{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:39:37Z","timestamp":1767321577736,"version":"3.48.0"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032105356","type":"print"},{"value":"9783032105363","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10536-3_5","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:35:56Z","timestamp":1767321356000},"page":"113-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Minimalist Model for\u00a0Impossible Differentials"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0478-8483","authenticated-orcid":false,"given":"Patrick","family":"Derbez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8490-6747","authenticated-orcid":false,"given":"Marie","family":"Euler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Banik, S., et al.: MIDORI: a block cipher for low energy. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT\u00a02015, Part\u00a0II. LNCS, vol.\u00a09453, pp. 411\u2013436. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48800-3_17","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"5_CR2","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013\/404 (2013). https:\/\/eprint.iacr.org\/2013\/404"},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Beierle, C., et al.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) CRYPTO\u00a02016, Part\u00a0II. LNCS, vol.\u00a09815, pp. 123\u2013153. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Bellini, E., Formenti, M., G\u00e9rault, D., Grados, J., Hambitzer, A., Huang, Y.J., Huynh, P., Rachidi, M., Rohit, R., Tiwari, S.K.: Claasping ARADI: automated analysis of the ARADI block cipher. In: Mukhopadhyay, S., Stanica, P. (eds.) Progress in Cryptology - INDOCRYPT 2024 - 25th International Conference on Cryptology in India, Chennai, India, 18-21 December 2024, Proceedings, Part II. LNCS, vol. 15496, pp. 90\u2013113. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-80311-6_5","DOI":"10.1007\/978-3-031-80311-6_5"},{"key":"5_CR5","unstructured":"Bellini, E., Huynh, P., Gerault, D., Visconti, A., Piccoli, A.D., Pelizzola, S.: Impossible differential automation: Model generation and new techniques. Cryptology ePrint Archive, Paper 2024\/1998 (2024). https:\/\/eprint.iacr.org\/2024\/1998"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Beyne, T.: Block cipher invariants as eigenvectors of correlation matrices. In: Peyrin, T., Galbraith, S.D. (eds.) Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, 2-6 December 2018, Proceedings, Part I. LNCS, vol. 11272, pp. 3\u201331. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-030-03326-2_1","DOI":"10.1007\/978-3-030-03326-2_1"},{"key":"5_CR7","doi-asserted-by":"publisher","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 12\u201323. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_2","DOI":"10.1007\/3-540-48910-X_2"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES\u00a02007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31","DOI":"10.1007\/978-3-540-74735-2_31"},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s00145-016-9251-7","volume":"31","author":"C Boura","year":"2017","unstructured":"Boura, C., Lallemand, V., Naya-Plasencia, M., Suder, V.: Making the impossible possible. J. Cryptol. 31(1), 101\u2013133 (2017). https:\/\/doi.org\/10.1007\/s00145-016-9251-7","journal-title":"J. Cryptol."},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Boura, C., Naya-Plasencia, M., Suder, V.: Scrutinizing and improving impossible differential attacks: Applications to CLEFIA, Camellia, LBlock and Simon. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT\u00a02014, Part\u00a0I. LNCS, vol.\u00a08873, pp. 179\u2013199. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_10","DOI":"10.1007\/978-3-662-45611-8_10"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Chakraborty, D., Hadipour, H., Nguyen, P.H., Eichlseder, M.: Finding complete impossible differential attacks on andrx ciphers and efficient distinguishers for ARX designs. IACR Trans. Symmetric Cryptol. 2024(3), 84\u2013176 (2024). https:\/\/doi.org\/10.46586\/tosc.v2024.i3.84-176","DOI":"10.46586\/tosc.v2024.i3.84-176"},{"key":"5_CR12","unstructured":"Chen, Z., Wang, N., Wang, X.: Impossible differential cryptanalysis of reduced round SIMON. Cryptology ePrint Archive, Report 2015\/286 (2015). https:\/\/eprint.iacr.org\/2015\/286"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Derbez, P.: Note on impossible differential attacks. In: Peyrin, T. (ed.) FSE\u00a02016. LNCS, vol.\u00a09783, pp. 416\u2013427. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_21","DOI":"10.1007\/978-3-662-52993-5_21"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Derbez, P., Fouque, P.A.: Automatic search of meet-in-the-middle and impossible differential attacks. In: Robshaw, M., Katz, J. (eds.) CRYPTO\u00a02016, Part\u00a0II. LNCS, vol.\u00a09815, pp. 157\u2013184. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53008-5_6","DOI":"10.1007\/978-3-662-53008-5_6"},{"key":"5_CR15","unstructured":"Greene, P., Motley, M., Weeks, B.: ARADI and LLAMA: low-latency cryptography for memory encryption. IACR Cryptol. ePrint Arch, p.\u00a01240 (2024). https:\/\/eprint.iacr.org\/2024\/1240"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Guo, J., Jean, J., Nikolic, I., Qiao, K., Sasaki, Y., Sim, S.M.: Invariant subspace attack against midori64 and the resistance criteria for s-box designs. IACR Trans. Symmetric Cryptol. 2016(1), 33\u201356 (2016). https:\/\/doi.org\/10.13154\/tosc.v2016.i1.33-56","DOI":"10.13154\/tosc.v2016.i1.33-56"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"Hadipour, H., Gerhalter, S., Sadeghi, S., Eichlseder, M.: Improved search for integral, impossible differential and zero-correlation attacks application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2. IACR Trans. Symm. Cryptol. 2024(1), 234\u2013325 (2024). https:\/\/doi.org\/10.46586\/tosc.v2024.i1.234-325","DOI":"10.46586\/tosc.v2024.i1.234-325"},{"key":"5_CR18","doi-asserted-by":"publisher","unstructured":"Hadipour, H., Sadeghi, S., Eichlseder, M.: Finding the impossible: Automated search for full impossible-differential, zero-correlation, and integral attacks. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0IV. LNCS, vol. 14007, pp. 128\u2013157. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30634-1_5","DOI":"10.1007\/978-3-031-30634-1_5"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Hu, K., Peyrin, T., Wang, M.: Finding all impossible differentials when considering the DDT. In: Smith, B., Wu, H. (eds.) SAC 2022. LNCS, vol. 13742, pp. 285\u2013305. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58411-4_13","DOI":"10.1007\/978-3-031-58411-4_13"},{"key":"5_CR20","unstructured":"Hu, X., Jiao, L.: Pre-sieve, partial-guess, and accurate estimation: Full-round related-key impossible boomerang attack on ARADI. Cryptology ePrint Archive, Paper 2025\/056 (2025). https:\/\/eprint.iacr.org\/2025\/056"},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Kim, J., Hong, S., Sung, J., Lee, C., Lee, S.: Impossible differential cryptanalysis for block cipher structures. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT\u00a02003. LNCS, vol.\u00a02904, pp. 82\u201396. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-24582-7_6","DOI":"10.1007\/978-3-540-24582-7_6"},{"key":"5_CR22","unstructured":"Knudsen, L.: Deal-A 128-bit block cipher. Complexity 258(2), 216 (1998)"},{"key":"5_CR23","doi-asserted-by":"publisher","unstructured":"Kondo, K., Sasaki, Y., Iwata, T.: On the design rationale of simon block cipher: Integral attacks and impossible differential attacks against simon variants. In: Manulis, M., Sadeghi, A.R., Schneider, S. (eds.) ACNS 16International Conference on Applied Cryptography and Network Security. LNCS, vol.\u00a09696, pp. 518\u2013536. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39555-5_28","DOI":"10.1007\/978-3-319-39555-5_28"},{"key":"5_CR24","doi-asserted-by":"publisher","unstructured":"Leurent, G., Pernot, C.: New representations of the AES key schedule. In: Canteaut, A., Standaert, F.X. (eds.) EUROCRYPT\u00a02021, Part\u00a0I. LNCS, vol. 12696, pp. 54\u201384. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_3","DOI":"10.1007\/978-3-030-77870-5_3"},{"key":"5_CR25","doi-asserted-by":"publisher","unstructured":"Liu, G., Ghosh, M., Song, L.: Security analysis of SKINNY under related-tweakey settings (long paper). IACR Trans. Symm. Cryptol. 2017(3), 37\u201372 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i3.37-72","DOI":"10.13154\/tosc.v2017.i3.37-72"},{"key":"5_CR26","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ins.2013.08.051","volume":"263","author":"Y Luo","year":"2014","unstructured":"Luo, Y., Lai, X., Wu, Z., Gong, G.: A unified method for finding impossible differentials of block cipher structures. Inf. Sci. 263, 211\u2013220 (2014). https:\/\/doi.org\/10.1016\/j.ins.2013.08.051","journal-title":"Inf. Sci."},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Mala, H., Dakhilalian, M., Rijmen, V., Modarres-Hashemi, M.: Improved impossible differential cryptanalysis of 7-round AES-128. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT\u00a02010. LNCS, vol.\u00a06498, pp. 282\u2013291. Springer, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17401-8_20","DOI":"10.1007\/978-3-642-17401-8_20"},{"issue":"6","key":"5_CR28","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1002\/j.1538-7305.1956.tb03835.x","volume":"35","author":"EJ McCluskey","year":"1956","unstructured":"McCluskey, E.J.: Minimization of Boolean functions. Bell Syst. Tech. J. 35(6), 1417\u20131444 (1956)","journal-title":"Bell Syst. Tech. J."},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"Qin, L., Dong, X., Wang, X., Jia, K., Liu, Y.: Automated search oriented to key recovery on ciphers with linear key schedule. IACR Trans. Symm. Cryptol. 2021(2), 249\u2013291 (2021). https:\/\/doi.org\/10.46586\/tosc.v2021.i2.249-291","DOI":"10.46586\/tosc.v2021.i2.249-291"},{"issue":"4","key":"5_CR30","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1049\/iet-ifs.2016.0590","volume":"12","author":"S Sadeghi","year":"2018","unstructured":"Sadeghi, S., Bagheri, N.: Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher. IET Inf. Secur. 12(4), 314\u2013325 (2018). https:\/\/doi.org\/10.1049\/iet-ifs.2016.0590","journal-title":"IET Inf. Secur."},{"key":"5_CR31","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.ipl.2019.02.009","volume":"147","author":"S Sadeghi","year":"2019","unstructured":"Sadeghi, S., Bagheri, N.: Security analysis of SIMECK block cipher against related-key impossible differential. Inf. Process. Lett. 147, 14\u201321 (2019)","journal-title":"Inf. Process. Lett."},{"key":"5_CR32","doi-asserted-by":"publisher","unstructured":"Sasaki, Y., Todo, Y.: New impossible differential search tool from design and cryptanalysis aspects - revealing structural properties of several ciphers. In: Coron, J.S., Nielsen, J.B. (eds.) EUROCRYPT\u00a02017, Part\u00a0III. LNCS, vol. 10212, pp. 185\u2013215. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56617-7_7","DOI":"10.1007\/978-3-319-56617-7_7"},{"key":"5_CR33","doi-asserted-by":"publisher","unstructured":"Song, L., Yang, Q., Chen, Y., Hu, L., Weng, J.: Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond. In: Joye, M., Leander, G. (eds.) EUROCRYPT\u00a02024, Part\u00a0I. LNCS, vol. 14651, pp. 339\u2013367. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_12","DOI":"10.1007\/978-3-031-58716-0_12"},{"key":"5_CR34","doi-asserted-by":"publisher","unstructured":"Sun, B., Liu, M., Guo, J., Rijmen, V., Li, R.: Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis. In: Fischlin, M., Coron, J.S. (eds.) EUROCRYPT\u00a02016, Part\u00a0I. LNCS, vol.\u00a09665, pp. 196\u2013213. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_8","DOI":"10.1007\/978-3-662-49890-3_8"},{"key":"5_CR35","unstructured":"Sun, S., et al.: Constructing mixed-integer programming models whose feasible region is exactly the set of all valid differential characteristics of SIMON. Cryptology ePrint Archive, Report 2015\/122 (2015). https:\/\/eprint.iacr.org\/2015\/122"},{"key":"5_CR36","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.cam.2013.06.023","volume":"259","author":"C Tezcan","year":"2014","unstructured":"Tezcan, C.: Improbable differential attacks on present using undisturbed bits. J. Comput. Appl. Math. 259, 503\u2013511 (2014). https:\/\/doi.org\/10.1016\/j.cam.2013.06.023","journal-title":"J. Comput. Appl. Math."},{"key":"5_CR37","doi-asserted-by":"publisher","unstructured":"Todo, Y., Leander, G., Sasaki, Y.: Nonlinear invariant attack - practical attack on full SCREAM, iSCREAM, and Midori64. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT\u00a02016, Part\u00a0II. LNCS, vol. 10032, pp. 3\u201333. Springer, Berlin, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53890-6_1","DOI":"10.1007\/978-3-662-53890-6_1"},{"key":"5_CR38","doi-asserted-by":"publisher","unstructured":"Tolba, M., Abdelkhalek, A., Youssef, A.M.: Impossible differential cryptanalysis of reduced-round SKINNY. In: Joye, M., Nitaj, A. (eds.) AFRICACRYPT 17. LNCS, vol. 10239, pp. 117\u2013134. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57339-7_7","DOI":"10.1007\/978-3-319-57339-7_7"},{"key":"5_CR39","doi-asserted-by":"publisher","unstructured":"Wu, S., Wang, M.: Automatic search of truncated impossible differentials for word-oriented block ciphers. In: Galbraith, S.D., Nandi, M. (eds.) INDOCRYPT\u00a02012. LNCS, vol.\u00a07668, pp. 283\u2013302. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34931-7_17","DOI":"10.1007\/978-3-642-34931-7_17"},{"issue":"6","key":"5_CR40","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1049\/iet-ifs.2016.0488","volume":"11","author":"D Yang","year":"2017","unstructured":"Yang, D., Qi, W., Chen, H.: Impossible differential attacks on the SKINNY family of block ciphers. IET Inf. Secur. 11(6), 377\u2013385 (2017). https:\/\/doi.org\/10.1049\/iet-ifs.2016.0488","journal-title":"IET Inf. Secur."},{"key":"5_CR41","doi-asserted-by":"publisher","unstructured":"Yang, G., Zhu, B., Suder, V., Aagaard, M.D., Gong, G.: The SIMECK family of lightweight block ciphers. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES\u00a02015. LNCS, vol.\u00a09293, pp. 307\u2013329. Springer, Berlin, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_16","DOI":"10.1007\/978-3-662-48324-4_16"},{"key":"5_CR42","unstructured":"Zhan, C., Xiaoyun, W.: Impossible differential cryptanalysis of MIDORI. Cryptology ePrint Archive, Report 2016\/535 (2016). https:\/\/eprint.iacr.org\/2016\/535"},{"issue":"8","key":"5_CR43","doi-asserted-by":"publisher","first-page":"6025","DOI":"10.1109\/TIT.2023.3292241","volume":"70","author":"Please check and confirm if the inserted citations of Fig. 3 is correct.Please check and confirm if the inserted citations of Fig. 3 is correct.K Zhang","year":"2024","unstructured":"Zhang, Please check and confirm if the inserted citations of Fig. 3 is correct.Please check and confirm if the inserted citations of Fig. 3 is correct.K., et al.: Impossible differential cryptanalysis and a security evaluation framework for AND-RX ciphers. IEEE Trans. Inf. Theory 70(8), 6025\u20136040 (2024). https:\/\/doi.org\/10.1109\/TIT.2023.3292241","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10536-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:35:59Z","timestamp":1767321359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10536-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032105356","9783032105363"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10536-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC25\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}