{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:04:57Z","timestamp":1770750297215,"version":"3.50.0"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032111753","type":"print"},{"value":"9783032111760","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T00:00:00Z","timestamp":1763856000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T00:00:00Z","timestamp":1763856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-11176-0_21","type":"book-chapter","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T20:11:33Z","timestamp":1763842293000},"page":"359-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient AND Protocols Resistant to\u00a0Maliciously Revealing a\u00a0Single Card"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-7512-266X","authenticated-orcid":false,"given":"Koichi","family":"Koizumi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8637-7162","authenticated-orcid":false,"given":"Minato","family":"Abe","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5701-5311","authenticated-orcid":false,"given":"Eikoh","family":"Chida","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-1043","authenticated-orcid":false,"given":"Takaaki","family":"Mizuki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,23]]},"reference":[{"issue":"4","key":"21_CR1","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s11047-021-09862-2","volume":"20","author":"Y Abe","year":"2021","unstructured":"Abe, Y., Mizuki, T., Sone, H.: Committed-format AND protocol using only random cuts. Nat. Comput. 20(4), 639\u2013645 (2021). https:\/\/doi.org\/10.1007\/s11047-021-09862-2","journal-title":"Nat. Comput."},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/3-540-46885-4_23","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201989","author":"B Boer","year":"1990","unstructured":"Boer, B.: More efficient match-making and satisfiability the five card trick. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 208\u2013217. Springer, Heidelberg (1990). https:\/\/doi.org\/10.1007\/3-540-46885-4_23"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s00354-024-00268-z","volume":"42","author":"A Doi","year":"2024","unstructured":"Doi, A., et al.: Card-based protocols for private set intersection and union. New Gener. Comput. 42, 359\u2013380 (2024). https:\/\/doi.org\/10.1007\/s00354-024-00268-z","journal-title":"New Gener. Comput."},{"key":"21_CR4","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 169\u2013178. Association for Computing Machinery, New York (2009). https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s00354-024-00274-1","volume":"42","author":"S Hand","year":"2024","unstructured":"Hand, S., Koch, A., Lafourcade, P., Miyahara, D., Robert, L.: Efficient card-based ZKP for single loop condition and its application to Moon-or-Sun. New Gener. Comput. 42, 449\u2013477 (2024). https:\/\/doi.org\/10.1007\/s00354-024-00274-1","journal-title":"New Gener. Comput."},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s00354-024-00267-0","volume":"42","author":"K Hatsugai","year":"2024","unstructured":"Hatsugai, K., Ruangwises, S., Asano, K., Abe, Y.: NP-completeness and physical zero-knowledge proofs for Sumplete, a puzzle generated by ChatGPT. New Gener. Comput. 42, 429\u2013448 (2024). https:\/\/doi.org\/10.1007\/s00354-024-00267-0","journal-title":"New Gener. Comput."},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-319-21819-9_16","volume-title":"Unconventional Computation and Natural Computation","author":"R Ishikawa","year":"2015","unstructured":"Ishikawa, R., Chida, E., Mizuki, T.: Efficient card-based protocols for generating a hidden random permutation without fixed points. In: Calude, C.S., Dinneen, M.J. (eds.) UCNC 2015. LNCS, vol. 9252, pp. 215\u2013226. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21819-9_16"},{"key":"21_CR8","doi-asserted-by":"publisher","unstructured":"Ito, Y., Shikata, H., Suganuma, T., Mizuki, T.: Card-based cryptography meets 3D printer. In: Da-Jung\u00a0Cho, J.K. (ed.) Unconventional Computation and Natural Computation. LNCS, vol. 14776, pp. 74\u201388. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-63742-1_6","DOI":"10.1007\/978-3-031-63742-1_6"},{"key":"21_CR9","doi-asserted-by":"publisher","unstructured":"Kaneko, S., Lafourcade, P., Mallordy, L.B., Miyahara, D., Puys, M., Sakiyama, K.: Balance-based ZKP protocols for pencil-and-paper puzzles. In: Mouha, N., Nikiforakis, N. (eds.) Information Security, pp. 211\u2013231. LNCS, Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-75757-0_11","DOI":"10.1007\/978-3-031-75757-0_11"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Kobayashi, N., Manabe, Y.: Card-based cryptographic protocols for three-input functions with a standard deck of cards using private operations. In: Garcia-Alfaro, J., et al. (eds.) Computer Security. ESORICS 2024 International Workshops. LNCS, pp. 94\u2013111. Springer, Cham (2025)","DOI":"10.1007\/978-3-031-82349-7_7"},{"key":"21_CR11","doi-asserted-by":"publisher","unstructured":"Koch, A.: The landscape of security from physical assumptions. In: IEEE Information Theory Workshop, pp.\u00a01\u20136. IEEE, NY (2021). https:\/\/doi.org\/10.1109\/ITW48936.2021.9611501","DOI":"10.1109\/ITW48936.2021.9611501"},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Koch, A., Walzer, S.: Foundations for actively secure card-based cryptography. In: Farach-Colton, M., Prencipe, G., Uehara, R. (eds.) Fun with Algorithms. LIPIcs, vol.\u00a0157, pp. 17:1\u201317:23. Schloss Dagstuhl, Dagstuhl, Germany (2020). https:\/\/doi.org\/10.4230\/LIPIcs.FUN.2021.17","DOI":"10.4230\/LIPIcs.FUN.2021.17"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/978-3-662-48797-6_32","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"A Koch","year":"2015","unstructured":"Koch, A., Walzer, S., H\u00e4rtel, K.: Card-based cryptographic protocols using a minimal number of cards. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9452, pp. 783\u2013807. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48797-6_32"},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1007\/s10207-022-00585-8","volume":"21","author":"Y Komano","year":"2022","unstructured":"Komano, Y., Mizuki, T.: Coin-based secure computations. Int. J. Inf. Secur. 21, 833\u2013846 (2022). https:\/\/doi.org\/10.1007\/s10207-022-00585-8","journal-title":"Int. J. Inf. Secur."},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s00354-024-00272-3","volume":"42","author":"Y Komano","year":"2024","unstructured":"Komano, Y., Mizuki, T.: Physical zero-knowledge proof protocols for Topswops and Botdrops. New Gener. Comput. 42, 399\u2013428 (2024). https:\/\/doi.org\/10.1007\/s00354-024-00272-3","journal-title":"New Gener. Comput."},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s00354-021-00148-w","volume":"40","author":"Y Manabe","year":"2022","unstructured":"Manabe, Y., Ono, H.: Card-based cryptographic protocols with malicious players using private operations. New Gener. Comput. 40, 67\u201393 (2022). https:\/\/doi.org\/10.1007\/s00354-021-00148-w","journal-title":"New Gener. Comput."},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s00354-024-00257-2","volume":"42","author":"Y Manabe","year":"2024","unstructured":"Manabe, Y., Ono, H.: Card-based cryptographic protocols with a standard deck of cards using private operations. New Gener. Comput. 42, 305\u2013329 (2024). https:\/\/doi.org\/10.1007\/s00354-024-00257-2","journal-title":"New Gener. Comput."},{"key":"21_CR18","doi-asserted-by":"publisher","unstructured":"Minamikawa, Y., Shinagawa, K.: Coin-based cryptographic protocols without hand operations. IEICE Trans. Fundamentals E107.A(8), 1178\u20131185 (2024). https:\/\/doi.org\/10.1587\/transfun.2023EAP1082","DOI":"10.1587\/transfun.2023EAP1082"},{"issue":"6","key":"21_CR19","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.26599\/TST.2023.9010153","volume":"29","author":"D Miyahara","year":"2024","unstructured":"Miyahara, D., Robert, L., Lafourcade, P., Mizuki, T.: ZKP protocols for Usowan, Herugolf, and Five Cells. Tsinghua Sci. Technol. 29(6), 1651\u20131666 (2024). https:\/\/doi.org\/10.26599\/TST.2023.9010153","journal-title":"Tsinghua Sci. Technol."},{"issue":"C","key":"21_CR20","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.tcs.2016.01.039","volume":"622","author":"T Mizuki","year":"2016","unstructured":"Mizuki, T.: Card-based protocols for securely computing the conjunction of multiple variables. Theor. Comput. Sci. 622(C), 34\u201344 (2016). https:\/\/doi.org\/10.1016\/j.tcs.2016.01.039","journal-title":"Theor. Comput. Sci."},{"key":"21_CR21","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s00354-024-00280-3","volume":"42","author":"T Mizuki","year":"2024","unstructured":"Mizuki, T.: Preface: special issue on card-based cryptography 3. New Gener. Comput. 42, 303\u2013304 (2024). https:\/\/doi.org\/10.1007\/s00354-024-00280-3","journal-title":"New Gener. Comput."},{"key":"21_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2022.104910","volume":"285","author":"T Mizuki","year":"2022","unstructured":"Mizuki, T., Komano, Y.: Information leakage due to operative errors in card-based protocols. Inf. Comput. 285, 104910 (2022). https:\/\/doi.org\/10.1016\/j.ic.2022.104910","journal-title":"Inf. Comput."},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Mizuki, T., Kuzuma, T., Hirano, T., Oshima, R., Yasuda, M.: Gakmoro: an application of physical secure computation to card game. In: Unconventional Computation and Natural Computation. LNCS. Springer, Cham (2025, to appear)","DOI":"10.1007\/978-3-032-15641-9_23"},{"issue":"1","key":"21_CR24","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10207-013-0219-4","volume":"13","author":"T Mizuki","year":"2014","unstructured":"Mizuki, T., Shizuya, H.: A formalization of card-based cryptographic protocols via abstract machine. Int. J. Inf. Secur. 13(1), 15\u201323 (2014). https:\/\/doi.org\/10.1007\/s10207-013-0219-4","journal-title":"Int. J. Inf. Secur."},{"key":"21_CR25","doi-asserted-by":"publisher","unstructured":"Mizuki, T., Shizuya, H.: Practical card-based cryptography. In: Ferro, A., Luccio, F., Widmayer, P. (eds.) Fun with Algorithms. LNCS, vol.\u00a08496, pp. 313\u2013324. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07890-8_27","DOI":"10.1007\/978-3-319-07890-8_27"},{"key":"21_CR26","doi-asserted-by":"publisher","unstructured":"Mizuki, T., Shizuya, H.: Computational model of card-based cryptographic protocols and its applications. IEICE Trans. Fundam. E100.A(1), 3\u201311 (2017). https:\/\/doi.org\/10.1587\/transfun.E100.A.3","DOI":"10.1587\/transfun.E100.A.3"},{"key":"21_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-02270-8_36","volume-title":"Frontiers in Algorithmics","author":"T Mizuki","year":"2009","unstructured":"Mizuki, T., Sone, H.: Six-card secure AND and four-card secure XOR. In: Deng, X., Hopcroft, J.E., Xue, J. (eds.) FAW 2009. LNCS, vol. 5598, pp. 358\u2013369. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02270-8_36"},{"key":"21_CR28","doi-asserted-by":"publisher","unstructured":"Morooka, T., Manabe, Y., Shinagawa, K.: Malicious player card-based cryptographic protocols with a standard deck of cards using private operations. In: Meng, W., Yan, Z., Piuri, V. (eds.) Information Security Practice and Experience. LNCS, vol. 14341, pp. 332\u2013346. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-981-99-7032-2_20","DOI":"10.1007\/978-981-99-7032-2_20"},{"key":"21_CR29","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s00354-024-00269-y","volume":"42","author":"T Nakai","year":"2024","unstructured":"Nakai, T., Iwanari, K., Ono, T., Abe, Y., Watanabe, Y., Iwamoto, M.: Card-based cryptography with a standard deck of cards, revisited: Efficient protocols in the private model. New Gener. Comput. 42, 345\u2013358 (2024). https:\/\/doi.org\/10.1007\/s00354-024-00269-y","journal-title":"New Gener. Comput."},{"key":"21_CR30","doi-asserted-by":"publisher","unstructured":"Ono, T., Shinagawa, K., Nakai, T., Watanabe, Y., Iwamoto, M.: Single-shuffle card-based protocols with six cards per gate. In: Seo, H., Kim, S. (eds.) Information Security and Cryptology. LNCS, vol. 14562, pp. 157\u2013169. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-97-1238-0_9","DOI":"10.1007\/978-981-97-1238-0_9"},{"key":"21_CR31","doi-asserted-by":"publisher","unstructured":"Otsuji, T., Fulla, P., Fukunaga, T.: NP-completeness and physical zero-knowledge proof of Hotaru Beam. In: Chen, Y., Gao, X., Sun, X., Zhang, A. (eds.) Computing and Combinatorics, pp. 239\u2013251. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-1090-7_20","DOI":"10.1007\/978-981-96-1090-7_20"},{"key":"21_CR32","doi-asserted-by":"publisher","unstructured":"Parter, M.: Secure computation meets distributed universal optimality . In: 2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS), pp. 2336\u20132368. IEEE Computer Society, Los Alamitos, CA, USA (2023). https:\/\/doi.org\/10.1109\/FOCS57990.2023.00144. https:\/\/doi.ieeecomputersociety.org\/10.1109\/FOCS57990.2023.00144","DOI":"10.1109\/FOCS57990.2023.00144"},{"key":"21_CR33","doi-asserted-by":"publisher","unstructured":"Ruangwises, S.: The landscape of computing symmetric n-variable functions with 2n cards. In: \u00c1brah\u00e1m, E., Dubslaff, C., Tarifa, S.L.T. (eds.) Theoretical Aspects of Computing \u2013 ICTAC 2023. LNCS, vol. 14446, pp. 74\u201382. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-47963-2_6","DOI":"10.1007\/978-3-031-47963-2_6"},{"key":"21_CR34","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s00354-024-00266-1","volume":"42","author":"S Ruangwises","year":"2024","unstructured":"Ruangwises, S., Iwamoto, M.: Printing protocol: physical ZKPs for decomposition puzzles. New Gener. Comput. 42, 331\u2013343 (2024). https:\/\/doi.org\/10.1007\/s00354-024-00266-1","journal-title":"New Gener. Comput."},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Ruangwises, S., Shinagawa, K.: Simulating virtual players for UNO without computers. In: Unconventional Computation and Natural Computation. LNCS. Springer, Cham (2025, to appear)","DOI":"10.1007\/978-3-032-15641-9_3"},{"key":"21_CR36","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s00354-024-00271-4","volume":"42","author":"S Sasaki","year":"2024","unstructured":"Sasaki, S., Shinagawa, K.: Physical zero-knowledge proof for Sukoro. New Gener. Comput. 42, 381\u2013398 (2024). https:\/\/doi.org\/10.1007\/s00354-024-00271-4","journal-title":"New Gener. Comput."},{"issue":"11","key":"21_CR37","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"key":"21_CR38","unstructured":"Shinagawa, K.: On the construction of easy to perform card-based protocols. Ph.D. thesis, Tokyo Institute of Technology (2020). https:\/\/t2r2.star.titech.ac.jp\/cgi-bin\/publicationinfo.cgi?q_publication_content_number=CTT100817272"},{"key":"21_CR39","doi-asserted-by":"publisher","unstructured":"Shinagawa, K., Miyahara, D., Mizuki, T.: How to play Old Maid with virtual players. Theory Comput. Syst. 69(1) (2025). https:\/\/doi.org\/10.1007\/s00224-024-10203-w","DOI":"10.1007\/s00224-024-10203-w"},{"issue":"1\u20132","key":"21_CR40","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0304-3975(00)00409-6","volume":"259","author":"A Stiglic","year":"2001","unstructured":"Stiglic, A.: Computations with a deck of cards. Theor. Comput. Sci. 259(1\u20132), 671\u2013678 (2001). https:\/\/doi.org\/10.1016\/S0304-3975(00)00409-6","journal-title":"Theor. Comput. Sci."},{"key":"21_CR41","doi-asserted-by":"crossref","unstructured":"Takahashi, Y., Shinagawa, K., Shikata, H., Mizuki, T.: Efficient card-based protocols for symmetric functions using four-colored decks. In: ACM ASIA Public-Key Cryptography Workshop, pp. 1\u201310. ACM, New York (2024). https:\/\/doi.org\/10.1145\/3659467.3659902","DOI":"10.1145\/3659467.3659902"},{"issue":"4","key":"21_CR42","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11047-020-09838-8","volume":"21","author":"K Takashima","year":"2021","unstructured":"Takashima, K., Miyahara, D., Mizuki, T., Sone, H.: Actively revealing card attack on card-based protocols. Nat. Comput. 21(4), 615\u2013628 (2021). https:\/\/doi.org\/10.1007\/s11047-020-09838-8","journal-title":"Nat. Comput."},{"key":"21_CR43","doi-asserted-by":"publisher","unstructured":"Tamura, Y., Suzuki, A., Mizuki, T.: Card-based zero-knowledge proof protocols for the 15-puzzle and the token swapping problem. In: ACM ASIA Public-Key Cryptography Workshop, pp. 11\u201322. ACM, New York (2024). https:\/\/doi.org\/10.1145\/3659467.3659905","DOI":"10.1145\/3659467.3659905"},{"key":"21_CR44","doi-asserted-by":"publisher","unstructured":"Tanaka, K., Sasaki, S., Shinagawa, K., Mizuki, T.: Only two shuffles perform card-based zero-knowledge proof for Sudoku of any size. In: 2025 Symposium on Simplicity in Algorithms (SOSA), pp. 94\u2013107. SIAM (2025). https:\/\/doi.org\/10.1137\/1.9781611978315.7","DOI":"10.1137\/1.9781611978315.7"},{"issue":"1","key":"21_CR45","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s11047-024-10006-5","volume":"24","author":"K Tozawa","year":"2025","unstructured":"Tozawa, K., Morita, H., Mizuki, T.: Single-shuffle card-based protocol with eight cards per gate and its extensions. Natural Comput. 24(1), 131\u2013147 (2025). https:\/\/doi.org\/10.1007\/s11047-024-10006-5","journal-title":"Natural Comput."},{"key":"21_CR46","doi-asserted-by":"publisher","unstructured":"Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (FOCS 1982), pp. 160\u2013164 (1982). https:\/\/doi.org\/10.1109\/SFCS.1982.38","DOI":"10.1109\/SFCS.1982.38"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-11176-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T11:09:35Z","timestamp":1770721775000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-11176-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,23]]},"ISBN":["9783032111753","9783032111760"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-11176-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,23]]},"assertion":[{"value":"23 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Colloquium on Theoretical Aspects of Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ictac2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ictac2025.digital-hub.sh\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}