{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:53:13Z","timestamp":1743267193284,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031547720"},{"type":"electronic","value":"9783031547737"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54773-7_5","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:02:47Z","timestamp":1709164967000},"page":"101-130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Breaking DPA-Protected Kyber via\u00a0the\u00a0Pair-Pointwise Multiplication"],"prefix":"10.1007","author":[{"given":"Estuardo Alpirez","family":"Bock","sequence":"first","affiliation":[]},{"given":"Gustavo","family":"Banegas","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Brzuska","sequence":"additional","affiliation":[]},{"given":"\u0141ukasz","family":"Chmielewski","sequence":"additional","affiliation":[]},{"given":"Kirthivaasan","family":"Puniamurthy","sequence":"additional","affiliation":[]},{"given":"Milan","family":"\u0160orf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"5_CR1","unstructured":"Github repository: Collection of post-quantum cryptographic algorithms for the arm cortex-m4 (2023). https:\/\/github.com\/mupq\/pqm4"},{"key":"5_CR2","unstructured":"Github respository for masked Kyber presented in [18] (2022). https:\/\/github.com\/masked-kyber-m4\/mkm4"},{"key":"5_CR3","unstructured":"Avanzi, R., et al.: CRYSTALS-Kyber (version 3.0) - submission to round 3 of the NIST post-quantum project. submission to the NIST post-quantum cryptography standardization project (2020). https:\/\/pq-crystals.org\/kyber\/data\/kyber-specification-round3-20210804.pdf"},{"key":"5_CR4","unstructured":"Backlund, L., Ngo, K., G\u00e4rtner, J., Dubrova, E.: Secret key recovery attacks on masked and shuffled implementations of CRYSTALS-Kyber and saber. Cryptology ePrint Archive, Paper 2022\/1692 (2022). https:\/\/eprint.iacr.org\/2022\/1692"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Batina, L., Chmielewski, \u0141., Papachristodoulou, L., Schwabe, P., Tunstall, M.: Online template attacks. In: Meier, W., Mukhopadhyay, D. (eds.) Progress in Cryptology - INDOCRYPT 2014\u201315th International Conference on Cryptology in India, New Delhi, India, 14\u201317 December 2014, Proceedings, vol. 8885 of Lecture Notes in Computer Science, pp. 21\u201336. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/s13389-017-0171-8","DOI":"10.1007\/s13389-017-0171-8"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13389-017-0171-8","volume":"9","author":"L Batina","year":"2019","unstructured":"Batina, L., Chmielewski, \u0141, Papachristodoulou, L., Schwabe, P., Tunstall, M.: Online template attacks. J. Cryptogr. Eng. 9, 1\u201316 (2019)","journal-title":"J. Cryptogr. Eng."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Van Beirendonck, M., D\u2019Anvers, J.P., Karmakar, A., Balasch, J., Verbauwhede, I.: A side-channel-resistant implementation of SABER. ACM J. Emerg. Technol. Comput. Syst. 17(2), 10:1\u201310:26 (2021)","DOI":"10.1145\/3429983"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Bos, J.W., et al.: CRYSTALS - kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy, EuroS &P 2018, London, United Kingdom, 24\u201326 April 2018, pp. 353\u2013367. IEEE (2018)","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Bos, J.W., Friedberger, S., Martinoli, M., Oswald, E., Stam, M.: Assessing the feasibility of single trace power analysis of frodo. In: Cid, C., Jacobson Jr., M.J. (eds.) Selected Areas in Cryptography - SAC 2018\u201325th International Conference, Calgary, AB, Canada, 15\u201317 August 2018, Revised Selected Papers, vol. 11349 of Lecture Notes in Computer Science, pp. 216\u2013234. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-030-10970-7_10","DOI":"10.1007\/978-3-030-10970-7_10"},{"issue":"4","key":"5_CR10","doi-asserted-by":"publisher","first-page":"173","DOI":"10.46586\/tches.v2021.i4.173-214","volume":"2021","author":"JW Bos","year":"2021","unstructured":"Bos, J.W., Gourjon, M., Renes, J., Schneider, T., van Vredendaal, C.: Masking Kyber: first- and higher-order implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4), 173\u2013214 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Aldaya, A.C., Brumley, B.B.: Online template attacks: revisited. IACR Trans. Cryptogr. Hardware Embed. Syst. 2021(3), 28\u201359 (2021). https:\/\/artifacts.iacr.org\/tches\/2021\/a11","DOI":"10.46586\/tches.v2021.i3.28-59"},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3","DOI":"10.1007\/3-540-36400-5_3"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Coron, J.S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems, pp. 292\u2013302. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48059-5_25","DOI":"10.1007\/3-540-48059-5_25"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"D\u2019Anvers, J.P., Tiepelt, M., Vercauteren, F., Verbauwhede, I.: Timing attacks on error correcting codes in post-quantum schemes. In: Proceedings of ACM Workshop on Theory of Implementation Security Workshop, TIS 2019, pp. 2\u20139. Association for Computing Machinery, New York (2019)","DOI":"10.1145\/3338467.3358948"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Dubrova, E., Ngo, K., G\u00e4rtner, J., Wang, R.: Breaking a fifth-order masked implementation of crystals-kyber by copy-paste. In: Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, APKC 2023, pp. 10\u201320. Association for Computing Machinery, New York (2023)","DOI":"10.1145\/3591866.3593072"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s00145-011-9114-1","volume":"26","author":"E Fujisaki","year":"2013","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. J. Cryptol. 26(1), 80\u2013101 (2013)","journal-title":"J. Cryptol."},{"issue":"4","key":"5_CR17","doi-asserted-by":"publisher","first-page":"88","DOI":"10.46586\/tches.v2021.i4.88-113","volume":"2021","author":"M Hamburg","year":"2021","unstructured":"Hamburg, M.: Chosen ciphertext k-trace attacks on masked CCA2 secure Kyber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4), 88\u2013113 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"5_CR18","unstructured":"Heinz, D., Kannwischer, M.J., Land, G., P\u00f6ppelmann, T., Schwabe, P., Sprenkels, A.: First-order masked Kyber on ARM Cortex-M4. Cryptology ePrint Archive, Paper 2022\/058 (2022). https:\/\/eprint.iacr.org\/2022\/058"},{"issue":"4","key":"5_CR19","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1109\/TC.2022.3197073","volume":"72","author":"D Heinz","year":"2023","unstructured":"Heinz, D., P\u00f6ppelmann, T.: Combined fault and DPA protection for lattice-based cryptography. IEEE Trans. Comput. 72(4), 1055\u20131066 (2023)","journal-title":"IEEE Trans. Comput."},{"key":"5_CR20","doi-asserted-by":"publisher","unstructured":"Homma, N., Miyamoto, A., Aoki, T., Satoh, A., Shamir, A.: Collision-based power analysis of modular exponentiation using chosen-message pairs. In: Oswald, E., Rohatgi, P. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, 10\u201313 August 2008. Proceedings, vol. 5154 of Lecture Notes in Computer Science, pp. 15\u201329. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_2","DOI":"10.1007\/978-3-540-85053-3_2"},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Hutter, M., Kirschbaum, M., Plos, T., Schmidt, J.M., Mangard, S.: Exploiting the difference of side-channel leakages. In: Schindler, W., Huss, S.A., (eds.) Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Darmstadt, Germany, 3\u20134 May 2012. Proceedings, vol. 7275 of Lecture Notes in Computer Science, pp. 1\u201316. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29912-4_1","DOI":"10.1007\/978-3-642-29912-4_1"},{"key":"5_CR22","unstructured":"Ji, Y., Wang, R., Ngo, K., Dubrova, E., Backlund, L.: A side-channel attack on a hardware implementation of CRYSTALS-Kyber. Cryptology ePrint Archive, Paper 2022\/1452 (2022). https:\/\/eprint.iacr.org\/2022\/1452"},{"key":"5_CR23","unstructured":"Kannwischer, M.J.: Polynomial Multiplication for Post-Quantum Cryptography. PhD thesis, Nijmegen U. (2022)"},{"key":"5_CR24","first-page":"595","volume":"7","author":"A Karatsuba","year":"1963","unstructured":"Karatsuba, A., Ofman, Yu.: Multiplication of multidigit numbers on automata. Soviet Physics Doklady 7, 595 (1963)","journal-title":"Soviet Physics Doklady"},{"key":"5_CR25","unstructured":"Lyubashevsky, V., et al.: CRYSTALS-Dilithium (2020). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-3-submissions"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Marzougui, S., Kabin, I., Kr\u00e4mer, J., Aulbach, T., Seifert, J.P.: On the feasibility of single-trace attacks on the Gaussian sampler using a CDT. In: Kavun, E.B., Pehl, M. (eds.) Constructive Side-Channel Analysis and Secure Design - 14th International Workshop, COSADE 2023, Munich, Germany, 3\u20134 April 2023, Proceedings, vol. 13979 of Lecture Notes in Computer Science, pp. 149\u2013169. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-29497-6_8","DOI":"10.1007\/978-3-031-29497-6_8"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Mujdei, C., Wouters, L., Karmakar, A., Beckers, A., Mera, J.M.B., Verbauwhede, I.: Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication. ACM Trans. Embed. Comput. Syst. (2022)","DOI":"10.1145\/3569420"},{"key":"5_CR28","unstructured":"Ngo, K., Wang, R., Dubrova, E., Paulsrud, N.: Side-channel attacks on lattice-based kems are not prevented by higher-order masking. Cryptology ePrint Archive, Paper 2022\/919 (2022). https:\/\/eprint.iacr.org\/2022\/919"},{"issue":"1","key":"5_CR29","doi-asserted-by":"publisher","first-page":"142","DOI":"10.46586\/tches.v2018.i1.142-174","volume":"2018","author":"T Oder","year":"2018","unstructured":"Oder, T., Schneider, T., P\u00f6ppelmann, T., G\u00fcneysu, T.: Practical CCA2-secure and masked Ring-LWE implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1), 142\u2013174 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"5_CR30","doi-asserted-by":"publisher","unstructured":"O\u2019Flynn, C., Chen, Z.D.: ChipWhisperer: an open-source platform for hardware embedded security research. In: Prouff, E. (ed.) Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, 13\u201315 April 2014. Revised Selected Papers, vol. 8622 of Lecture Notes in Computer Science, pp. 243\u2013260. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-319-10175-0_17","DOI":"10.1007\/978-3-319-10175-0_17"},{"key":"5_CR31","doi-asserted-by":"publisher","unstructured":"Pessl, P., Primas, R.: More practical single-trace attacks on the number theoretic transform. In: Schwabe, P., Th\u00e9riault, N. (eds.) Progress in Cryptology - LATINCRYPT 2019\u20136th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, 2\u20134 October 2019, Proceedings, vol. 11774 of Lecture Notes in Computer Science, pp. 130\u2013149. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-30530-7_7","DOI":"10.1007\/978-3-030-30530-7_7"},{"key":"5_CR32","doi-asserted-by":"publisher","unstructured":"Primas, R., Pessl, P., Mangard, S.: Single-trace side-channel attacks on masked lattice-based encryption. In: Fischer, W., Homma, N. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2017\u201319th International Conference, Taipei, Taiwan, 25\u201328 September 2017, Proceedings, vol. 10529 of Lecture Notes in Computer Science, pp. 513\u2013533. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_25","DOI":"10.1007\/978-3-319-66787-4_25"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Ravi, P., Roy, S.S., Chattopadhyay, A., Bhasin, S.: Generic side-channel attacks on CCA-secure lattice-based PKE and kems. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 307\u2013335 (2020)","DOI":"10.46586\/tches.v2020.i3.307-335"},{"key":"5_CR34","doi-asserted-by":"publisher","unstructured":"Reparaz, O., de Clercq, R., Roy, S.S., Vercauteren, F., Verbauwhede, I.: Additively homomorphic ring-LWE masking. In: Takagi, T. (ed.) Post-Quantum Cryptography, pp. 233\u2013244. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29360-8_15","DOI":"10.1007\/978-3-319-29360-8_15"},{"issue":"2","key":"5_CR35","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s13389-016-0126-5","volume":"6","author":"O Reparaz","year":"2016","unstructured":"Reparaz, O., Roy, S.S., de Clercq, R., Vercauteren, F., Verbauwhede, I.: Masking ring-LWE. J. Cryptogr. Eng. 6(2), 139\u2013153 (2016)","journal-title":"J. Cryptogr. Eng."},{"key":"5_CR36","unstructured":"Seiler, G.: Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography. IACR Cryptol. ePrint Arch., 39 (2018)"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Wang, J., Cao, W., Chen, H., Li, H.: Practical side-channel attack on masked message encoding in latticed-based kem. Cryptology ePrint Archive, Paper 2022\/859 (2022). https:\/\/eprint.iacr.org\/2022\/859","DOI":"10.1109\/TrustCom56396.2022.00122"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Wang, R., Brisfors, M., Dubrova, E.: A side-channel attack on a bitsliced higher-order masked crystals-kyber implementation. IACR Cryptol. ePrint Arch. 1042 (2023)","DOI":"10.1007\/978-3-031-54776-8_12"},{"issue":"2","key":"5_CR39","doi-asserted-by":"publisher","first-page":"328","DOI":"10.46586\/tches.v2021.i2.328-356","volume":"2021","author":"Y Xing","year":"2021","unstructured":"Xing, Y., Li, S.: A compact hardware implementation of CCA-secure key exchange mechanism CRYSTALS-Kyber on FPGA. IACR Trans. Cryptogr. Hardware Embed. Syst. 2021(2), 328\u2013356 (2021)","journal-title":"IACR Trans. Cryptogr. Hardware Embed. Syst."},{"key":"5_CR40","unstructured":"Yang, B., Ravi, P., Zhang, F., Shen, A., Bhasin, S.: STAMP-single trace attack on M-LWE pointwise multiplication in Kyber. Cryptology ePrint Archive, Paper 2023\/1184 (2023). https:\/\/eprint.iacr.org\/2023\/1184"},{"key":"5_CR41","doi-asserted-by":"publisher","unstructured":"Zijlstra, T., Bigou, K., Tisserand, A.: FPGA implementation and comparison of protections against SCAs for RLWE. In: Hao, F., Ruj, S., Gupta, S.S. (eds.) Progress in Cryptology - INDOCRYPT 2019, pp. 535\u2013555. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35423-7_27","DOI":"10.1007\/978-3-030-35423-7_27"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54773-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T16:10:49Z","timestamp":1709655049000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54773-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031547720","9783031547737"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54773-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wp.nyu.edu\/acns2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"54","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}