Ochoa, M., Yung, M. (eds.) ACNS 2019. LNCS, vol. 11464, pp. 43\u201363. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-21568-2_3"},{"key":"17_CR9","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-662-53008-5_5","volume-title":"CRYPTO 2016, Part II","author":"C Beierle","year":"2016","unstructured":"Beierle, C., et al.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016, Part II. LNCS, vol. 9815, pp. 123\u2013153. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5"},{"key":"17_CR10","unstructured":"Bhati, A.S., Dufka, A., Andreeva, E., Roy, A., Preneel, B.: Skye: A Fast KDF based on Expanding PRF and its Application to Signal. Cryptology ePrint Archive, Paper 2023\/781 (2023). https:\/\/eprint.iacr.org\/2023\/781. (to appear in ACM ASIACCS)"},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"314","DOI":"10.46586\/tosc.v2018.i1.314-335","volume":"2018","author":"S Bhattacharya","year":"2018","unstructured":"Bhattacharya, S., Nandi, M.: Revisiting variable output length XOR pseudorandom function. IACR Trans. Symmetric Cryptol. 2018(1), 314\u2013335 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"17_CR12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-662-48116-5_8","volume-title":"FSE 2015","author":"A Bogdanov","year":"2015","unstructured":"Bogdanov, A., Lauridsen, M.M., Tischhauser, E.: Comb to pipeline: fast software encryption revisited. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 150\u2013171. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48116-5_8"},{"key":"17_CR13","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-55220-5_19","volume-title":"EUROCRYPT 2014","author":"S Chen","year":"2014","unstructured":"Chen, S., Steinberger, J.P.: Tight security bounds for key-alternating ciphers. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 327\u2013350. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_19"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Cid, C., Huang, T., Peyrin, T., Sasaki, Y., Song, L.: A security analysis of Deoxys and its internal tweakable block ciphers. IACR Trans. Symm. Cryptol. 2017(3), 73\u2013107 (2017)","DOI":"10.46586\/tosc.v2017.i3.73-107"},{"key":"17_CR15","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/978-3-319-63697-9_17","volume-title":"CRYPTO 2017","author":"W Dai","year":"2017","unstructured":"Dai, W., Hoang, V.T., Tessaro, S.: Information-theoretic indistinguishability via the chi-squared method. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10403, pp. 497\u2013523. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63697-9_17"},{"key":"17_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-71039-4_7","volume-title":"FSE 2008","author":"H Demirci","year":"2008","unstructured":"Demirci, H., Sel\u00e7uk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 116\u2013126. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-71039-4_7"},{"issue":"2","key":"17_CR17","doi-asserted-by":"publisher","first-page":"161","DOI":"10.46586\/tosc.v2018.i2.161-191","volume":"2018","author":"P Derbez","year":"2018","unstructured":"Derbez, P., et al.: Cryptanalysis of AES-PRF and its dual. IACR Trans. Symm. Cryptol. 2018(2), 161\u2013191 (2018)","journal-title":"IACR Trans. Symm. Cryptol."},{"key":"17_CR18","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-642-14623-7_21","volume-title":"CRYPTO 2010","author":"O Dunkelman","year":"2010","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 393\u2013410. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_21"},{"key":"17_CR19","unstructured":"Dutta, A., Guo, J., List, E.: Forking sums of permutations for optimally secure and highly efficient PRFs. Cryptology ePrint Archive, Report 2022\/1609 (2022). https:\/\/eprint.iacr.org\/2022\/1609"},{"key":"17_CR20","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-03317-9_4","volume-title":"FSE 2009","author":"S Gueron","year":"2009","unstructured":"Gueron, S.: Intel\u2019s new AES instructions for enhanced performance and security (invited talk). In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 51\u201366. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03317-9_4"},{"key":"17_CR21","unstructured":"Gueron, S., Kounavis, M.E.: Intel Carry-Less Multiplication Instruction and its Usage for Computing the GCM Mode. Technical report, Intel Corporation (2014). https:\/\/software.intel.com\/sites\/default\/files\/managed\/72\/cc\/clmul-wp-rev-2.02-2014-04-20.pdf"},{"key":"17_CR22","first-page":"168","volume":"2017","author":"S Gueron","year":"2017","unstructured":"Gueron, S., Langley, A., Lindell, Y.: AES-GCM-SIV: specification and analysis. IACR Cryptol. ePrint Arch. 2017, 168 (2017)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Gueron, S., Langley, A., Lindell, Y.: AES-GCM-SIV: nonce misuse-resistant authenticated encryption. RFC 8452, pp. 1\u201342 (2019)","DOI":"10.17487\/RFC8452"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Gueron, S., Lindell, Y.: GCM-SIV: full nonce misuse-resistant authenticated encryption at under one cycle per byte. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 2015, pp. 109\u2013119. ACM Press (2015)","DOI":"10.1145\/2810103.2813613"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Housley, R.: Using advanced encryption standard (AES) CCM mode with IPsec encapsulating security payload (ESP). RFC, 4309 (2005)","DOI":"10.17487\/rfc4309"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Iwata, T., Minematsu, K.: Stronger security variants of GCM-SIV. IACR Trans. Symm. Cryptol. 2016(1), 134\u2013157 (2016). https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/539","DOI":"10.46586\/tosc.v2016.i1.134-157"},{"key":"17_CR27","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-319-63697-9_2","volume-title":"CRYPTO 2017, Part III","author":"T Iwata","year":"2017","unstructured":"Iwata, T., Minematsu, K., Peyrin, T., Seurin, Y.: ZMAC: block cipher mode for highly secure message authentication. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017, Part III. LNCS, vol. 10403, pp. 34\u201365. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-63697-9_2"},{"issue":"4","key":"17_CR28","doi-asserted-by":"publisher","first-page":"240","DOI":"10.46586\/tosc.v2017.i4.240-267","volume":"2017","author":"T Iwata","year":"2017","unstructured":"Iwata, T., Seurin, Y.: Reconsidering the security bound of AES-GCM-SIV. IACR Trans. Symm. Cryptol. 2017(4), 240\u2013267 (2017)","journal-title":"IACR Trans. Symm. Cryptol."},{"key":"17_CR29","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-662-45608-8_15","volume-title":"ASIACRYPT 2014, Part II","author":"J Jean","year":"2014","unstructured":"Jean, J., Nikolic, I., Peyrin, T.: Tweaks and keys for block ciphers: the TWEAKEY framework. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014, Part II. LNCS, vol. 8874, pp. 274\u2013288. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45608-8_15"},{"key":"17_CR30","unstructured":"Jean, J., Nikolic, I., Peyrin, T., Seurin, Y.: Deoxys v1. 41. Submitted to CAESAR (2016)"},{"key":"17_CR31","unstructured":"Jean, J., Nikolic, I., Peyrin, T., Seurin, Y.: Deoxys v1.43 (2018)"},{"issue":"3","key":"17_CR32","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s00145-021-09397-w","volume":"34","author":"J Jean","year":"2021","unstructured":"Jean, J., Nikolic, I., Peyrin, T., Seurin, Y.: The deoxys AEAD family. J. Cryptol. 34(3), 31 (2021)","journal-title":"J. Cryptol."},{"key":"17_CR33","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/3-540-44706-7_6","volume-title":"FSE 2000","author":"J Kelsey","year":"2001","unstructured":"Kelsey, J., Kohno, T., Schneier, B.: Amplified boomerang attacks against reduced-round MARS and Serpent. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 75\u201393. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44706-7_6"},{"issue":"1","key":"17_CR34","doi-asserted-by":"publisher","first-page":"474","DOI":"10.46586\/tosc.v2017.i1.474-505","volume":"2017","author":"T Kranz","year":"2017","unstructured":"Kranz, T., Leander, G., Wiemer, F.: Linear cryptanalysis: key schedules and tweakable block ciphers. IACR Trans. Symm. Cryptol. 2017(1), 474\u2013505 (2017)","journal-title":"IACR Trans. Symm. Cryptol."},{"issue":"1","key":"17_CR35","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1049\/iet-ifs.2018.5091","volume":"13","author":"R Li","year":"2019","unstructured":"Li, R., Jin, C.: Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC. IET Inf. Secur. 13(1), 70\u201375 (2019)","journal-title":"IET Inf. Secur."},{"key":"17_CR36","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-45708-9_3","volume-title":"CRYPTO 2002","author":"M Liskov","year":"2002","unstructured":"Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 31\u201346. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45708-9_3"},{"key":"17_CR37","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-319-52153-4_15","volume-title":"CT-RSA 2017","author":"E List","year":"2017","unstructured":"List, E., Nandi, M.: Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption. In: Handschuh, H. (ed.) CT-RSA 2017. LNCS, vol. 10159, pp. 258\u2013274. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-52153-4_15"},{"issue":"12","key":"17_CR38","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1093\/comjnl\/bxaa028","volume":"63","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Shi, B., Dawu, G., Zhao, F., Li, W., Liu, Z.: Improved meet-in-the-middle attacks on reduced-round Deoxys-BC-256. Comput. J. 63(12), 1859\u20131870 (2020)","journal-title":"Comput. J."},{"key":"17_CR39","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-30556-9_27","volume-title":"INDOCRYPT 2004","author":"DA McGrew","year":"2004","unstructured":"McGrew, D.A., Viega, J.: The security and performance of the Galois\/counter mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 343\u2013355. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30556-9_27"},{"issue":"3","key":"17_CR40","doi-asserted-by":"publisher","first-page":"228","DOI":"10.46586\/tosc.v2017.i3.228-252","volume":"2017","author":"B Mennink","year":"2017","unstructured":"Mennink, B., Neves, S.: Optimal PRFs from blockcipher designs. IACR Trans. Symm. Cryptol. 2017(3), 228\u2013252 (2017)","journal-title":"IACR Trans. Symm. Cryptol."},{"issue":"2","key":"17_CR41","first-page":"93","volume":"10","author":"F Moazami","year":"2018","unstructured":"Moazami, F., Mehrdad, A., Soleimany, H.: Impossible differential cryptanalysis on Deoxys-BC-256. ISC Int. J. Inf. Secur. 10(2), 93\u2013105 (2018)","journal-title":"ISC Int. J. Inf. Secur."},{"key":"17_CR42","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D (2007)","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"17_CR43","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-662-53018-4_2","volume-title":"CRYPTO 2016, Part I","author":"T Peyrin","year":"2016","unstructured":"Peyrin, T., Seurin, Y.: Counter-in-tweak: authenticated encryption modes for tweakable block ciphers. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016, Part I. LNCS, vol. 9814, pp. 33\u201363. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53018-4_2"},{"key":"17_CR44","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: a block-cipher mode of operation for efficient authenticated encryption. In: Reiter, M.K., Samarati, P. (eds.) ACM CCS 2001, pp. 196\u2013205. ACM Press (2001)","DOI":"10.1145\/501983.502011"},{"key":"17_CR45","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/11761679_23","volume-title":"EUROCRYPT 2006","author":"P Rogaway","year":"2006","unstructured":"Rogaway, P., Shrimpton, T.: A provable-security treatment of the key-wrap problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373\u2013390. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_23"},{"issue":"3","key":"17_CR46","doi-asserted-by":"publisher","first-page":"121","DOI":"10.46586\/tosc.v2019.i3.121-151","volume":"2019","author":"B Zhao","year":"2019","unstructured":"Zhao, B., Dong, X., Jia, K.: New related-tweakey boomerang and rectangle attacks on Deoxys-BC including BDT effect. IACR Trans. Symm. Cryptol. 2019(3), 121\u2013151 (2019)","journal-title":"IACR Trans. Symm. Cryptol."}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54773-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T16:12:36Z","timestamp":1709655156000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54773-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031547720","9783031547737"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54773-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wp.nyu.edu\/acns2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}