{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T12:33:00Z","timestamp":1776774780677,"version":"3.51.2"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032067531","type":"print"},{"value":"9783032067548","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06754-8_14","type":"book-chapter","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T08:24:19Z","timestamp":1759307059000},"page":"373-398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Generic Partial Decryption as\u00a0Feature Engineering for\u00a0Neural Distinguishers"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2349-0247","authenticated-orcid":false,"given":"Emanuele","family":"Bellini","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2481-410X","authenticated-orcid":false,"given":"Rocco","family":"Brunelli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8583-0668","authenticated-orcid":false,"given":"David","family":"Gerault","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5357-832X","authenticated-orcid":false,"given":"Anna","family":"Hambitzer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9016-074X","authenticated-orcid":false,"given":"Marco","family":"Pedicini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"key":"14_CR1","unstructured":"Avanzi, R., Dunkelman, O., Ghosh, S.: A note on ARADI and LLAMA. IACR Cryptology ePrint Archive, p. 1328 (2024)"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/978-3-540-71039-4_30","volume-title":"Fast Software Encryption","author":"J-P Aumasson","year":"2008","unstructured":"Aumasson, J.-P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New features of Latin dances: analysis of Salsa, ChaCha, and Rumba. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 470\u2013488. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-71039-4_30"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Baksi, A., Breier, J., Chen, Y., Dong, X.: Machine learning assisted differential distinguishers for lightweight ciphers. In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2021, Grenoble, France, 1\u20135 February 2021, pp. 176\u2013181. IEEE (2021)","DOI":"10.23919\/DATE51398.2021.9474092"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Baksi, A., Breier, J., Chen, Y., Dong, X.: Machine learning-assisted differential distinguishers for lightweight ciphers. In: Classical and Physical Security of Symmetric Key Cryptographic Algorithms, pp. 141\u2013162 (2022)","DOI":"10.1007\/978-981-16-6522-6_6"},{"key":"14_CR5","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-031-58716-0_8","volume-title":"EUROCRYPT 2024","author":"C Boura","year":"2024","unstructured":"Boura, C., David, N., Derbez, P., Heim Boissier, R., Naya-Plasencia, M.: A generic algorithm for efficient key recovery in differential attacks \u2013 and its associated tool. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024. LNCS, vol. 14651, pp. 217\u2013248. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_8"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Bellini, E., et al.: Claasping ARADI: automated analysis of the ARADI block cipher. IACR Cryptology ePrint Archive, p. 1324 (2024)","DOI":"10.1007\/978-3-031-80311-6_5"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Bellini, E., et al.: CLAASPing ARADI: automated analysis of the ARADI block cipher. Cryptology ePrint Archive, Paper 2024\/1324 (2024)","DOI":"10.1007\/978-3-031-80311-6_5"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-21702-9_3","volume-title":"Fast Software Encryption","author":"C Blondeau","year":"2011","unstructured":"Blondeau, C., G\u00e9rard, B.: Multiple differential cryptanalysis: theory and practice. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 35\u201354. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21702-9_3"},{"key":"14_CR9","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-031-53368-6_19","volume-title":"SAC 2023","author":"E Bellini","year":"2024","unstructured":"Bellini, E., et al.: CLAASP: a cryptographic library for the automated analysis of symmetric primitives. In: Carlet, C., Mandal, K., Rijmen, V. (eds.) SAC 2023. LNCS, vol. 14201, pp. 387\u2013408. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-53368-6_19"},{"issue":"3","key":"14_CR10","doi-asserted-by":"publisher","first-page":"184","DOI":"10.46586\/tosc.v2023.i3.184-212","volume":"2023","author":"E Bellini","year":"2023","unstructured":"Bellini, E., Gerault, D., Hambitzer, A., Rossi, M., et al.: A cipher-agnostic neural training pipeline with automated finding of good input differences. IACR Trans. Symmetric Cryptol. 2023(3), 184\u2013212 (2023)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"14_CR11","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-031-22963-3_11","volume-title":"ASIACRYPT 2022","author":"Z Bao","year":"2022","unstructured":"Bao, Z., Guo, J., Liu, M., Ma, L., Tu, Y.: Enhancing differential-neural cryptanalysis. In: Agrawal, S., Lin, D. (eds.) ASIACRYPT 2022. LNCS, vol. 13791, pp. 318\u2013347. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22963-3_11"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/978-3-030-77870-5_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"A Benamira","year":"2021","unstructured":"Benamira, A., Gerault, D., Peyrin, T., Tan, Q.Q.: A deeper look at machine learning-based cryptanalysis. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12696, pp. 805\u2013835. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_28"},{"key":"14_CR13","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-981-99-8727-6_15","volume-title":"ASIACRYPT 2023","author":"Z Bao","year":"2023","unstructured":"Bao, Z., Lu, J., Yao, Y., Zhang, L.: More insight on deep learning-aided cryptanalysis. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023. LNCS, vol. 14440, pp. 436\u2013467. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8727-6_15"},{"key":"14_CR14","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/978-3-030-80129-8_48","volume-title":"Intelligent Computing","author":"E Bellini","year":"2021","unstructured":"Bellini, E., Rossi, M.: Performance comparison between deep learning-based and conventional cryptographic distinguishers. In: Arai, K. (ed.) Intelligent Computing. LNNS, vol. 285, pp. 681\u2013701. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-80129-8_48"},{"key":"14_CR15","unstructured":"Bellini, E., Rachidi, M., Rohit, R., Tiwari, S.K.: Mind the composition of Toffoli gates: structural algebraic distinguishers of ARADI. IACR Cryptology ePrint Archive, p. 1559 (2024)"},{"issue":"1","key":"14_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991). https:\/\/doi.org\/10.1007\/BF00630563","journal-title":"J. Cryptol."},{"key":"14_CR17","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Paper 2013\/404 (2013)"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Chen, Y., Bao, Z., Shen, Y., Yu, H.: A deep learning aided key recovery framework for large-state block ciphers. Cryptology ePrint Archive (2022)","DOI":"10.1360\/SSI-2022-0298"},{"issue":"3","key":"14_CR19","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith, D.: The Data Encryption Standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243\u2013250 (1994)","journal-title":"IBM J. Res. Dev."},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"2480","DOI":"10.1093\/comjnl\/bxac099","volume":"66","author":"Y Chen","year":"2023","unstructured":"Chen, Y., Shen, Y., Hongbo, Yu.: Neural-aided statistical attack for cryptanalysis. Comput. J. 66, 2480\u20132498 (2023)","journal-title":"Comput. J."},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Chen, Y., Shen, Y., Yu, H., Yuan, S.: A new neural distinguisher considering features derived from multiple ciphertext Pairs. Comput. J. (2022)","DOI":"10.1093\/comjnl\/bxac019"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Deng, H., Cao, X., Cheng, Y.: Attention in differential cryptanalysis on lightweight block cipher SPECK. In: 2023 20th Annual International Conference on Privacy, Security and Trust (PST), pp. 1\u20139. IEEE (2023)","DOI":"10.1109\/PST58708.2023.10320201"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Domingos, P.: A few useful things to know about machine learning. Commun. ACM 55(10), 78\u201387 (2012). https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2347736.2347755","DOI":"10.1145\/2347736.2347755"},{"key":"14_CR24","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-031-30122-3_8","volume-title":"FPS 2022","author":"A Ebrahimi","year":"2022","unstructured":"Ebrahimi, A., Regazzoni, F., Palmieri, P.: Reducing the cost of machine learning differential attacks using bit selection and a partial ML-distinguisher. In: Jourdan, G.V., Mounier, L., Adams, C., S\u00e8des, F., Garcia-Alfaro, J. (eds.) FPS 2022. LNCS, vol. 13877, pp. 123\u2013141. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-30122-3_8"},{"key":"14_CR25","unstructured":"Gerault, D., Hambitzer, A., Huppert, M., Picek, S.: SoK: 5 years of neural differential cryptanalysis. Cryptology ePrint Archive (2024)"},{"key":"14_CR26","unstructured":"Gohr, A., Leander, G., Neumann, P.: An assessment of differential-neural distinguishers. Cryptology ePrint Archive, Paper 2022\/1521 (2022). https:\/\/eprint.iacr.org\/2022\/1521"},{"key":"14_CR27","unstructured":"Gohr, A., Leander, G., Neumann, P.: An assessment of differential-neural distinguishers. In: AICrypt 2023 - 3RD Workshop on Artificial Intelligence and Cryptography (2023)"},{"key":"14_CR28","unstructured":"Greene, P., Motley, M., Weeks, B.: ARADI and LLAMA: low-latency cryptography for memory encryption. Cryptology ePrint Archive, Paper 2024\/1240 (2024)"},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-26951-7_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"A Gohr","year":"2019","unstructured":"Gohr, A.: Improving attacks on round-reduced speck32\/64 using deep learning. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11693, pp. 150\u2013179. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26951-7_6"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Hou, Z., Ren, J., Chen, S., Fu, A.: Improve neural distinguishers of SIMON and SPECK. Sec. Commun. Netw. 2021 (2021)","DOI":"10.1155\/2021\/9288229"},{"key":"14_CR31","unstructured":"Libralesso, L., Delobel, F., Lafourcade, P., Solnon, C.: Automatic generation of declarative models for differential cryptanalysis. In: Michel, L.D. (ed.) 27th International Conference on Principles and Practice of Constraint Programming, CP 2021, Montpellier, France (Virtual Conference), 25\u201329 October 2021. LIPIcs, vol. 210, pp. 40:1\u201340:18. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2021)"},{"issue":"2","key":"14_CR32","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/TIT.2020.3040543","volume":"67","author":"Z Liu","year":"2021","unstructured":"Liu, Z., Li, Y., Jiao, L., Wang, M.: A new method for searching optimal differential and linear trails in ARX ciphers. IEEE Trans. Inf. Theory 67(2), 1054\u20131068 (2021)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"14_CR33","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1093\/comjnl\/bxac195","volume":"67","author":"L Jinyu","year":"2024","unstructured":"Jinyu, L., Liu, G., Sun, B., Li, C., Liu, L.: Improved (related-key) differential-based neural distinguishers for SIMON and SIMECK block ciphers. Comput. J. 67(2), 537\u2013547 (2024)","journal-title":"Comput. J."},{"key":"14_CR34","volume":"74","author":"JS Liu","year":"2023","unstructured":"Liu, J.S., Ren, J.J., Chen, S.Z., Li, M.M.: Improved neural distinguishers with multi-round and multi-splicing construction. J. Inf. Secur. Appl. 74, 103461 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"14_CR35","unstructured":"Reddi, S.J., Kale, S., Kumar, S.: On the convergence of adam and beyond (2019)"},{"issue":"6","key":"14_CR36","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1049\/ise2.12077","volume":"16","author":"A Ranea","year":"2022","unstructured":"Ranea, A., Rijmen, V.: Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA). IET Inf. Secur. 16(6), 470\u2013481 (2022)","journal-title":"IET Inf. Secur."},{"key":"14_CR37","series-title":"LNNS","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-981-97-0641-9_34","volume-title":"ICCNSML 2023","author":"A Sajwan","year":"2024","unstructured":"Sajwan, A., Mishra, G.: Comparative analysis of ResNet and DenseNet for differential cryptanalysis of SPECK 32\/64 lightweight block cipher. In: Chaturvedi, A., Hasan, S.U., Roy, B.K., Tsaban, B. (eds.) ICCNSML 2023. LNNS, vol. 918, pp. 495\u2013504. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-97-0641-9_34"},{"key":"14_CR38","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-981-99-1642-9_36","volume-title":"ICONIP 2022","author":"T Sun","year":"2023","unstructured":"Sun, T., Shen, D., Long, S., Deng, Q., Wang, S.: Neural distinguishers on TinyJAMBU-128 and GIFT-64. In: Tanveer, M., Agarwal, S., Ozawa, S., Ekbal, A., Jatowt, A. (eds.) ICONIP 2022. CCIS, vol. 1792, pp. 419\u2013431. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-1642-9_36"},{"issue":"1","key":"14_CR39","doi-asserted-by":"publisher","first-page":"269","DOI":"10.46586\/tosc.v2021.i1.269-315","volume":"2021","author":"L Sun","year":"2021","unstructured":"Sun, L., Wang, W., Wang, M.: Accelerating the search of differential and linear characteristics with the SAT method. IACR Trans. Symmetric Cryptol. 2021(1), 269\u2013315 (2021)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"14_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-71852-7_1","volume-title":"Information Security and Cryptology","author":"H-C Su","year":"2021","unstructured":"Su, H.-C., Zhu, X.-Y., Ming, D.: Polytopic attack on round-reduced simon32\/64 using deep learning. In: Wu, Y., Yung, M. (eds.) Inscrypt 2020. LNCS, vol. 12612, pp. 3\u201320. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-71852-7_1"},{"key":"14_CR41","doi-asserted-by":"crossref","unstructured":"Wang, H., Tian, J., Zhang, X., Wei, Y., Jiang, H.: Multiple differential distinguisher of SIMECK32\/64 based on deep learning. Secur. Commun. Netw. (2022)","DOI":"10.1155\/2022\/7564678"},{"key":"14_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-030-88238-9_10","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2021","author":"T Yadav","year":"2021","unstructured":"Yadav, T., Kumar, M.: Differential-ML distinguisher: machine learning based generic extension for\u00a0differential cryptanalysis. In: Longa, P., R\u00e0fols, C. (eds.) LATINCRYPT 2021. LNCS, vol. 12912, pp. 191\u2013212. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88238-9_10"},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Yang, G., Zhu, B., Suder, V., Aagaard, M.D., Gong, G.: The SIMECK family of lightweight block ciphers. Cryptology ePrint Archive, Paper 2015\/612 (2015)","DOI":"10.1007\/978-3-662-48324-4_16"},{"key":"14_CR44","unstructured":"Zheng, A., Casari, A.: Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists. O\u2019Reilly Media Inc. (2018)"},{"issue":"6","key":"14_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-3261-z","volume":"17","author":"L Zhang","year":"2023","unstructured":"Zhang, L., Jinyu, L., Wang, Z., Li, C.: Improved differential-neural cryptanalysis for round-reduced Simeck32\/64. Front. Comput. Sci. 17(6), 176817 (2023)","journal-title":"Front. Comput. Sci."},{"key":"14_CR46","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1587\/transinf.2022EDL8094","volume":"106","author":"L Zhang","year":"2023","unstructured":"Zhang, L., Wang, Z., Chen, Y.: Improving the accuracy of differential-neural distinguisher for des, chaskey, and present. IEICE Trans. Inf. Syst. 106, 1240\u20131243 (2023)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"14_CR47","doi-asserted-by":"crossref","unstructured":"Zhang, R., Zhang, M., Yan, J., Li, Y., Wu, X., Li, L.: Differential cryptanalysis of TweGIFT-128 based on neural network. In: 2021 IEEE Sixth International Conference on Data Science in Cyberspace (DSC), pp. 529\u2013534. IEEE (2021)","DOI":"10.1109\/DSC53577.2021.00084"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06754-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T08:24:31Z","timestamp":1759307071000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06754-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,2]]},"ISBN":["9783032067531","9783032067548"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06754-8_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,2]]},"assertion":[{"value":"2 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LATINCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Information Security in Latin America","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Medell\u00edn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"latincrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ciencias.medellin.unal.edu.co\/eventos\/latincrypt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}