{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:11:44Z","timestamp":1775754704353,"version":"3.50.1"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032226945","type":"print"},{"value":"9783032226952","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-22695-2_14","type":"book-chapter","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T16:29:32Z","timestamp":1775752172000},"page":"406-440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SPIDER: A Faster and\u00a0Smaller Identity-Based Signature From Isogenies"],"prefix":"10.1007","author":[{"given":"Tako Boris","family":"Fouotsa","sequence":"first","affiliation":[]},{"given":"Gustave","family":"Tchoffo Saah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"14_CR1","unstructured":"Aardal, M.A., et al.: SQIsign. Technical report, National Institute of Standards and Technology (2025). https:\/\/sqisign.org"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-031-91826-1_10","volume-title":"Public-Key Cryptography - PKC 2025","author":"A Basso","year":"2025","unstructured":"Basso, A., et al.: PRISM: simple and compact identification and signatures from large prime degree isogenies. In: Jager, T., Pan, J. (eds.) Public-Key Cryptography - PKC 2025, pp. 300\u2013332. Springer Nature Switzerland, Cham (2025)"},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-031-30617-4_14","volume-title":"Advances in Cryptology - EUROCRYPT 2023","author":"A Basso","year":"2023","unstructured":"Basso, A., Codogni, G., Connolly, D., De Feo, L., Fouotsa, T.B., Lido, G.M., Morrison, T., Panny, L., Patranabis, S., Wesolowski, B.: Supersingular curves you can trust. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology - EUROCRYPT 2023, pp. 405\u2013437. Springer Nature Switzerland, Cham (2023)"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Basso, A., et al.: SQIsign2D-west - the fast, the small, and the safer. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02024, Part\u00a0III. LNCS, vol. 15486, pp. 339\u2013370. Springer, Singapore, Singapore, Kolkata, India (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_11","DOI":"10.1007\/978-981-96-0891-1_11"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Basso, A., Maino, L., Pope, G.: FESTA: fast encryption from supersingular torsion attacks. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02023, Part\u00a0VII. LNCS, vol. 14444, pp. 98\u2013126. Springer, Singapore, Singapore, Guangzhou, China (2023). https:\/\/doi.org\/10.1007\/978-981-99-8739-9_4","DOI":"10.1007\/978-981-99-8739-9_4"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-24676-3_17","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M Bellare","year":"2004","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology - EUROCRYPT 2004, pp. 268\u2013286. Springer, Heidelberg (2004)"},{"issue":"1","key":"14_CR7","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2140\/obs.2020.4.39","volume":"4","author":"DJ Bernstein","year":"2020","unstructured":"Bernstein, D.J., De Feo, L., Leroux, A., Smith, B.: Faster computation of isogenies of large prime degree. Open Book Ser. 4(1), 39\u201355 (2020)","journal-title":"Open Book Ser."},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-030-17656-3_15","volume-title":"Advances in Cryptology - EUROCRYPT 2019","author":"DJ Bernstein","year":"2019","unstructured":"Bernstein, D.J., Lange, T., Martindale, C., Panny, L.: Quantum Circuits for the CSIDH: optimizing quantum evaluation of isogenies. In: Ishai, Y., Rijmen, V. (eds.) Advances in Cryptology - EUROCRYPT 2019, pp. 409\u2013441. Springer International Publishing, Cham (2019)"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Beullens, W., Kleinjung, T., Vercauteren, F.: CSI-FiSh: efficient isogeny based signatures through class group computations. In: Galbraith, S.D., Moriai, S. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02019, Part\u00a0I. LNCS, vol. 11921, pp. 227\u2013247. Springer, Cham, Switzerland, Kobe, Japan (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_9","DOI":"10.1007\/978-3-030-34578-5_9"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-3-030-45724-2_17","volume-title":"Advances in Cryptology - EUROCRYPT 2020","author":"X Bonnetain","year":"2020","unstructured":"Bonnetain, X., Schrottenloher, A.: Quantum security analysis of CSIDH. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology - EUROCRYPT 2020, pp. 493\u2013522. Springer International Publishing, Cham (2020)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Borin, G., et al.: Qlapoti: simple and efficient translation of quaternion ideals to isogenies. In: Hanaoka, G., Yang, B.Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2025, pp. 174\u2013205. Springer, Singapore (2026)","DOI":"10.1007\/978-981-95-5113-2_6"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 423\u2013447. Springer (2023)","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: an efficient post-quantum commutative group action. In: Peyrin, T., Galbraith, S. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02018, Part\u00a0III. LNoCS, vol. 11274, pp. 395\u2013427. Springer, Cham, Switzerland, Brisbane, Queensland, Australia (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_15","DOI":"10.1007\/978-3-030-03332-3_15"},{"issue":"3","key":"14_CR14","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s13389-021-00271-w","volume":"12","author":"J Ch\u00e1vez-Saab","year":"2022","unstructured":"Ch\u00e1vez-Saab, J., Chi-Dom\u00ednguez, J.J., Jaques, S., Rodr\u00edguez-Henr\u00edquez, F.: The SQALE of CSIDH: sublinear V\u00e9lu quantum-resistant isogeny action with low exponents. J. Cryptogr. Eng. 12(3), 349\u2013368 (2022)","journal-title":"J. Cryptogr. Eng."},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Chen, J., Jo, H., Sato, S., Shikata, J.: A tightly secure identity-based signature scheme from isogenies. In: International Conference on Post-Quantum Cryptography, pp. 141\u2013163. Springer (2023)","DOI":"10.1007\/978-3-031-40003-2_6"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Chen, M., Leroux, A., Panny, L.: SCALLOP-HD: group action from 2-dimensional isogenies. In: IACR International Conference on Public-Key Cryptography, pp. 190\u2013216. Springer (2024)","DOI":"10.1007\/978-3-031-57725-3_7"},{"key":"14_CR17","doi-asserted-by":"publisher","unstructured":"Childs, A., Jao, D., Soukharev, V.: Constructing elliptic curve isogenies in quantum subexponential time. J. Math. Cryptol. 8(1), 1\u201329 (2014). https:\/\/doi.org\/10.1515\/jmc-2012-0016","DOI":"10.1515\/jmc-2012-0016"},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-031-58716-0_3","volume-title":"Advances in Cryptology - EUROCRYPT 2024","author":"M Corte-Real Santos","year":"2024","unstructured":"Corte-Real Santos, M., Eriksen, J.K., Meyer, M., Reijnders, K.: Apr\u00e8sSQI: extra fast verification for SQIsign using extension-field signing. In: Joye, M., Leander, G. (eds.) Advances in Cryptology - EUROCRYPT 2024, pp. 63\u201393. Springer Nature Switzerland, Cham (2024)"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Dartois, P., et al.: PEGASIS: practical effective class group action using 4-dimensional isogenies. In: Tauman\u00a0Kalai, Y., Kamara, S.F. (eds.) Advances in Cryptology \u2013 CRYPTO 2025, pp. 67\u201399. Springer Nature Switzerland, Cham (2025)","DOI":"10.1007\/978-3-032-01855-7_3"},{"key":"14_CR20","unstructured":"Dartois, P., Eriksen, J.K., Invernizzi, R., Vercauteren, F.: qt-Pegasis: simpler and faster effective class group actions. Cryptology ePrint Archive, Paper 2025\/1859 (2025). https:\/\/eprint.iacr.org\/2025\/1859"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-58716-0_1","volume-title":"Advances in Cryptology - EUROCRYPT 2024","author":"P Dartois","year":"2024","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQIsignHD: new dimensions in cryptography. In: Joye, M., Leander, G. (eds.) Advances in Cryptology - EUROCRYPT 2024, pp. 3\u201332. Springer Nature Switzerland, Cham (2024)"},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-981-96-0891-1_10","volume-title":"Advances in Cryptology - ASIACRYPT 2024","author":"P Dartois","year":"2025","unstructured":"Dartois, P., Maino, L., Pope, G., Robert, D.: An algorithmic approach to (2, 2)-isogenies in the theta model and applications to isogeny-based cryptography. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology - ASIACRYPT 2024, pp. 304\u2013338. Springer Nature Singapore, Singapore (2025)"},{"key":"14_CR23","unstructured":"De\u00a0Feo, L.: Mathematics of isogeny based cryptography. arXiv preprint arXiv:1711.04062 (2017)"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"De\u00a0Feo, L., et al.: SCALLOP: scaling the CSI-FiSh. In: IACR International Conference on Public-Key Cryptography, pp. 345\u2013375. Springer (2023)","DOI":"10.1007\/978-3-031-31368-4_13"},{"issue":"3","key":"14_CR25","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1515\/jmc-2012-0015","volume":"8","author":"L De Feo","year":"2014","unstructured":"De Feo, L., Jao, D., Pl\u00fbt, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8(3), 209\u2013247 (2014)","journal-title":"J. Math. Cryptol."},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02020, Part\u00a0I. LNCS, Daejeon, South Korea, vol. 12491, pp. 64\u201393. Springer, Cham, Switzerland (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3","DOI":"10.1007\/978-3-030-64837-4_3"},{"key":"14_CR27","doi-asserted-by":"publisher","unstructured":"Duparc, M., Fouotsa, T.B.: SQIPrime: a dimension 2 variant of SQISignHD with non-smooth challenge isogenies. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02024, Part\u00a0III. LNCS, Kolkata, India, vol. 15486, pp. 396\u2013429. Springer, Singapore, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_13","DOI":"10.1007\/978-981-96-0891-1_13"},{"key":"14_CR28","first-page":"186","volume-title":"Advances in Cryptology \u2013 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) Advances in Cryptology \u2013 CRYPTO\u2019 86, pp. 186\u2013194. Springer, Heidelberg (1987)"},{"key":"14_CR29","unstructured":"Fouotsa, T.B.: WaterSQI and PRISMO: Quaternion signatures for supersingular isogeny group actions. Cryptology ePrint Archive, Paper 2025\/1737 (2025). https:\/\/eprint.iacr.org\/2025\/1737"},{"key":"14_CR30","doi-asserted-by":"publisher","unstructured":"Fouotsa, T.B., Petit, C.: A new adaptive attack on SIDH. In: Galbraith, S.D. (ed.) Topics in Cryptology \u2013 CT-RSA\u00a02022. LNCS, vol. 13161, pp. 322\u2013344. Springer, Cham, Switzerland, Virtual Event (2022). https:\/\/doi.org\/10.1007\/978-3-030-95312-6_14","DOI":"10.1007\/978-3-030-95312-6_14"},{"issue":"1","key":"14_CR31","doi-asserted-by":"publisher","first-page":"20230023","DOI":"10.1515\/jmc-2023-0023","volume":"18","author":"W Ghantous","year":"2024","unstructured":"Ghantous, W., Pintore, F., Veroni, M.: Efficiency of SIDH-based signatures (yes, SIDH). J. Math. Cryptol. 18(1), 20230023 (2024)","journal-title":"J. Math. Cryptol."},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Hess, F.: Efficient identity based signature schemes based on pairings. In: International Workshop on Selected Areas in Cryptography, pp. 310\u2013324. Springer (2002)","DOI":"10.1007\/3-540-36492-7_20"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Kani, E.: The number of curves of genus two with elliptic differentials (1997)","DOI":"10.1515\/crll.1997.485.93"},{"key":"14_CR34","unstructured":"Kiltz, E., Neven, G.: Identity-based signatures. In: Identity-Based Cryptography, pp. 31\u201344. IOS Press (2009)"},{"key":"14_CR35","unstructured":"Leroux, A.: Quaternion algebra and isogeny-based cryptography. Theses , Ecole doctorale de l\u2019Institut Polytechnique de Paris (2022)"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Lin, J., Wang, S., Zhao, C.A.: A note on (2,2)-isogenies via theta coordinates. Finite Fields Appl. 99, 102496 (2024)","DOI":"10.1016\/j.ffa.2024.102496"},{"key":"14_CR37","doi-asserted-by":"crossref","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 448\u2013471. Springer (2023)","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"14_CR38","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., Onuki, H.: QFESTA: efficient algorithms and parameters for FESTA using quaternion algebras. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02024, Part\u00a0V. LNCS, vol. 14924, pp. 75\u2013106. Springer, Cham, Switzerland, Santa Barbara, CA, USA (2024). https:\/\/doi.org\/10.1007\/978-3-031-68388-6_4","DOI":"10.1007\/978-3-031-68388-6_4"},{"key":"14_CR39","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., et al.: SQIsign2D-east: a new signature scheme using 2-dimensional isogenies. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02024, Part\u00a0III. LNCS, vol. 15486, pp. 272\u2013303. Springer, Singapore, Singapore, Kolkata, India (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_9","DOI":"10.1007\/978-981-96-0891-1_9"},{"key":"14_CR40","unstructured":"Page, A., Robert, D.: Introducing clapoti(s): Evaluating the isogeny class group action in polynomial time. Cryptology ePrint Archive, Paper 2023\/1766 (2023). https:\/\/eprint.iacr.org\/2023\/1766"},{"key":"14_CR41","doi-asserted-by":"publisher","unstructured":"Panny, L., Petit, C., Stopar, M.: KLaPoTi: an asymptotically efficient isogeny group action from 2-dimensional isogenies. IACR Commun. Cryptol. 2(3) (2025). https:\/\/doi.org\/10.62056\/ahp2wakrz","DOI":"10.62056\/ahp2wakrz"},{"key":"14_CR42","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-030-45724-2_16","volume-title":"Advances in Cryptology - EUROCRYPT 2020","author":"C Peikert","year":"2020","unstructured":"Peikert, C.: He gives C-sieves on the CSIDH. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology - EUROCRYPT 2020, pp. 463\u2013492. Springer International Publishing, Cham (2020)"},{"key":"14_CR43","volume":"54","author":"C Peng","year":"2020","unstructured":"Peng, C., Chen, J., Zhou, L., Choo, K.K.R., He, D.: CsiiBS: a post-quantum identity-based signature scheme based on isogenies. J. Inf. Secur. Appl. 54, 102504 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"14_CR44","unstructured":"Robert, D.: Evaluating isogenies in polylogarithmic time. Cryptology ePrint Archive, Paper 2022\/1068 (2022). https:\/\/eprint.iacr.org\/2022\/1068"},{"key":"14_CR45","doi-asserted-by":"crossref","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 472\u2013503. Springer (2023)","DOI":"10.1007\/978-3-031-30589-4_17"},{"issue":"4","key":"14_CR46","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s11460-011-0119-1","volume":"6","author":"RA Sahu","year":"2011","unstructured":"Sahu, R.A., Padhye, S.: Id-based signature schemes from bilinear pairing: a survey. Front. Electr. Electron. Eng. China 6(4), 487\u2013500 (2011)","journal-title":"Front. Electr. Electron. Eng. China"},{"issue":"10","key":"14_CR47","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TC.2020.3023045","volume":"70","author":"H Seo","year":"2020","unstructured":"Seo, H., Anastasova, M., Jalali, A., Azarderakhsh, R.: Supersingular isogeny key encapsulation (SIKE) round 2 on ARM Cortex-M4. IEEE Trans. Comput. 70(10), 1705\u20131718 (2020)","journal-title":"IEEE Trans. Comput."},{"key":"14_CR48","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"14_CR49","doi-asserted-by":"crossref","unstructured":"Shaw, S., Dutta, R.: Identification scheme and forward-secure signature in identity-based setting from isogenies. In: International Conference on Provable Security, pp. 309\u2013326. Springer (2021)","DOI":"10.1007\/978-3-030-90402-9_17"},{"key":"14_CR50","volume":"69","author":"S Shaw","year":"2022","unstructured":"Shaw, S., Dutta, R.: Post-quantum secure identity-based signature achieving forward secrecy. J. Inf. Secur. Appl. 69, 103275 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"14_CR51","doi-asserted-by":"publisher","unstructured":"Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134 (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"14_CR52","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves, vol.\u00a0106. Springer (2009)","DOI":"10.1007\/978-0-387-09494-6"},{"key":"14_CR53","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques. C.R. Acad. Sci. Paris 273, 238\u2013394 (1935)"},{"key":"14_CR54","doi-asserted-by":"crossref","unstructured":"Voight, J.: Quaternion Algebras. Springer Nature (2021)","DOI":"10.1007\/978-3-030-56694-4"},{"issue":"2","key":"14_CR55","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/LCOMM.2002.808397","volume":"7","author":"X Yi","year":"2003","unstructured":"Yi, X.: An identity-based signature scheme from the Weil pairing. IEEE Commun. Lett. 7(2), 76\u201378 (2003)","journal-title":"IEEE Commun. Lett."}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-22695-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T16:29:37Z","timestamp":1775752177000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-22695-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032226945","9783032226952"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-22695-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"10 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Malo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}