{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:58:26Z","timestamp":1725796706802},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319083438"},{"type":"electronic","value":"9783319083445"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08344-5_4","type":"book-chapter","created":{"date-parts":[[2014,7,4]],"date-time":"2014-07-04T06:38:15Z","timestamp":1404455895000},"page":"50-65","source":"Crossref","is-referenced-by-count":1,"title":["On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations"],"prefix":"10.1007","author":[{"given":"Petr","family":"Su\u0161il","sequence":"first","affiliation":[]},{"given":"Pouyan","family":"Sepehrdad","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-540-73458-1_2","volume-title":"Information Security and Privacy","author":"S.Z. Al-Hinai","year":"2007","unstructured":"Al-Hinai, S.Z., Dawson, E., Henricksen, M., Simpson, L.R.: On the security of the LILI family of stream ciphers against algebraic attacks. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.\u00a04586, pp. 11\u201328. Springer, Heidelberg (2007)"},{"key":"4_CR2","first-page":"164","volume":"2011","author":"M.R. Albrecht","year":"2011","unstructured":"Albrecht, M.R., Cid, C., Faug\u00e8re, J.-C., Perret, L.: On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gr\u00f6bner Basis Algorithms. IACR Cryptology ePrint Archive\u00a02011, 164 (2011)","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"8","key":"4_CR3","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.jsc.2012.01.002","volume":"47","author":"M.R. Albrecht","year":"2012","unstructured":"Albrecht, M.R., Cid, C., Faug\u00e8re, J.-C., Perret, L.: On the relation between the MXL family of algorithms and Gr\u00f6bner basis algorithms. J. Symb. Comput.\u00a047(8), 926\u2013941 (2012)","journal-title":"J. Symb. Comput."},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-540-30539-2_24","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"G. Ars","year":"2004","unstructured":"Ars, G., Faug\u00e8re, J.-C., Imai, H., Kawazoe, M., Sugita, M.: Comparison between XL and Gr\u00f6bner basis algorithms. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 338\u2013353. Springer, Heidelberg (2004)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03317-9_1","volume-title":"Fast Software Encryption","author":"J.-P. Aumasson","year":"2009","unstructured":"Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube testers and key recovery attacks on reduced-round MD6 and Trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 1\u201322. Springer, Heidelberg (2009)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-17401-8_14","volume-title":"Progress in Cryptology - INDOCRYPT 2010","author":"G.V. Bard","year":"2010","unstructured":"Bard, G.V., Courtois, N.T., Nakahara Jr, J., Sepehrdad, P., Zhang, B.: Algebraic, aida\/cube and side channel analysis of katan family of block ciphers. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol.\u00a06498, pp. 176\u2013196. Springer, Heidelberg (2010)"},{"key":"4_CR7","unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B., Yang, B.-Y.: Asymptotic behaviour of the degree of regularity of semi-regular polynomial systems. In: Eighth International Symposium on Effective Methods in Algebraic Geometry, MEGA 2005, Porto Conte, Alghero, Sardinia, Italy, May 27-June 1 (2005)"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jco.2012.07.001","volume":"29","author":"M. Bardet","year":"2013","unstructured":"Bardet, M., Faug\u00e8re, J.-C., Salvy, B., Spaenlehauer, P.-J.: On the complexity of solving quadratic boolean systems. J. Complexity\u00a029(1), 53\u201375 (2013)","journal-title":"J. Complexity"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/11836810_13","volume-title":"Information Security","author":"C. Canni\u00e8re De","year":"2006","unstructured":"De Canni\u00e8re, C.: Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol.\u00a04176, pp. 171\u2013186. Springer, Heidelberg (2006)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-04138-9_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"C. Canni\u00e8re De","year":"2009","unstructured":"De Canni\u00e8re, C., Dunkelman, O., Kne\u017eevi\u0107, M.: KATAN and KTANTAN - a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 272\u2013288. Springer, Heidelberg (2009)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-642-33027-8_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"C.-M. Cheng","year":"2012","unstructured":"Cheng, C.-M., Chou, T., Niederhagen, R., Yang, B.-Y.: Solving quadratic equations with XL on parallel architectures. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 356\u2013373. Springer, Heidelberg (2012)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-642-10433-6_8","volume-title":"Cryptology and Network Security","author":"J. Choy","year":"2009","unstructured":"Choy, J., Yap, H., Khoo, K.: An analysis of the compact XSL attack on BES and embedded SMS4. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol.\u00a05888, pp. 103\u2013118. Springer, Heidelberg (2009)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/11593447_18","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"C. Cid","year":"2005","unstructured":"Cid, C., Leurent, G.: An analysis of the XSL algorithm. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 333\u2013352. Springer, Heidelberg (2005)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/3-540-36552-4_13","volume-title":"Information Security and Cryptology - ICISC 2002","author":"N.T. Courtois","year":"2003","unstructured":"Courtois, N.T.: Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 182\u2013199. Springer, Heidelberg (2003)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-24632-9_15","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"N.T. Courtois","year":"2004","unstructured":"Courtois, N.T.: Algebraic attacks over GF(2\n                    k\n                  ), application to HFE challenge 2 and Sflash-v2. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 201\u2013217. Springer, Heidelberg (2004)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-77272-9_10","volume-title":"Cryptography and Coding","author":"N.T. Courtois","year":"2007","unstructured":"Courtois, N.T., Bard, G.V.: Algebraic cryptanalysis of the data encryption standard. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol.\u00a04887, pp. 152\u2013169. Springer, Heidelberg (2007)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-71039-4_6","volume-title":"Fast Software Encryption","author":"N.T. Courtois","year":"2008","unstructured":"Courtois, N.T., Bard, G.V., Wagner, D.: Algebraic and slide attacks on KeeLoq. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 97\u2013115. Springer, Heidelberg (2008)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-540-88625-9_22","volume-title":"Information and Communications Security","author":"N.T. Courtois","year":"2008","unstructured":"Courtois, N.T., Debraize, B.: Algebraic description and simultaneous linear approximations of addition in Snow 2.0. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol.\u00a05308, pp. 328\u2013344. Springer, Heidelberg (2008)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/3-540-36178-2_17","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"N.T. Courtois","year":"2002","unstructured":"Courtois, N.T., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 267\u2013287. Springer, Heidelberg (2002)"},{"key":"4_CR20","unstructured":"Courtois, N.T.: A new frontier in symmetric cryptanalysis. Invited talk, Indocrypt (2008), \n                    \n                      http:\/\/www.nicolascourtois.com\/papers\/front_indocrypt08_2p.pdf"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Courtois, N.T., Mourouzis, T., Song, G., Sepehrdad, P., Su\u0161il, P.: Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-Round Simon (April 2014) (Preprint)","DOI":"10.5220\/0005064903990404"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-642-34047-5_18","volume-title":"Fast Software Encryption","author":"N.T. Courtois","year":"2012","unstructured":"Courtois, N.T., Sepehrdad, P., Su\u0161il, P., Vaudenay, S.: ElimLin algorithm revisited. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol.\u00a07549, pp. 306\u2013325. Springer, Heidelberg (2012)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"I. Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 278\u2013299. Springer, Heidelberg (2009)"},{"key":"4_CR24","first-page":"127","volume":"2009","author":"I. Dinur","year":"2009","unstructured":"Dinur, I., Shamir, A.: Side Channel Cube attacks on Block Ciphers. IACR Cryptology ePrint Archive\u00a02009, 127 (2009)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-21702-9_10","volume-title":"Fast Software Encryption","author":"I. Dinur","year":"2011","unstructured":"Dinur, I., Shamir, A.: Breaking grain-128 with dynamic cube attacks. In: Joux, A. (ed.) FSE 2011. LNCS, vol.\u00a06733, pp. 167\u2013187. Springer, Heidelberg (2011)"},{"issue":"3-4","key":"4_CR26","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s12095-012-0068-4","volume":"4","author":"I. Dinur","year":"2012","unstructured":"Dinur, I., Shamir, A.: Applying cube attacks to stream ciphers in realistic scenarios. Cryptography and Communications\u00a04(3-4), 217\u2013232 (2012)","journal-title":"Cryptography and Communications"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-14423-3_6","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"J. Erickson","year":"2010","unstructured":"Erickson, J., Ding, J., Christensen, C.: Algebraic cryptanalysis of SMS4: Gr\u00f6bner basis attack and SAT attack compared. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol.\u00a05984, pp. 73\u201386. Springer, Heidelberg (2010)"},{"issue":"13","key":"4_CR28","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0022-4049(99)00005-5","volume":"139","author":"J.-C. Faug\u00e8re","year":"1999","unstructured":"Faug\u00e8re, J.-C.: A new efficient algorithm for computing Grobner bases (F4). Journal of Pure and Applied Algebra\u00a0139(13), 61\u201388 (1999)","journal-title":"Journal of Pure and Applied Algebra"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-642-16342-5_19","volume-title":"Information Security and Cryptology","author":"J.-C. Faug\u00e8re","year":"2010","unstructured":"Faug\u00e8re, J.-C., Perret, L.: Algebraic cryptanalysis of curry and flurry using correlated messages. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol.\u00a06151, pp. 266\u2013277. Springer, Heidelberg (2010)"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Fouque, P.A., Vannet, T.: Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. In: FSE 2013 (2013)","DOI":"10.1007\/978-3-662-43933-3_26"},{"issue":"1","key":"4_CR31","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M. Hell","year":"2007","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain; a stream cipher for constrained environments. Int. J. Wire. Mob. Comput.\u00a02(1), 86\u201393 (2007)","journal-title":"Int. J. Wire. Mob. Comput."},{"key":"4_CR32","unstructured":"Hodges, T., Petit, C., Schlather, J.: Degree of Regularity for Systems arising from Weil Descent. In: YAC 2012 - Yet Another Conference in Cryptography, p. 9 (2012)"},{"key":"4_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-39059-3_19","volume-title":"Information Security and Privacy","author":"T. Isobe","year":"2013","unstructured":"Isobe, T., Sasaki, Y., Chen, J.: Related-key boomerang attacks on KATAN32\/48\/64. In: Boyd, C., Simpson, L. (eds.) ACISP. LNCS, vol.\u00a07959, pp. 268\u2013285. Springer, Heidelberg (2013)"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re, J.-C.: A New Efficient Algorithm for Computing Gr\u00f6bner Bases Without Reduction to Zero (F5). In: ISSAC 2002: Proceedings of the 2002 International Symposium on Symbolic and Algebraic Computation, pp. 75\u201383 (2002)","DOI":"10.1145\/780506.780516"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-28496-0_12","volume-title":"Selected Areas in Cryptography","author":"S. Knellwolf","year":"2012","unstructured":"Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional differential cryptanalysis of Trivium and KATAN. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol.\u00a07118, pp. 200\u2013212. Springer, Heidelberg (2012)"},{"key":"4_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"1995","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"4_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-540-74619-5_16","volume-title":"Fast Software Encryption","author":"C.-W. Lim","year":"2007","unstructured":"Lim, C.-W., Khoo, K.: An analysis of XSL applied to BES. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 242\u2013253. Springer, Heidelberg (2007)"},{"key":"4_CR38","first-page":"459","volume-title":"40th FOCS","author":"R.J. Lipton","year":"1999","unstructured":"Lipton, R.J., Viglas, A.: On the complexity of SAT. In: 40th FOCS, October 17-19, pp. 459\u2013464. IEEE Computer Society Press, New York (1999)"},{"key":"4_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-540-88403-3_14","volume-title":"Post-Quantum Cryptography","author":"M.S.E. Mohamed","year":"2008","unstructured":"Mohamed, M.S.E., Mohamed, W.S.A.E., Ding, J., Buchmann, J.: MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol.\u00a05299, pp. 203\u2013215. Springer, Heidelberg (2008)"},{"key":"4_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-14423-3_7","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"M.S.E. Mohamed","year":"2010","unstructured":"Mohamed, M.S.E., Cabarcas, D., Ding, J., Buchmann, J., Bulygin, S.: MXL3: An efficient algorithm for computing Gr\u00f6bner bases of zero-dimensional ideals. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol.\u00a05984, pp. 87\u2013100. Springer, Heidelberg (2010)"},{"key":"4_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-642-38033-4_27","volume-title":"Information Security Practice and Experience","author":"L. Song","year":"2013","unstructured":"Song, L., Hu, L.: Improved algebraic and differential fault attacks on the katan block cipher. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol.\u00a07863, pp. 372\u2013386. Springer, Heidelberg (2013)"},{"key":"4_CR42","unstructured":"Soos, M.: Cryptominisat 2.5.0. In: SAT Race competitive event booklet (July 2010)"},{"key":"4_CR43","unstructured":"Stegers, T.: Faug\u00e8re\u2019s F5 Algorithm Revisited. Cryptology ePrint Archive, Report 2006\/404 (2006), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"4_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","volume-title":"Applied Cryptography and Network Security","author":"W. Wu","year":"2011","unstructured":"Wu, W., Zhang, L.: LBlock: A lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol.\u00a06715, pp. 327\u2013344. Springer, Heidelberg (2011)"},{"key":"4_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-540-30191-2_31","volume-title":"Information and Communications Security","author":"B.-Y. Yang","year":"2004","unstructured":"Yang, B.-Y., Chen, J.-M., Courtois, N.T.: On asymptotic security estimates in XL and Gr\u00f6bner bases-related algebraic cryptanalysis. In: L\u00f3pez, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol.\u00a03269, pp. 401\u2013413. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08344-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T02:28:24Z","timestamp":1558924104000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08344-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319083438","9783319083445"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08344-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}