{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:37:23Z","timestamp":1773513443270,"version":"3.50.1"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319051482","type":"print"},{"value":"9783319051499","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05149-9_1","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T09:36:27Z","timestamp":1394184987000},"page":"3-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":154,"title":["LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors"],"prefix":"10.1007","author":[{"given":"Deukjo","family":"Hong","sequence":"first","affiliation":[]},{"given":"Jung-Keun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dong-Chan","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Daesung","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Kwon Ho","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Dong-Geon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"1_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-03356-8_5","volume-title":"CRYPTO 2009","author":"K Aoki","year":"2009","unstructured":"Aoki, K., Sasaki, Y.: Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 70\u201389. Springer, Heidelberg (2009)"},{"key":"1_CR2","unstructured":"Aumasson, J.P., Henzen, L., Meier, W., Phan, R.C.W.: SHA-3 proposal BLAKE. Submission to NIST (Round 3) (2010)"},{"key":"1_CR3","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clar, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptology ePrint Archive. Report 2013\/404 (2013)"},{"key":"1_CR4","unstructured":"Bernstein, D.J.: The salsa20 stream cipher. In: SKEW 2005 \u2014 Symmetric Key Encryption Workshop (2005)"},{"key":"1_CR5","series-title":"LNCS","first-page":"398","volume-title":"EUROCRYPT 1993","author":"E Biham","year":"1994","unstructured":"Biham, E.: New types of cryptanalytic attacks using related keys. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 398\u2013409. Springer, Heidelberg (1994)"},{"key":"1_CR6","series-title":"LNCS","first-page":"12","volume-title":"EUROCRYPT 1999","author":"E Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 12\u201323. Springer, Heidelberg (1999)"},{"key":"1_CR7","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-44987-6_21","volume-title":"EUROCRYPT 2001","author":"E Biham","year":"2001","unstructured":"Biham, E., Dunkelman, O., Keller, N.: The rectangle attack - rectangling the serpent. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 340\u2013357. Springer, Heidelberg (2001)"},{"key":"1_CR8","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/3-540-36178-2_16","volume-title":"ASIACRYPT 2002","author":"E Biham","year":"2002","unstructured":"Biham, E., Dunkelman, O., Keller, N.: Enhancing differential-linear cryptanalysis. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 254\u2013266. Springer, Heidelberg (2002)"},{"key":"1_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9314-6","volume-title":"Differential Cryptanalysis of the Data Encryption Standard","author":"E Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993)"},{"key":"1_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-10366-7_1","volume-title":"ASIACRYPT 2009","author":"A Biryukov","year":"2009","unstructured":"Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1\u201318. Springer, Heidelberg (2009)"},{"key":"1_CR11","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-03356-8_14","volume-title":"CRYPTO 2009","author":"A Biryukov","year":"2009","unstructured":"Biryukov, A., Khovratovich, D., Nikoli\u0107, I.: Distinguisher and related-key attack on the full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 231\u2013249. Springer, Heidelberg (2009)"},{"key":"1_CR12","series-title":"LNCS","first-page":"245","volume-title":"FSE 1999","author":"A Biryukov","year":"1999","unstructured":"Biryukov, A., Wagner, D.: Slide attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 245\u2013259. Springer, Heidelberg (1999)"},{"key":"1_CR13","series-title":"LNCS","first-page":"450","volume-title":"CHES 2007","author":"AA Bogdanov","year":"2007","unstructured":"Bogdanov, A.A., Knudsen, L.R., Leander, G., Paar, Ch., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"1_CR14","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-25385-0_19","volume-title":"ASIACRYPT 2011","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov, A., Khovratovich, D., Rechberger, Ch.: Biclique cryptanalysis of the full AES. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 344\u2013371. Springer, Heidelberg (2011)"},{"key":"1_CR15","series-title":"LNCS","first-page":"29","volume-title":"FSE 2012","author":"A Bogdanov","year":"2012","unstructured":"Bogdanov, A., Wang, M.: Zero correlation linear cryptanalysis with reduced data complexity. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 29\u201348. Springer, Heidelberg (2012)"},{"key":"1_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","volume-title":"ASIACRYPT 2012","author":"J Borghoff","year":"2012","unstructured":"Borghoff, J., Canteaut, A., G\u00fcneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S., Yal\u00e7\u0131n, T.: PRINCE - A low-latency block cipher for pervasive computing applications. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 208\u2013225. Springer, Heidelberg (2012)"},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/18.651067","volume":"44","author":"A Canteaut","year":"1998","unstructured":"Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: application to McEliece\u2019s cryptosystem and to narrow-sense BCH codes of length 511. IEEE Trans. Inf. Theory 44(1), 367\u2013378 (1998)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR18","unstructured":"Certicom White Paper Series. Critical infrastructure protection for AMI using a comprehensive security platform, Februrary 2009"},{"key":"1_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"ASIACRYPT 2002","author":"NT Courtois","year":"2002","unstructured":"Courtois, N.T., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267\u2013287. Springer, Heidelberg (2002)"},{"key":"1_CR20","unstructured":"COSIC. Final Report: Security Evaluation of the Block Cipher LEA (2011)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES. In: The Advanced Encryption Standard. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4_1"},{"key":"1_CR22","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/11941378_30","volume-title":"INDOCRYPT 2006","author":"M Darnall","year":"2006","unstructured":"Darnall, M., Kuhlman, D.: AES software implementations on ARM7TDMI. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 424\u2013435. Springer, Heidelberg (2006)"},{"issue":"6","key":"1_CR23","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W Diffie","year":"1977","unstructured":"Diffie, W., Hellman, M.: Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6), 74\u201384 (1977)","journal-title":"Computer"},{"key":"1_CR24","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-642-14623-7_21","volume-title":"CRYPTO 2010","author":"O Dunkelman","year":"2010","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 393\u2013410. Springer, Heidelberg (2010)"},{"key":"1_CR25","unstructured":"eBACS: ECRYPT Benchmarking of Cryptographic Systems, bench.cr.yp.to."},{"key":"1_CR26","unstructured":"Ferguson, N., Lucks, S., Schneier, B., DougWhiting, Bellare, M., Tadayoshi Kohno, Callas, J., Jesse Walker, : The skein hash function family, Submission to NIST (Round 3) (2010)"},{"key":"1_CR27","unstructured":"ADVANCED ENCRYPTION STANDARD, (AES), Federal Information Processing Standards, Publication 197, 26 November 2001)"},{"key":"1_CR28","series-title":"LNCS","first-page":"1","volume-title":"RFIDSec 2011","author":"Z Gong","year":"2012","unstructured":"Gong, Z., Nikova, S., Law, Y.W.: KLEIN: A new family of lightweight block ciphers. In: Juels, A., Paar, Ch. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 1\u201318. Springer, Heidelberg (2012)"},{"key":"1_CR29","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-642-02384-2_26","volume-title":"AFRICACRYPT 2009","author":"D Mukhopadhyay","year":"2009","unstructured":"Mukhopadhyay, D.: An improved fault based attack of the advanced encryption standard. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 421\u2013434. Springer, Heidelberg (2009)"},{"key":"1_CR30","series-title":"LNCS","first-page":"326","volume-title":"CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011)"},{"key":"1_CR31","series-title":"LNCS","first-page":"46","volume-title":"CHES 2006","author":"D Hong","year":"2006","unstructured":"Hong, D., Sung, J., Hong, S.H., Lim, J.-I., Lee, S.-J., Koo, B.-S., Lee, C.-H., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J.-S., Chee, S.: HIGHT: A new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46\u201359. Springer, Heidelberg (2006)"},{"key":"1_CR32","series-title":"LNCS","first-page":"365","volume-title":"ICISC 2011","author":"D Hong","year":"2012","unstructured":"Hong, D., Koo, B., Kwon, D.: Biclique attack on the full HIGHT. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 365\u2013374. Springer, Heidelberg (2012)"},{"key":"1_CR33","unstructured":"ISO\/IEC 19772, Information technology \u2014 Security techniques \u2014 Authenticated encryption (2009)"},{"key":"1_CR34","series-title":"LNCS","first-page":"208","volume-title":"SAC 2004","author":"G Jakimoski","year":"2004","unstructured":"Jakimoski, G., Desmedt, Y.: Related-key differential cryptanalysis of 192-bit key AES variants. In: Matsui, M., Zuccherato, R. (eds.) SAC 2004. LNCS, vol. 3006, pp. 208\u2013221. Springer, Heidelberg (2004)"},{"key":"1_CR35","series-title":"LNCS","first-page":"1","volume-title":"CHES 2009","author":"E K\u00e4sper","year":"2009","unstructured":"K\u00e4sper, E., Schwabe, P.: Faster and timing-attack resistant AES-GCM. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 1\u201327. Springer, Heidelberg (2009)"},{"key":"1_CR36","series-title":"LNCS","first-page":"75","volume-title":"FSE 2000","author":"J Kelsey","year":"2001","unstructured":"Kelsey, J., Kohno, T., Schneier, B.: Amplified boomerang attacks against reduced-round MARS and serpent. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 75\u201393. Springer, Heidelberg (2001)"},{"key":"1_CR37","series-title":"LNCS","first-page":"233","volume-title":"ICICS 1997","author":"J Kelsey","year":"1997","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Related-key cryptanalysis of 3-WAY, biham-DES, CAST, DES-X, newDES, RC2, and TEA. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 233\u2013246. Springer, Heidelberg (1997)"},{"key":"1_CR38","series-title":"LNCS","first-page":"333","volume-title":"FSE 2010","author":"D Khovratovich","year":"2010","unstructured":"Khovratovich, D., Nikoli\u0107, I.: Rotational cryptanalysis of ARX. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 333\u2013346. Springer, Heidelberg (2010)"},{"key":"1_CR39","series-title":"LNCS","first-page":"196","volume-title":"FSE 1994","author":"LR Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"1_CR40","series-title":"LNCS","first-page":"112","volume-title":"FSE 2002","author":"LR Knudsen","year":"2002","unstructured":"Knudsen, L.R., Wagner, D.: Integral cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 112\u2013127. Springer, Heidelberg (2002)"},{"key":"1_CR41","series-title":"LNCS","first-page":"49","volume-title":"ICISC 2010","author":"B Koo","year":"2011","unstructured":"Koo, B., Hong, D., Kwon, D.: Related-key attack on the full HIGHT. In: Rhee, K.-H., Nyang, D.H. (eds.) ICISC 2010. LNCS, vol. 6829, pp. 49\u201367. Springer, Heidelberg (2011)"},{"key":"1_CR42","series-title":"LNCS","first-page":"336","volume-title":"FSE 2001","author":"H Lipmaa","year":"2002","unstructured":"Lipmaa, H., Moriai, S.: Efficient algorithms for computing differential properties of addition. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 336\u2013350. Springer, Heidelberg (2002)"},{"key":"1_CR43","series-title":"LNCS","first-page":"408","volume-title":"CHES 2012","author":"S Matsuda","year":"2012","unstructured":"Matsuda, S., Moriai, S.: Lightweight cryptography for the cloud: exploit the power of bitslice implementation. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 408\u2013425. Springer, Heidelberg (2012)"},{"key":"1_CR44","series-title":"LNCS","first-page":"386","volume-title":"EUROCRYPT 1993","author":"M Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"1_CR45","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","volume-title":"EUROCRYPT 2011","author":"A Moradi","year":"2011","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, Ch., Wang, H.: Pushing the limits: a very compact and a threshold implementation of AES. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 69\u201388. Springer, Heidelberg (2011)"},{"key":"1_CR46","unstructured":"Needham, R.M., Wheeler, D.J.: TEA extensions. computer laboratory, University of Cambridge, Technical report, October 1997"},{"key":"1_CR47","series-title":"LNCS","first-page":"75","volume-title":"FSE 2010","author":"DA Osvik","year":"2010","unstructured":"Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast software AES encryption. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 75\u201393. Springer, Heidelberg (2010)"},{"key":"1_CR48","unstructured":"https:\/\/realtimelogic.com\/products\/sharkssl\/Coldfire-80Mhz\/"},{"key":"1_CR49","unstructured":"Rivest, R.L., Robshaw, M.J.B., Sidney, R., Yin, Y.L.: Thr RC6 block cipher (1998)"},{"key":"1_CR50","series-title":"LNCS","first-page":"282","volume-title":"EUROCRYPT 2009","author":"Y Sasaki","year":"2009","unstructured":"Sasaki, Y., Aoki, K.: Finding preimages in full MD5 faster than exhaustive search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 282\u2013296. Springer, Heidelberg (2009)"},{"key":"1_CR51","series-title":"LNCS","first-page":"342","volume-title":"CHES 2011","author":"K Shibutani","year":"2011","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 342\u2013357. Springer, Heidelberg (2011)"},{"key":"1_CR52","series-title":"LNCS","first-page":"181","volume-title":"FSE 2007","author":"T Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007)"},{"key":"1_CR53","unstructured":"Suzaki, T., Minematsu, K., Morioka, S., Kobayasi, E.: Twine: A lightweight, versatile block cipher. In: Proceedings of ECRYPT Workshop on Lightweight Cryptography (2011)"},{"key":"1_CR54","series-title":"LNCS","first-page":"156","volume-title":"FSE 1999","author":"D Wagner","year":"1999","unstructured":"Wagner, D.: The boomerang attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 156\u2013170. Springer, Heidelberg (1999)"},{"key":"1_CR55","unstructured":"Wall\u00e9n, J.: On the differential and linear properties of addition, Master\u2019s thesis, Helsinki University of Technology, Laboratory for Theoretical Computer Science, November 2003"},{"key":"1_CR56","series-title":"LNCS","first-page":"363","volume-title":"FSE 1994","author":"DJ Wheeler","year":"1995","unstructured":"Wheeler, D.J., Needham, R.M.: TEA, a tiny encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363\u2013366. Springer, Heidelberg (1995)"},{"key":"1_CR57","unstructured":"Wheeler, D.J., Needham, R.M.: Correction of XTEA. Computer Laborarory, University of Cambridge, Technical report (October 1998)"},{"key":"1_CR58","unstructured":"Yarrkov, E.: Cryptanalysis of XXTEA, IACR Cryptology ePrint Archive 2010\/254 (2010)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05149-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T22:52:37Z","timestamp":1676847157000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05149-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319051482","9783319051499"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05149-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}