{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T01:13:28Z","timestamp":1779326008799,"version":"3.51.4"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031918254","type":"print"},{"value":"9783031918261","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-91826-1_10","type":"book-chapter","created":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T04:28:39Z","timestamp":1746592119000},"page":"300-332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["PRISM: Simple and\u00a0Compact Identification and\u00a0Signatures from Large Prime Degree Isogenies"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Basso","sequence":"first","affiliation":[]},{"given":"Giacomo","family":"Borin","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Castryck","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Corte-Real Santos","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Invernizzi","sequence":"additional","affiliation":[]},{"given":"Antonin","family":"Leroux","sequence":"additional","affiliation":[]},{"given":"Luciano","family":"Maino","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Vercauteren","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Wesolowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,5]]},"reference":[{"key":"10_CR1","unstructured":"SQIsign2D-West code. https:\/\/github.com\/SQISign\/sqisign2d-west-ac24"},{"key":"10_CR2","unstructured":"SQIsignHD code. https:\/\/github.com\/Pierrick-Dartois\/SQISignHD-lib"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/3-540-46035-7_28","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"M Abdalla","year":"2002","unstructured":"Abdalla, M., An, J.H., Bellare, M., Namprempre, C.: From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 418\u2013433. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46035-7_28"},{"issue":"209","key":"10_CR4","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1090\/S0025-5718-1995-1260124-2","volume":"64","author":"F Arnault","year":"1995","unstructured":"Arnault, F.: Rabin-Miller primality test: composite numbers which pass it. Math. Comput. 64(209), 355\u2013361 (1995)","journal-title":"Math. Comput."},{"key":"10_CR5","unstructured":"Basso, A., et al.: PRISM: Simple and Compact Identification and Signatures From Large Prime Degree Isogenies. Cryptology ePrint Archive, Paper 2025\/135 (2025)"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Basso, A., et al.: SQIsign2D-west - the fast, the small, and the safer. In: Chung, K.-M., Sasaki, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02024, Part\u00a0III. LNCS, vol. 15486, pp. 339\u2013370. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_11","DOI":"10.1007\/978-981-96-0891-1_11"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Baum, C., et al.: One tree to rule them all: optimizing GGM trees and OWFs for post-quantum signatures. Cryptology ePrint Archive, Paper 2024\/490 (2024)","DOI":"10.1007\/978-981-96-0875-1_15"},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2140\/obs.2020.4.39","volume":"4","author":"DJ Bernstein","year":"2020","unstructured":"Bernstein, D.J., De Feo, L., Leroux, A., Smith, B.: Faster computation of isogenies of large prime degree. Open Book Series 4(1), 39\u201355 (2020)","journal-title":"Open Book Series"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-662-46800-5_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"DJ Bernstein","year":"2015","unstructured":"Bernstein, D.J., et al.: SPHINCS: practical stateless hash-based signatures. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 368\u2013397. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_15"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-030-34578-5_9","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2019","author":"W Beullens","year":"2019","unstructured":"Beullens, W., Kleinjung, T., Vercauteren, F.: CSI-FiSh: efficient isogeny based signatures through class group computations. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11921, pp. 227\u2013247. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_9"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/978-3-319-13039-2_25","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2014","author":"J-F Biasse","year":"2014","unstructured":"Biasse, J.-F., Jao, D., Sankar, A.: A quantum algorithm for computing isogenies between supersingular elliptic curves. In: Meier, W., Mukhopadhyay, D. (eds.) INDOCRYPT 2014. LNCS, vol. 8885, pp. 428\u2013442. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13039-2_25"},{"key":"10_CR12","unstructured":"Boneh, D., Shoup, V.: A graduate course in applied cryptography. Draft 0.5 (2020)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Borin, G., Lai, Y.-F., Leroux, A.: Erebor and durian: full anonymous ring signatures from quaternions and isogenies. Cryptology ePrint Archive, Report 2024\/1185 (2024)","DOI":"10.62056\/ava3zivrzn"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Bos, J.W., et al.: CRYSTALS - kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy, London, United Kingdom, 24\u201326 April 2018, pp. 353\u2013367. IEEE Computer Society Press (2018)","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 423\u2013447. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"10_CR16","unstructured":"Chavez-Saab, J., et al.: SQISign specification (2023). https:\/\/sqisign.org\/spec\/sqisign-20230601.pdf. Accessed 04 Oct 2023"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Corte-Real Santos, M., Eriksen, J.K., Meyer, M., Reijnders, K.: Apr\u00e8ssqi: extra fast verification for sqisign using extension-field signing. In: Joye, M., Leander, G. (eds.) Advances in Cryptology - EUROCRYPT 2024, Part I. LNCS, vol. 14651, pp. 63\u201393. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_3","DOI":"10.1007\/978-3-031-58716-0_3"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Cremers, C., D\u00fczl\u00fc, S., Fiedler, R., Fischlin, M., Janson, C.: BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. In: 2021 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 24\u201327 May 2021, pp. 1696\u20131714. IEEE Computer Society Press (2021)","DOI":"10.1109\/SP40001.2021.00093"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQIsignHD: new dimensions in cryptography. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02024, Part\u00a0I. LNCS, vol. 14651, pp. 3\u201332. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_1","DOI":"10.1007\/978-3-031-58716-0_1"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Dartois, P., Maino, L., Pope, G., Robert, D.: An algorithmic approach to (2, 2)-isogenies in the theta model and applications to isogeny-based cryptography. In: Chung, K.-M., Sasaki, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02024, Part\u00a0III. LNCS, vol. 15486, pp. 304\u2013338. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_10","DOI":"10.1007\/978-981-96-0891-1_10"},{"key":"10_CR21","unstructured":"De Feo, L.: Mathematics of isogeny based cryptography. arXiv preprint arXiv:1711.04062 (2017)"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-64837-4_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"L De Feo","year":"2020","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020, Part I. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"De Feo, L., Leroux, A., Longa, P., Wesolowski, B.: New algorithms for the deuring correspondence - towards practical and secure SQISign signatures. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 659\u2013690. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_23","DOI":"10.1007\/978-3-031-30589-4_23"},{"issue":"2","key":"10_CR24","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s10623-014-0010-1","volume":"78","author":"C Delfs","year":"2016","unstructured":"Delfs, C., Galbraith, S.D.: Computing isogenies between supersingular elliptic curves over $$\\mathbb{F} _p$$. Des. Codes Crypt. 78(2), 425\u2013440 (2016)","journal-title":"Des. Codes Crypt."},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Deuring, M.: Die Typen der Multiplikatorenringe elliptischer Funktionenk\u00f6rper. In: Abhandlungen aus dem mathematischen Seminar der Universit\u00e4t Hamburg, vol. 14, pp. 197\u2013272. Springer, Heidelberg (1941)","DOI":"10.1007\/BF02940746"},{"issue":"1","key":"10_CR26","doi-asserted-by":"publisher","first-page":"238","DOI":"10.46586\/tches.v2018.i1.238-268","volume":"2018","author":"L Ducas","year":"2018","unstructured":"Ducas, L., et al.: CRYSTALS-Dilithium: a lattice-based digital signature scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1), 238\u2013268 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Duparc, M., Fouotsa, T.B.: SQIPrime: a dimension 2 variant of SQISignHD with non-smooth challenge isogenies. In: Chung, K.-M., Sasaki, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02024, Part\u00a0III. LNCS, vol. 15486, pp. 396\u2013429. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_13","DOI":"10.1007\/978-981-96-0891-1_13"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Elkies, N.D.: Elliptic and modular curves over finite fields and related computational issues. In: Computational Perspectives on Number Theory (Chicago, IL, 1995). AMS\/IP Studies in Advanced Mathematics, vol.\u00a07, pp. 21\u201376. American Mathematical Society (1998)","DOI":"10.1090\/amsip\/007\/03"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Eriksen, J.K., Panny, L., Sot\u00e1kov\u00e1, J., Veroni, M.: Deuring for the people: supersingular elliptic curves with prescribed endomorphism ring in general characteristic. In: LuCaNT: LMFDB, Computation, and Number Theory. Contemporary Mathematics, vol. 796, pp. 339\u2013373. American Mathematical Society (2024)","DOI":"10.1090\/conm\/796\/16008"},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12"},{"key":"10_CR31","unstructured":"Fouque, P.-A., et al.: FALCON: fast-fourier lattice-based compact signatures over NTRU. Submission to the NIST\u2019s Post-quantum Cryptography Standardization Process 36(5), 1\u201375 (2018)"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Galbraith, S.: Mathematics of public key cryptography. Cambridge University Press (2012)","DOI":"10.1017\/CBO9781139012843"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, STOC 1996, pp. 212\u2013219. Association for Computing Machinery, New York (1996)","DOI":"10.1145\/237814.237866"},{"issue":"1","key":"10_CR34","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1006\/jnth.1997.2105","volume":"64","author":"E Kani","year":"1997","unstructured":"Kani, E.: The existence of curves of genus two with elliptic differentials. J. Number Theory 64(1), 130\u2013161 (1997)","journal-title":"J. Number Theory"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.-P.: On the quaternion-isogeny path problem. LMS J. Comput. Math. 17(A), 418\u2013432 (2014)","DOI":"10.1112\/S1461157014000151"},{"key":"10_CR36","unstructured":"Kohel, D.R.: Endomorphism rings of elliptic curves over finite fields. PhD thesis, University of California, Berkeley (1996)"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Leroux, A.: Verifiable random function from the deuring correspondence and higher dimensional isogenies. In: Advances in Cryptology \u2013 EUROCRYPT 2025. LNCS. Springer, Cham (2025, to appear)","DOI":"10.1007\/978-3-031-91098-2_7"},{"key":"10_CR38","doi-asserted-by":"publisher","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 448\u2013471. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"10_CR39","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., Onuki, H.: QFESTA: efficient algorithms and parameters for FESTA using quaternion algebras. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02024, Part\u00a0V. LNCS, vol. 14924, pp. 75\u2013106. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-68388-6_4","DOI":"10.1007\/978-3-031-68388-6_4"},{"key":"10_CR40","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., Onuki, H., Castryck, W., Chen, M., Invernizzi, R., Lorenzon, G.: SQIsign2D-east: a new signature scheme using 2-dimensional isogenies. In: Chung, K.-M., Sasaki, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02024, Part\u00a0III. LNCS, vol. 15486, pp. 272\u2013303. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_9","DOI":"10.1007\/978-981-96-0891-1_9"},{"key":"10_CR41","unstructured":"National\u00a0Institute of\u00a0Standards and Technology (NIST). Call for Additional Digital Signature Schemes for the Post-Quantum Cryptography Standardization Process (2022)"},{"key":"10_CR42","unstructured":"Page, A., Robert, D.: Introducing clapoti(s): evaluating the isogeny class group action in polynomial time. Cryptology ePrint Archive, Paper 2023\/1766 (2023)"},{"key":"10_CR43","unstructured":"Renan, F., Kutas, P.: SQIAsignHD: SQIsignHD adaptor signature. Cryptology ePrint Archive, Report 2024\/561 (2024)"},{"key":"10_CR44","doi-asserted-by":"publisher","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 472\u2013503. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"10_CR45","unstructured":"Robert, D.: On the efficient representation of isogenies. Cryptology ePrint Archive, Paper 2024\/1071 (2024). https:\/\/eprint.iacr.org\/2024\/1071"},{"key":"10_CR46","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The arithmetic of elliptic curves, vol. 106. Springer (2009)","DOI":"10.1007\/978-0-387-09494-6"},{"key":"10_CR47","doi-asserted-by":"crossref","unstructured":"Stinson, D.R.: Cryptography: theory and practice. Chapman and Hall\/CRC (2005)","DOI":"10.1201\/9781420057133"},{"key":"10_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"PC van Oorschot","year":"1999","unstructured":"van Oorschot, P.C., Wiener, M.J.: Parallel collision search with cryptanalytic applications. J. Cryptol. 12, 1\u201328 (1999)","journal-title":"J. Cryptol."},{"key":"10_CR49","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques. Comptes Rendus de l\u2019Acad\u00e9mie des Sciences de Paris 273, 238\u2013241 (1971)"},{"key":"10_CR50","doi-asserted-by":"crossref","unstructured":"Voight, J.: Quaternion algebras. Graduate Texts in Mathematics, vol. 288. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-56694-4"}],"container-title":["Lecture Notes in Computer Science","Public-Key Cryptography \u2013 PKC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-91826-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T04:29:28Z","timestamp":1746592168000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-91826-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031918254","9783031918261"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-91826-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"5 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PKC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IACR International Conference on Public-Key Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"R\u00f8ros","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pkc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pkc.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}