{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T14:30:25Z","timestamp":1747319425447,"version":"3.40.3"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031683909"},{"type":"electronic","value":"9783031683916"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-68391-6_2","type":"book-chapter","created":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T19:02:14Z","timestamp":1723834934000},"page":"37-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods"],"prefix":"10.1007","author":[{"given":"Avital","family":"Shafran","sequence":"first","affiliation":[]},{"given":"Eran","family":"Malach","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Ristenpart","sequence":"additional","affiliation":[]},{"given":"Gil","family":"Segev","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Tessaro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,17]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Applebaum, B., Barak, B., Wigderson, A.: Public-key cryptography from different assumptions. In: Proceedings of the Forty-second ACM Symposium on Theory of Computing, pp. 171\u2013180(2010)","DOI":"10.1145\/1806689.1806715"},{"key":"2_CR2","unstructured":"Arora, S., Du, S., Hu, W., Li, Z., Wang, R.: Fine-grained analysis of optimization and generalization for overparameterized two-layer neural networks. In: International Conference on Machine Learning, pp. 322\u2013332. PMLR (2019)"},{"key":"2_CR3","first-page":"24340","volume":"34","author":"E Abbe","year":"2021","unstructured":"Abbe, E., Kamath, P., Malach, E., Sandon, C., Srebro, N.: On the power of differentiable learning versus PAC and SQ learning. Adv. Neural. Inf. Process. Syst. 34, 24340\u201324351 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2_CR4","unstructured":"Abbe, E., Sandon, C.: Poly-time universality and limitations of deep learning. arXiv preprint arXiv:2001.02992 (2020)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Baksi, A., Baksi, A.: Machine learning-assisted differential distinguishers for lightweight ciphers. In: Classical and Physical Security of Symmetric Key Cryptographic Algorithms, pp. 141\u2013162(2022)","DOI":"10.1007\/978-981-16-6522-6_6"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-642-17401-8_23","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"DJ Bernstein","year":"2010","unstructured":"Bernstein, D.J., Chen, H.-C., Cheng, C.-M., Lange, T., Niederhagen, R., Schwabe, P., Yang, B.-Y.: ECC2K-130 on NVIDIA GPUs. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 328\u2013346. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17401-8_23"},{"key":"2_CR7","unstructured":"Bernstein, D.J.: Better price-performance ratios for generalized birthday attacks. Workshop Record of SHARCS 2007: Special-purpose Hardware for Attacking Cryptographic Systems (2007)"},{"key":"2_CR8","first-page":"719","volume":"2021","author":"Z Bao","year":"2021","unstructured":"Bao, Z., Guo, J., Liu, M., Ma, L., Tu, Y.: Conditional differential-neural cryptanalysis. IACR Cryptol. ePrint Arch. 2021, 719 (2021)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/978-3-030-77870-5_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"A Benamira","year":"2021","unstructured":"Benamira, A., Gerault, D., Peyrin, T., Tan, Q.Q.: A deeper look at machine learning-based cryptanalysis. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12696, pp. 805\u2013835. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_28"},{"key":"2_CR10","unstructured":"Buzaglo, G., et al.: Deconstructing data reconstruction: Multiclass, weight decay and general losses. arXiv preprint arXiv:2307.01827 (2023)"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1504\/IJACT.2012.045590","volume":"2","author":"JW Bos","year":"2012","unstructured":"Bos, J.W., Kaihara, M.E., Kleinjung, T., Lenstra, A.K., Montgomery, P.L.: Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. Int. J. Appl. Cryptogr. 2(3), 212\u2013228 (2012)","journal-title":"Int. J. Appl. Cryptogr."},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-12678-9_14","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"JW Bos","year":"2010","unstructured":"Bos, J.W., Kleinjung, T., Niederhagen, R., Schwabe, P.: ECC2K-130 on cell CPUs. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 225\u2013242. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12678-9_14"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-10628-6_2","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"DJ Bernstein","year":"2009","unstructured":"Bernstein, D.J., Lange, T., Niederhagen, R., Peters, C., Schwabe, P.: FSBday: Implementing Wagner\u2019s generalized birthday attack against the SHA-3 round-1 candidate FSB. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 18\u201338. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10628-6_2"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Bao, Z., Lu, J., Yao, Y., Zhang, L.: More insight on deep learning-aided cryptanalysis. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 436\u2013467. Springer (2023). https:\/\/doi.org\/10.1007\/978-981-99-8727-6_15","DOI":"10.1007\/978-981-99-8727-6_15"},{"key":"2_CR15","unstructured":"Bos, J.W.: Parallel cryptanalysis. Summer school on real-world crypto and privacy, Croatia (2015). Slides available at https:\/\/summerschool-croatia.cs.ru.nl\/2015\/Parallel Cryptanalysis.pdf"},{"key":"2_CR16","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck families of lightweight block ciphers. Cryptology ePrint Archive, Paper 2013\/404 (2013). https:\/\/eprint.iacr.org\/2013\/404"},{"key":"2_CR17","unstructured":"Carlini, N., Liu, C., Erlingsson, \u00da., Kos, J., Song, D.: The secret sharer: Evaluating and testing unintended memorization in neural networks. In: 28th USENIX Security Symposium (USENIX Security 19), pp. 267\u2013284 (2019)"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-25385-0_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"Y Chen","year":"2011","unstructured":"Chen, Y., Nguyen, P.Q.: BKZ 2.0: better lattice security estimates. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 1\u201320. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25385-0_1"},{"key":"2_CR19","unstructured":"Cook, S.A.: The complexity of theorem-proving procedures. In: Logic, Automata, and Computational Complexity: The Works of Stephen A. Cook, pp. 143\u2013152 (2023)"},{"issue":"6","key":"2_CR20","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1093\/comjnl\/bxac019","volume":"66","author":"Y Chen","year":"2023","unstructured":"Chen, Y., Shen, Y., Yu, H., Yuan, S.: A new neural distinguisher considering features derived from multiple ciphertext pairs. Comput. J. 66(6), 1419\u20131433 (2023)","journal-title":"Comput. J."},{"key":"2_CR21","first-page":"9007","volume":"33","author":"A Daniely","year":"2020","unstructured":"Daniely, A.: Neural networks learning and memorization with (almost) no over-parameterization. Adv. Neural. Inf. Process. Syst. 33, 9007\u20139016 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-13051-4_9","volume-title":"Selected Areas in Cryptography \u2013 SAC 2014","author":"I Dinur","year":"2014","unstructured":"Dinur, I.: Improved differential cryptanalysis of round-reduced speck. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 147\u2013164. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13051-4_9"},{"key":"2_CR23","unstructured":"Du, S., Lee, J., Li, H., Wang, L., Zhai, X.: Gradient descent finds global minima of deep neural networks. In: International Conference on Machine Learning, pp. 1675\u20131685. PMLR (2019)"},{"key":"2_CR24","unstructured":"Ducas, L., Postlethwaite, E., Sot\u00e1kov\u00e1, J.: Salsa Verde versus the actual state of the art. CRYPTO 2023 Rump Session Talk. https:\/\/crypto.iacr.org\/2023\/rump\/crypto2023rump-paper13.pdf (2023)"},{"key":"2_CR25","unstructured":"Gohr, A., Leander, G., Neumann, P.: An assessment of differential-neural distinguishers. Cryptology ePrint Archive, Paper 2022\/1521 (2022). https:\/\/eprint.iacr.org\/2022\/1521"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-26951-7_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"A Gohr","year":"2019","unstructured":"Gohr, A.: Improving attacks on round-reduced Speck32\/64 using deep learning. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11693, pp. 150\u2013179. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26951-7_6"},{"key":"2_CR27","unstructured":"Hou, Z., Ren, J., Chen, S.: Cryptanalysis of round-reduced simon32 based on deep learning. Cryptology ePrint Archive, Paper 2021\/362 (2021). https:\/\/eprint.iacr.org\/2021\/362"},{"key":"2_CR28","unstructured":"Hou, Z., Ren, J., Chen, S.: Improve neural distinguisher for cryptanalysis. Cryptology ePrint Archive, Paper 2021\/1017 (2021). https:\/\/eprint.iacr.org\/2021\/1017"},{"key":"2_CR29","first-page":"22911","volume":"35","author":"N Haim","year":"2022","unstructured":"Haim, N., Vardi, G., Yehudai, G., Shamir, O., Irani, M.: Reconstructing training data from trained neural networks. Adv. Neural. Inf. Process. Syst. 35, 22911\u201322924 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"2_CR31","unstructured":"Jacot, A., Gabriel, F., Hongler, C.: Neural tangent kernel: convergence and generalization in neural networks. Adv. Neural Inform. Process. Syst. 31 (2018)"},{"key":"2_CR32","unstructured":"Jain, A., Kohli, V., Mishra, G.: Deep learning based differential distinguisher for lightweight cipher present. Cryptology ePrint Archive, Paper 2020\/846 (2020). https:\/\/eprint.iacr.org\/2020\/846"},{"key":"2_CR33","unstructured":"Kingma, D.P., Ba., J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"issue":"6","key":"2_CR34","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1145\/293347.293351","volume":"45","author":"M Kearns","year":"1998","unstructured":"Kearns, M.: Efficient noise-tolerant learning from statistical queries. J. ACM (JACM) 45(6), 983\u20131006 (1998)","journal-title":"J. ACM (JACM)"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Kharitonov, M.: Cryptographic hardness of distribution-specific learning. In: Proceedings of the Twenty-fifth Annual ACM Symposium on Theory of Computing, pp. 372\u2013381 (1993)","DOI":"10.1145\/167088.167197"},{"issue":"1","key":"2_CR36","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.jcss.2008.07.008","volume":"75","author":"AR Klivans","year":"2009","unstructured":"Klivans, A.R., Sherstov, A.A.: Cryptographic hardness for learning intersections of halfspaces. J. Comput. Syst. Sci. 75(1), 2\u201312 (2009)","journal-title":"J. Comput. Syst. Sci."},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Kearns, M.J., Valiant, L.G.: Cryptographic limitations on learning boolean formulae and finite automata. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing, pp. 433\u2013444 (1989)","DOI":"10.1145\/73007.73049"},{"issue":"3","key":"2_CR38","first-page":"115","volume":"9","author":"LA Levin","year":"1973","unstructured":"Levin, L.A.: Universal sequential search problems. Problemy peredachi informatsii 9(3), 115\u2013116 (1973)","journal-title":"Problemy peredachi informatsii"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Lu, J., Liu, G., Sun, B., Li, C., Liu, L.: Improved (related-key) differential-based neural distinguishers for simon and simeck block ciphers. arXiv preprint arXiv:2201.03767 (2022)","DOI":"10.1093\/comjnl\/bxac195"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Li, C., Sotakova, J., Wenger, E., Allen-Zhu, Z., Charton, F., Lauter, K.: Salsa verde: a machine learning attack on learning with errors with sparse small secrets. arXiv preprint arXiv:2306.11641 (2023)","DOI":"10.1145\/3576915.3623076"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Li, C., Sot\u00e1kov\u00e1, J., Wenger, E., Malhou, M., Garcelon, E., Charton, F., Lauter, K.: Salsa picante: a machine learning attack on lwe with binary secrets. arXiv preprint arXiv:2303.04178 (2023)","DOI":"10.1145\/3576915.3623076"},{"key":"2_CR42","unstructured":"Micciancio, D.: Parallel algorithms for lattice problems. https:\/\/cseweb.ucsd.edu\/~daniele\/LatticeLinks\/Parallel.html"},{"key":"2_CR43","unstructured":"Niederhagen, R.: Parallel Cryptanalysis. PhD thesis, Eindhoven University of Technology (2012). http:\/\/polycephaly.org\/thesis\/niederhagen-thesis-printed.pdf"},{"key":"2_CR44","first-page":"918","volume":"32","author":"JM Pollard","year":"1978","unstructured":"Pollard, J.M.: Monte Carlo methods for index computation (mod $$p$$). Math. Comput. 32, 918\u2013924 (1978)","journal-title":"Math. Comput."},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 84\u201393 (2005)","DOI":"10.1145\/1060590.1060603"},{"key":"2_CR46","doi-asserted-by":"publisher","unstructured":"Rivest, R.L.: Cryptography and machine learning. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 427\u2013439. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-57332-1_36","DOI":"10.1007\/3-540-57332-1_36"},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"Robbins, H., Monro, S.: A stochastic approximation method. Annals math. stat., 400\u2013407 (1951)","DOI":"10.1214\/aoms\/1177729586"},{"key":"2_CR48","unstructured":"Ruder, S.: An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747 (2016)"},{"key":"2_CR49","doi-asserted-by":"crossref","unstructured":"Song, C., Ristenpart, T., Shmatikov, V.: Machine learning models that remember too much. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 587\u2013601 (2017)","DOI":"10.1145\/3133956.3134077"},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"Shalev-Shwartz, S., Ben-David, S.: Understanding machine learning: From theory to algorithms. Cambridge university press (2014)","DOI":"10.1017\/CBO9781107298019"},{"key":"2_CR51","unstructured":"Stevens, S., et al.: SALSA FRESCA: Angular embeddings and pre-training for ML attacks on learning with errors. Cryptology ePrint Archive, Paper 2024\/150 (2024)"},{"key":"2_CR52","first-page":"29602","volume":"34","author":"MJ Song","year":"2021","unstructured":"Song, M.J., Zadik, I., Bruna, J.: On the cryptographic hardness of learning single periodic neurons. Adv. Neural. Inf. Process. Syst. 34, 29602\u201329615 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-71852-7_1","volume-title":"Information Security and Cryptology","author":"H-C Su","year":"2021","unstructured":"Su, H.-C., Zhu, X.-Y., Ming, D.: Polytopic attack on round-reduced Simon32\/64 using deep learning. In: Wu, Y., Yung, M. (eds.) Inscrypt 2020. LNCS, vol. 12612, pp. 3\u201320. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-71852-7_1"},{"issue":"11","key":"2_CR54","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1145\/1968.1972","volume":"27","author":"LG Valiant","year":"1984","unstructured":"Valiant, L.G.: A theory of the learnable. Commun. ACM 27(11), 1134\u20131142 (1984)","journal-title":"Commun. ACM"},{"issue":"1","key":"2_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"PC van Oorschot","year":"1999","unstructured":"van Oorschot, P.C., Wiener, M.J.: Parallel collision search with cryptanalytic applications. J. Cryptol. 12(1), 1\u201328 (1999)","journal-title":"J. Cryptol."},{"key":"2_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-45708-9_19","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"D Wagner","year":"2002","unstructured":"Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288\u2013304. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45708-9_19"},{"key":"2_CR57","first-page":"34981","volume":"35","author":"E Wenger","year":"2022","unstructured":"Wenger, E., Chen, M., Charton, F., Lauter, K.E.: Salsa: attacking lattice cryptography with transformers. Adv. Neural. Inf. Process. Syst. 35, 34981\u201334994 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-030-88238-9_10","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2021","author":"T Yadav","year":"2021","unstructured":"Yadav, T., Kumar, M.: Differential-ML distinguisher: machine learning based generic extension for\u00a0differential cryptanalysis. In: Longa, P., R\u00e0fols, C. (eds.) LATINCRYPT 2021. LNCS, vol. 12912, pp. 191\u2013212. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88238-9_10"},{"key":"2_CR59","unstructured":"Zhang, C., Bengio, S., Hardt, M., Recht, B., Vinyals, O.: Understanding deep learning requires rethinking generalization. In: International Conference on Learning Representations (2017)"},{"key":"2_CR60","unstructured":"Zhang, L., Wang, Z.: Improving differential-neural distinguisher model for des, chaskey, and present. arXiv preprint arXiv:2204.06341 (2022)"},{"key":"2_CR61","unstructured":"Zhang, L., Wang, Z., Wang, B.: Improving differential-neural cryptanalysis. Cryptology ePrint Archive, Paper 2022\/183 (2022). https:\/\/eprint.iacr.org\/2022\/183"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68391-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:03:38Z","timestamp":1730214218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68391-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031683909","9783031683916"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68391-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"17 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}