{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T22:41:03Z","timestamp":1777675263871,"version":"3.51.4"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031577246","type":"print"},{"value":"9783031577253","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57725-3_6","type":"book-chapter","created":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:56:16Z","timestamp":1713056176000},"page":"157-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Algorithm for\u00a0Efficient Detection of\u00a0(N,\u00a0N)-Splittings and\u00a0Its Application to\u00a0the\u00a0Isogeny Problem in\u00a0Dimension 2"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2651-8951","authenticated-orcid":false,"given":"Maria","family":"Corte-Real Santos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5423-7714","authenticated-orcid":false,"given":"Craig","family":"Costello","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8904-6253","authenticated-orcid":false,"given":"Sam","family":"Frengley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,14]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-981-99-8739-9_4","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2023","author":"A Basso","year":"2023","unstructured":"Basso, A., Maino, L., Pope, G.: FESTA: fast encryption from supersingular torsion attacks. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023. LNCS, vol. 14444, pp. 98\u2013126. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8739-9_4"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The magma algebra system I. the user language. J. Symbolic Comput. 24(3\u20134), 235\u2013265 (1997). Computational algebra and number theory","DOI":"10.1006\/jsco.1996.0125"},{"key":"6_CR3","unstructured":"Brock, B.: Superspecial curves of genera two and three. PhD thesis, Princeton University (1994)"},{"issue":"1","key":"6_CR4","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1112\/S1461157014000461","volume":"18","author":"R Br\u00f6ker","year":"2015","unstructured":"Br\u00f6ker, R., Howe, E.W., Lauter, K.E., Stevenhagen, P.: Genus-2 curves and Jacobians with a given number of points. LMS J. Comput. Math. 18(1), 170\u2013197 (2015)","journal-title":"LMS J. Comput. Math."},{"issue":"5","key":"6_CR5","doi-asserted-by":"publisher","first-page":"992","DOI":"10.4153\/CJM-2011-039-3","volume":"63","author":"N Bruin","year":"2011","unstructured":"Bruin, N., Doerksen, K.: The arithmetic of genus two curves with $$(4,4)$$-split Jacobians. Canad. J. Math. 63(5), 992\u20131024 (2011)","journal-title":"Canad. J. Math."},{"key":"6_CR6","unstructured":"Bruin, N., Doerksen, K.: Electronic resources (2011). http:\/\/www.cecm.sfu.ca\/~nbruin\/splitigusa\/. Accessed Sept 2022"},{"issue":"57","key":"6_CR7","first-page":"2022","volume":"779","author":"W Castryck","year":"2021","unstructured":"Castryck, W., Decru, T.: Multiradical isogenies. Arithmetic Geom. Crypt. Coding Theory 779(57), 2022 (2021)","journal-title":"Arithmetic Geom. Crypt. Coding Theory"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-031-30589-4_15","volume-title":"Advances in Cryptology\u2013EUROCRYPT 2023","author":"W Castryck","year":"2023","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14008, pp. 423\u2013447. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15"},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1515\/jmc-2019-0021","volume":"14","author":"W Castryck","year":"2020","unstructured":"Castryck, W., Decru, T., Smith, B.: Hash functions from superspecial genus-2 curves using Richelot isogenies. J. Math. Crypt. 14(1), 268\u2013292 (2020)","journal-title":"J. Math. Crypt."},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00145-007-9002-x","volume":"22","author":"DX Charles","year":"2009","unstructured":"Charles, D.X., Lauter, K.E., Goren, E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93\u2013113 (2009)","journal-title":"J. Cryptol."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Chen, M., Leroux, A.: SCALLOP-HD: group action from 2-dimensional isogenies. IACR Cryptol. ePrint Arch., 1488 (2023)","DOI":"10.1007\/978-3-031-57725-3_7"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-031-15982-4_10","volume-title":"Advances in Cryptology - CRYPTO 2022","author":"M Corte-Real Santos","year":"2022","unstructured":"Corte-Real Santos, M., Costello, C., Shi, J.: Accelerating the Delfs-Galbraith algorithm with fast subfield root detection. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO 2022. LNCS, vol. 13509, pp. 285\u2013314. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15982-4_10"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-44223-1_9","volume-title":"Post-Quantum Cryptography","author":"C Costello","year":"2020","unstructured":"Costello, C., Smith, B.: The supersingular isogeny problem in genus 2 and beyond. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 151\u2013168. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_9"},{"key":"6_CR14","unstructured":"Cox, D.A., Little, J., O\u2019Shea, D.: Ideals, Varieties, and Algorithms. Undergraduate Texts in Mathematics. Springer, New York (2015)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQISignHD: new dimensions in cryptography. IACR Cryptol. ePrint Arch., 436 (2023)","DOI":"10.1007\/978-3-031-58716-0_1"},{"issue":"2","key":"6_CR16","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s10623-014-0010-1","volume":"78","author":"C Delfs","year":"2016","unstructured":"Delfs, C., Galbraith, S.D.: Computing isogenies between supersingular elliptic curves over $$\\mathbb{F} _p$$. Des. Codes Crypt. 78(2), 425\u2013440 (2016)","journal-title":"Des. Codes Crypt."},{"key":"6_CR17","unstructured":"Djukanovi\u0107, M.: Split Jacobians and Lower Bounds on Heights. PhD thesis, Leiden University and L\u2019Universit\u00e9 de Bordeaux (2017). https:\/\/hdl.handle.net\/1887\/54944"},{"key":"6_CR18","unstructured":"Djukanovi\u0107, M.: Families of (3,3)-split Jacobians. arXiv e-prints arXiv:1811.10075 (2018)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-031-22966-4_11","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2022","author":"L De Feo","year":"2022","unstructured":"De Feo, L., Dobson, S., Galbraith, S.D., Zobernig, L.: SIDH proof of knowledge. In: Agrawal, S., Lin, D. (eds.) ASIACRYPT 2022. LNCS, vol. 13792, pp. 310\u2013339. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22966-4_11"},{"key":"6_CR20","unstructured":"Fisher, T.: On families of 13-congruent elliptic curves. arXiv e-prints arXiv:1912.10777 (2019)"},{"key":"6_CR21","unstructured":"Fisher, T.: On pairs of 17-congruent elliptic curves. arXiv e-prints arXiv:2106.02033 (2021)"},{"key":"6_CR22","unstructured":"Florit, E., Smith, B.: An atlas of the Richelot isogeny graph. Cryptology ePrint Archive, Paper 2021\/013 (2021)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Florit, E., Smith, B.: Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph. Arithmetic Geom. Crypt. Coding Theory 2021 (2021)","DOI":"10.1090\/conm\/779\/15672"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-030-25510-7_16","volume-title":"Post-Quantum Cryptography","author":"EV Flynn","year":"2019","unstructured":"Flynn, E.V., Ti, Y.B.: Genus two isogeny cryptography. In: Ding, J., Steinwandt, R. (eds.) PQCrypto 2019. LNCS, vol. 11505, pp. 286\u2013306. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_16"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Frengley, S.: On $$12$$-congruences of elliptic curves. arXiv e-prints arXiv:2208.05842 (2022). To appear in Int. J. Number Theory","DOI":"10.1142\/S1793042124500301"},{"key":"6_CR26","doi-asserted-by":"publisher","unstructured":"Frey, G., Kani, E.: Curves of genus $$2$$ covering elliptic curves and an arithmetical application. In: Arithmetic Algebraic Geometry (Texel, 1989), Progress in Mathematics, vol. 89, pp. 153\u2013176. Birkh\u00e4user Boston, Boston, MA (1991). https:\/\/doi.org\/10.1007\/978-1-4612-0457-2_7","DOI":"10.1007\/978-1-4612-0457-2_7"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/3-540-45624-4_39","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"P Gaudry","year":"2001","unstructured":"Gaudry, P., Schost, \u00c9.: On the invariants of the quotients of the Jacobian of a curve of genus 2. In: Bozta\u015f, S., Shparlinski, I.E. (eds.) AAECC 2001. LNCS, vol. 2227, pp. 373\u2013386. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45624-4_39"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Gruenewald, D.: Computing Humbert surfaces and applications. In: Arithmetic, Geometry, Cryptography and Coding Theory 2009, Volume 521 of Contemporary Mathematics, pp. 59\u201369. American Mathematical Society, Providence, RI (2010)","DOI":"10.1090\/conm\/521\/10274"},{"issue":"1","key":"6_CR29","first-page":"37","volume":"91","author":"T Ibukiyama","year":"1994","unstructured":"Ibukiyama, T., Katsura, T.: On the field of definition of superspecial polarized abelian varieties and type numbers. Compositio Math. 91(1), 37\u201346 (1994)","journal-title":"Compositio Math."},{"issue":"2","key":"6_CR30","first-page":"127","volume":"57","author":"T Ibukiyama","year":"1986","unstructured":"Ibukiyama, T., Katsura, T., Oort, F.: Supersingular curves of genus two and class numbers. Compos. Math. 57(2), 127\u2013152 (1986)","journal-title":"Compos. Math."},{"issue":"72","key":"6_CR31","doi-asserted-by":"publisher","first-page":"612","DOI":"10.2307\/1970233","volume":"2","author":"J Igusa","year":"1960","unstructured":"Igusa, J.: Arithmetic variety of moduli for genus two. Ann. Math. 2(72), 612\u2013649 (1960)","journal-title":"Ann. Math."},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"175","DOI":"10.2307\/2372812","volume":"84","author":"J Igusa","year":"1962","unstructured":"Igusa, J.: On Siegel modular forms of genus two. Amer. J. Math. 84, 175\u2013200 (1962)","journal-title":"Amer. J. Math."},{"key":"6_CR33","unstructured":"Jordan, B.W., Zaytman, Y.: Isogeny graphs of superspecial abelian varieties and generalized Brandt matrices. arXiv preprint arXiv:2005.09031 (2020)"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.: On the quaternion-isogeny path problem. LMS J. Comput. Mathem. 17(A), 418\u2013432 (2014)","DOI":"10.1112\/S1461157014000151"},{"issue":"1","key":"6_CR35","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1090\/S0002-9947-1988-0936803-3","volume":"307","author":"RM Kuhn","year":"1988","unstructured":"Kuhn, R.M.: Curves of genus $$2$$ with split Jacobian. Trans. Amer. Math. Soc. 307(1), 41\u201349 (1988)","journal-title":"Trans. Amer. Math. Soc."},{"issue":"1","key":"6_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40687-015-0042-9","volume":"2","author":"A Kumar","year":"2015","unstructured":"Kumar, A.: Hilbert modular surfaces for square discriminants and elliptic subfields of genus 2 function fields. Res. Math. Sci. 2(1), 1\u201346 (2015)","journal-title":"Res. Math. Sci."},{"key":"6_CR37","unstructured":"Kunzweiler, S.: Efficient computation of $$(2^n,2^n)$$-isogenies. Cryptology ePrint Archive, Paper 2022\/990 (2022)"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Love, J., Boneh, D.: Supersingular curves with small noninteger endomorphisms. Open Book Ser. 4(1), 7\u201322 (2020). Appendices, https:\/\/arxiv.org\/pdf\/1910.03180.pdf","DOI":"10.2140\/obs.2020.4.7"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Lubicz, D., Robert, D.: Fast change of level and applications to isogenies. In: ANTS-XV (2022)","DOI":"10.1007\/s40993-022-00407-9"},{"issue":"3","key":"6_CR40","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1515\/FORUM.2009.027","volume":"21","author":"K Magaard","year":"2009","unstructured":"Magaard, K., Shaska, T., V\u00f6lklein, H.: Genus 2 curves that admit a degree 5 map to an elliptic curve. Forum Math. 21(3), 547\u2013566 (2009)","journal-title":"Forum Math."},{"key":"6_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/978-3-031-30589-4_16","volume-title":"Advances in Cryptology EUROCRYPT 2023","author":"L Maino","year":"2023","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14008, pp. 448\u2013471. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16"},{"key":"6_CR42","series-title":"Progress in Mathematics","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-1-4612-0441-1_21","volume-title":"Effective Methods in Algebraic Geometry","author":"F Mestre","year":"1990","unstructured":"Mestre, F.: Construction de courbes de genre 2 \u00e0 partir de leurs modules. In: Mora, T., Traverso, C. (eds.) Effective Methods in Algebraic Geometry. Progress in Mathematics, vol. 94, pp. 313\u2013334. Springer, Boston (1990). https:\/\/doi.org\/10.1007\/978-1-4612-0441-1_21"},{"key":"6_CR43","series-title":"Progress in Mathematics","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-0348-8303-0_13","volume-title":"Moduli of Abelian Varieties","author":"F Oort","year":"2001","unstructured":"Oort, F.: A stratification of a moduli space of abelian varieties. In: Faber, C., van der Geer, G., Oort, F. (eds.) Moduli of Abelian Varieties. Progress in Mathematics, vol. 195, pp. 345\u2013416. Birkh\u00e4user, Basel (2001). https:\/\/doi.org\/10.1007\/978-3-0348-8303-0_13"},{"key":"6_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-031-30589-4_17","volume-title":"Advances in Cryptology - EUROCRYPT 2023","author":"D Robert","year":"2023","unstructured":"Robert, D.: Breaking SIDH in Polynomial Time. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14008, pp. 472\u2013503. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17"},{"key":"6_CR45","unstructured":"Scott, M.: A note on the calculation of some functions in finite fields: tricks of the trade. Cryptology ePrint Archive (2020)"},{"issue":"5","key":"6_CR46","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1006\/jsco.2001.0439","volume":"31","author":"T Shaska","year":"2001","unstructured":"Shaska, T.: Curves of genus 2 with (n, n) decomposable Jacobians. J. Symb. Comput. 31(5), 603\u2013617 (2001)","journal-title":"J. Symb. Comput."},{"key":"6_CR47","unstructured":"Shaska, T.: Curves of Genus Two Covering Elliptic Curves. University of Florida (2001)"},{"issue":"2","key":"6_CR48","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1515\/form.2004.013","volume":"16","author":"T Shaska","year":"2004","unstructured":"Shaska, T.: Genus 2 fields with degree 3 elliptic subfields. Forum Math. 16(2), 263\u2013280 (2004)","journal-title":"Forum Math."},{"key":"6_CR49","doi-asserted-by":"publisher","unstructured":"Shaska, T., V\u00f6lklein, H.: Elliptic subfields and automorphisms of genus 2 function fields. In: Christensen, C., Sathaye, A., Sundaram, G., Bajaj, C. (eds.) Algebra, Arithmetic and Geometry with Applications, pp. 703\u2013723. Springer, Berlin (2004). https:\/\/doi.org\/10.1007\/978-3-642-18487-1_42","DOI":"10.1007\/978-3-642-18487-1_42"},{"issue":"4","key":"6_CR50","doi-asserted-by":"publisher","first-page":"307","DOI":"10.51286\/albjm\/1230370897","volume":"2","author":"T Shaska","year":"2008","unstructured":"Shaska, T., Wijesiri, G.S., Wolf, S., Woodland, L.: Degree 4 coverings of elliptic curves by genus 2 curves. Albanian J. Math. 2(4), 307\u2013318 (2008)","journal-title":"Albanian J. Math."},{"key":"6_CR51","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves, Volume 106 of Graduate Texts in Mathematics, 2nd (edn.). Springer, Dordrecht (2009)","DOI":"10.1007\/978-0-387-09494-6"},{"key":"6_CR52","series-title":"Mathematics for Industry","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-981-10-5065-7_6","volume-title":"Mathematical Modelling for Next-Generation Cryptography","author":"K Takashima","year":"2018","unstructured":"Takashima, K.: Efficient algorithms for isogeny sequences and their cryptographic applications. In: Takagi, T., Wakayama, M., Tanaka, K., Kunihiro, N., Kimoto, K., Duong, D.H. (eds.) Mathematical Modelling for Next-Generation Cryptography. MI, vol. 29, pp. 97\u2013114. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-5065-7_6"},{"issue":"4","key":"6_CR53","doi-asserted-by":"publisher","first-page":"789","DOI":"10.4134\/BKMS.2009.46.4.789","volume":"46","author":"K Takashima","year":"2009","unstructured":"Takashima, K., Yoshida, R.: An algorithm for computing a sequence of Richelot isogenies. Bull. Korean Math. Soc. 46(4), 789\u2013802 (2009)","journal-title":"Bull. Korean Math. Soc."},{"issue":"1","key":"6_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"PC van Oorschot","year":"1999","unstructured":"van Oorschot, P.C., Wiener, M.J.: Parallel collision search with cryptanalytic applications. J. Cryptol. 12(1), 1\u201328 (1999)","journal-title":"J. Cryptol."}],"container-title":["Lecture Notes in Computer Science","Public-Key Cryptography \u2013 PKC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57725-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T06:19:07Z","timestamp":1731737947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57725-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031577246","9783031577253"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57725-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PKC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IACR International Conference on Public-Key Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pkc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}