{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:25:10Z","timestamp":1778081110763,"version":"3.51.4"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031708893","type":"print"},{"value":"9783031708909","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70890-9_7","type":"book-chapter","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:24:24Z","timestamp":1725528264000},"page":"123-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Faster Post-quantum TLS 1.3 Based on\u00a0ML-KEM: Implementation and\u00a0Assessment"],"prefix":"10.1007","author":[{"given":"Jieyu","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Haoliang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Song","sequence":"additional","affiliation":[]},{"given":"Zhenhao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yafang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yunlei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,6]]},"reference":[{"key":"7_CR1","unstructured":"Hybrid key exchange in TLS 1.3. https:\/\/www.ietf.org\/archive\/id\/draft-ietf-tls-hybrid-design-04.html"},{"key":"7_CR2","unstructured":"Intel Xeon phi processor 7250 specifications. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/sku\/94035\/intel-xeon-phi-processor-7250-16gb-1-40-ghz-68-core\/specifications.html"},{"key":"7_CR3","unstructured":"OpenSSL: s_server- TLS\/SSL server program. OpenSSL documentation (2022). https:\/\/www.openssl.org\/docs\/man3.3\/man1\/s_server.html"},{"key":"7_CR4","unstructured":"OpenSSL: s_time- SSL\/TLS performance timing program. OpenSSL documentation (2022). https:\/\/www.openssl.org\/docs\/man3.3\/man1\/s_time.html"},{"key":"7_CR5","unstructured":"Kyber standard code (2024). https:\/\/github.com\/pq-crystals\/kyber\/tree\/standard. Accessed 27 March 2024"},{"key":"7_CR6","unstructured":"PQC - known answer tests and test vectors (2024). http:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/example-files.html. Accessed 21 June 2024"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Abiega-L\u2019Eglisse, A.F.D., Delgado-Vargas, K.A., Valencia-Rodriguez, F.Q., Quiroga, V.G., Gallegos-Garc\u00eda, G., Nakano-Miyatake, M.: Performance of new hope and crystals-dilithium postquantum schemes in the transport layer security protocol. IEEE Access 8, 213968\u2013213980 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3040324","DOI":"10.1109\/ACCESS.2020.3040324"},{"key":"7_CR8","unstructured":"Avanzi, R., et al.: Crystals-Kyber algorithm specifications and supporting documentation. NIST PQC Round 2(4), 1\u201343 (2019)"},{"key":"7_CR9","unstructured":"Baentsch, M., Paquin, C., Levitte, R., Hess, B., Segeth, J.: oqsprovider - open quantum safe provider for openSSL. Website (2023). https:\/\/github.com\/open-quantum-safe\/oqs-provider"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/3-540-47721-7_24","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"P Barrett","year":"1987","unstructured":"Barrett, P.: Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 311\u2013323. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_24"},{"key":"7_CR11","unstructured":"Bernstein, D.J., Brumley, B.B., Chen, M., Tuveri, N.: OpenSSLNTRU: Faster post-quantum TLS key exchange. In: Butler, K.R.B., Thomas, K. (eds.) 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, 10-12 August 2022, pp. 845\u2013862. USENIX Association (2022). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/bernstein"},{"key":"7_CR12","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van\u00a0Assche, G.: Sponge functions. In: ECRYPT hash workshop, vol.\u00a02007 (2007)"},{"key":"7_CR13","unstructured":"Blog, G.S.: Experimenting with post-quantum cryptography (2016). https:\/\/security.googleblog.com\/2016\/07\/experimenting-with-post-quantum.html. Accessed 18 June 2024"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Bos, J.W., Costello, C., Naehrig, M., Stebila, D.: Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In: 2015 IEEE Symposium on Security and Privacy, pp. 553\u2013570. IEEE (2015)","DOI":"10.1109\/SP.2015.40"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Bozhko, J., Hanna, Y., Harrilal-Parchment, R., Tonyali, S., Akkaya, K.: Performance evaluation of quantum-resistant TLS for consumer IoT devices. In: 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), pp. 230\u2013235. IEEE (2023)","DOI":"10.1109\/CCNC51644.2023.10060762"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Chang, Y.A., Chen, M.S., Wu, J.S., Yang, B.Y.: Postquantum SSL\/TLS for embedded systems. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp. 266\u2013270. IEEE (2014)","DOI":"10.1109\/SOCA.2014.23"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Cheng, H., Fotiadis, G., Groszsch\u00e4dl, J., Ryan, P.Y.: Highly vectorized SIKE for AVX-512. IACR Trans. Cryptographic Hardware Embed. Syst. (TCHES) 2022(2), 41\u201368 (2022)","DOI":"10.46586\/tches.v2022.i2.41-68"},{"issue":"4","key":"7_CR18","doi-asserted-by":"publisher","first-page":"618","DOI":"10.46586\/tches.v2021.i4.618-649","volume":"2021","author":"H Cheng","year":"2021","unstructured":"Cheng, H., Fotiadis, G., Groszsch\u00e4dl, J., Ryan, P.Y., Roenne, P.: Batching CSIDH group actions using AVX-512. IACR Trans. Cryptographic Hardware Embed. Syst. (TCHES) 2021(4), 618\u2013649 (2021)","journal-title":"IACR Trans. Cryptographic Hardware Embed. Syst. (TCHES)"},{"issue":"90","key":"7_CR19","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"JW Cooley","year":"1965","unstructured":"Cooley, J.W., Tukey, J.W.: An algorithm for the machine calculation of complex fourier series. Math. Comput. 19(90), 297\u2013301 (1965)","journal-title":"Math. Comput."},{"key":"7_CR20","unstructured":"Crockett, E., Paquin, C., Stebila, D.: Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. In: NIST 2nd PQC Standardization Conference. Santa Barbara, California (2019). published elsewhere"},{"key":"7_CR21","unstructured":"Douglas\u00a0Stebila, M.M.: liboqs project (2024). https:\/\/github.com\/open-quantum-safe\/liboqs"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Dowling, B., Fischlin, M., G\u00fcnther, F., Stebila, D.: A cryptographic analysis of the TLS 1.3 handshake protocol. J. Cryptol. 34(4), 37 (2021)","DOI":"10.1007\/s00145-021-09384-1"},{"issue":"3","key":"7_CR23","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1504\/IJSN.2021.117887","volume":"16","author":"J Fan","year":"2021","unstructured":"Fan, J., et al.: Impact of post-quantum hybrid certificates on PKI, common libraries, and protocols. Int. J. Secure. Network. 16(3), 200\u2013211 (2021)","journal-title":"Int. J. Secure. Network."},{"key":"7_CR24","unstructured":"National Institute for Standards and Technology (NIST): Secure hash algorithm-3 (SHA-3) standard: Permutation-based hash and extendable-output functions. FIPS 202 (2014)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Garcia, C.R., Aguilera, A.C., Olmos, J.J.V., Monroy, I.T., Rommel, S.: Quantum-resistant TLS 1.3: A hybrid solution combining classical, quantum and post-quantum cryptography. In: 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 246\u2013251. IEEE (2023)","DOI":"10.1109\/CAMAD59638.2023.10478407"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Gentleman, W.M., Sande, G.: Fast fourier transforms: for fun and profit. In: Proceedings of the 7-10 November 1966, fall joint computer conference, pp. 563\u2013578 (1966)","DOI":"10.1145\/1464291.1464352"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Gonzalez, R., Wiggers, T.: Kemtls vs. post-quantum TLS: performance on embedded systems. In: Batina, L., Picek, S., Mondal, M. (eds.) International Conference on Security, Privacy, and Applied Cryptography Engineering, vol. 13783, pp. 99\u2013117. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22829-2_6","DOI":"10.1007\/978-3-031-22829-2_6"},{"key":"7_CR28","doi-asserted-by":"publisher","unstructured":"Henrich, J., Heinemann, A., Wiesmaier, A., Schmitt, N.: Performance impact of PQC KEMs on TLS 1.3 under varying network characteristics. In: Athanasopoulos, E., Mennink, B. (eds.) International Conference on Information Security, vol. 14411, pp. 267\u2013287. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-49187-0_14","DOI":"10.1007\/978-3-031-49187-0_14"},{"key":"7_CR29","doi-asserted-by":"publisher","unstructured":"Huguenin-Dumittan, L., Vaudenay, S.: On IND-qCCA security in the ROM and its applications - CPA security is sufficient for TLS 1.3. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III. Lecture Notes in Computer Science, vol. 13277, pp. 613\u2013642. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07082-2_22","DOI":"10.1007\/978-3-031-07082-2_22"},{"key":"7_CR30","unstructured":"Force, I.E.T.: Hybrid Terminology for Post-Quantum Key Establishment. Tech. rep, Internet Engineering Task Force (2023)"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Jiang, H., Ma, Z., Zhang, Z.: Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query. In: Guo, J., Steinfeld, R. (eds.) International Conference on the Theory and Application of Cryptology and Information Security, vol. 14441, pp. 434\u2013468. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-981-99-8730-6_14","DOI":"10.1007\/978-981-99-8730-6_14"},{"key":"7_CR32","unstructured":"Kris\u00a0Kwiatkowski, L.V.: The TLS post-quantum experiment (2019). https:\/\/blog.cloudflare.com\/the-tls-post-quantum-experiment"},{"issue":"5","key":"7_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3609223","volume":"22","author":"D Lei","year":"2023","unstructured":"Lei, D., He, D., Peng, C., Luo, M., Liu, Z., Huang, X.: Faster implementation of ideal lattice-based cryptography using avx512. ACM Trans. Embed. Comput. Syst. 22(5), 1\u201318 (2023)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"7_CR34","unstructured":"Melissa\u00a0Azouaoui, J.W.B.: Surviving the Fo-Calypse: securing PQC implementations in practice (2022). https:\/\/iacr.org\/submit\/files\/slides\/2022\/rwc\/rwc2022\/48\/ slides.pdf"},{"issue":"170","key":"7_CR35","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44(170), 519\u2013521 (1985)","journal-title":"Math. Comput."},{"key":"7_CR36","unstructured":"National Institute of Standards and Technology: post-quantum cryptography standardization: Selected algorithms (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"7_CR37","unstructured":"Norm\u00a0Ashley, M.B.: Open quantum safe: software for the transition to quantum-resistant cryptography (2024). https:\/\/openquantumsafe.org\/"},{"key":"7_CR38","doi-asserted-by":"publisher","first-page":"120951","DOI":"10.1109\/ACCESS.2022.3222389","volume":"10","author":"JIE Pablos","year":"2022","unstructured":"Pablos, J.I.E., Marriaga, M.E., del Pozo, \u00c1.L.P.: Design and implementation of a post-quantum group authenticated key exchange protocol with the libOQS library: a comparative performance analysis from classic McEliece, Dowling, NTRU, and saber. IEEE Access 10, 120951\u2013120983 (2022)","journal-title":"IEEE Access"},{"key":"7_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-030-44223-1_5","volume-title":"Post-Quantum Cryptography","author":"C Paquin","year":"2020","unstructured":"Paquin, C., Stebila, D., Tamvada, G.: Benchmarking post-quantum cryptography in TLS. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 72\u201391. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_5"},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Paul, S., Kuzovkova, Y., Lahr, N., Niederhagen, R.: Mixed certificate chains for the transition to post-quantum authentication in TLS 1.3. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp. 727\u2013740 (2022)","DOI":"10.1145\/3488932.3497755"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Paul, S., Schick, F., Seedorf, J.: TPM-based post-quantum cryptography: A case study on quantum-resistant and mutually authenticated TLS for IoT environments. In: Proceedings of the 16th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2021)","DOI":"10.1145\/3465481.3465747"},{"key":"7_CR42","doi-asserted-by":"publisher","unstructured":"Rescorla, E.: The transport layer security TLS protocol version 1.3. Tech. Rep. RFC 8446, RFC Editor (2018). https:\/\/doi.org\/10.17487\/RFC8446","DOI":"10.17487\/RFC8446"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Roy, S.S.: SaberX4: high-throughput software implementation of saber key encapsulation mechanism. In: 2019 IEEE 37th International Conference on Computer Design (ICCD), pp. 321\u2013324. IEEE (2019)","DOI":"10.1109\/ICCD46524.2019.00050"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: Post-quantum TLS without handshake signatures. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1461\u20131480 (2020)","DOI":"10.1145\/3372297.3423350"},{"key":"7_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-88418-5_1","volume-title":"Computer Security \u2013 ESORICS 2021","author":"P Schwabe","year":"2021","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: More efficient post-quantum KEMTLS with pre-distributed public keys. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12972, pp. 3\u201322. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88418-5_1"},{"key":"7_CR46","unstructured":"Seiler, G.: Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography. IACR Cryptol. ePrint Arch, p.\u00a039 (2018). http:\/\/eprint.iacr.org\/2018\/039"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"7_CR48","doi-asserted-by":"publisher","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In: Han, D., Feldmann, A. (eds.) CoNEXT 2020: The 16th International Conference on emerging Networking EXperiments and Technologies, Barcelona, Spain, December, 2020, pp. 149\u2013156. ACM (2020). https:\/\/doi.org\/10.1145\/3386367.3431305","DOI":"10.1145\/3386367.3431305"},{"key":"7_CR49","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Post-quantum authentication in TLS 1.3: A performance study. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 23-26 February 2020. The Internet Society (2020). https:\/\/www.ndss-symposium.org\/ndss-paper\/post-quantum-authentication-in-tls-1-3-a-performance-study\/","DOI":"10.14722\/ndss.2020.24203"},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Sosnowski, M., et al.: The performance of post-quantum TLS 1.3. In: Companion of the 19th International Conference on emerging Networking EXperiments and Technologies, pp. 19\u201327 (2023)","DOI":"10.1145\/3624354.3630585"},{"key":"7_CR51","unstructured":"National Institute of Standards and Technology: Module-lattice-based digital signature standard. Federal Information Processing Standards Publication (FIPS) NIST FIPS 204 IPD, Department of Commerce, Washington, D.C. (2023)"},{"key":"7_CR52","unstructured":"National Institute of Standards and Technology: Module-lattice-based key-encapsulation mechanism standard. Federal Information Processing Standards Publication (FIPS) NIST FIPS 203 IPD, Department of Commerce, Washington, D.C. (2023)"},{"key":"7_CR53","unstructured":"National Institute of Standards and Technology: Stateless hash-based digital signature standard. Federal Information Processing Standards Publication (FIPS) NIST FIPS 205 IPD, Department of Commerce, Washington, D.C. (2023)"},{"key":"7_CR54","doi-asserted-by":"publisher","unstructured":"Tasopoulos, G., Li, J., Fournaris, A.P., Zhao, R.K., Sakzad, A., Steinfeld, R.: Performance evaluation of post-quantum TLS 1.3 on resource-constrained embedded systems. In: Su, C., Gritzalis, D., Piuri, V. (eds.) International Conference on Information Security Practice and Experience, vol. 13620, pp. 432\u2013451. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-21280-2_24","DOI":"10.1007\/978-3-031-21280-2_24"},{"key":"7_CR55","unstructured":"Westerbaan, B.: When to Barrett reduce in the inverse NTT. Cryptology ePrint Archive (2020)"},{"key":"7_CR56","unstructured":"Zhang, J., Huang, J., et\u00a0al.: ENG25519: faster TLS 1.3 handshake using optimized X25519 and Ed25519. In: Usenix Security (2024)"},{"key":"7_CR57","unstructured":"Zheng, J., Zhu, H., Song, Z., Wang, Z., Zhao, Y.: Optimized vectorization implementation of crystals-dilithium. arXiv preprint arXiv:2306.01989 (2023)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70890-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T20:12:26Z","timestamp":1732738346000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70890-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031708893","9783031708909"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70890-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"6 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}