{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T16:32:38Z","timestamp":1776529958467,"version":"3.51.2"},"publisher-location":"Singapore","reference-count":52,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819550951","type":"print"},{"value":"9789819550968","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5096-8_15","type":"book-chapter","created":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:35Z","timestamp":1765106675000},"page":"475-507","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantum Circuit Synthesis for\u00a0AES with\u00a0Low DW-Cost"],"prefix":"10.1007","author":[{"given":"Haoyu","family":"Liao","sequence":"first","affiliation":[]},{"given":"Qingbin","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,8]]},"reference":[{"issue":"5","key":"15_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1864-3","volume":"17","author":"M Almazrooie","year":"2018","unstructured":"Almazrooie, M., Samsudin, A., Abdullah, R., Mutter, K.N.: Quantum reversible circuit of AES-128. Quantum Inf. Process. 17(5), 1\u201330 (2018). https:\/\/doi.org\/10.1007\/s11128-018-1864-3","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"15_CR2","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1109\/TCAD.2013.2244643","volume":"32","author":"M Amy","year":"2013","unstructured":"Amy, M., Maslov, D., Mosca, M., Roetteler, M.: A meet-in-the-middle algorithm for fast synthesis of depth-optimal quantum circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 32(6), 818\u2013830 (2013). https:\/\/doi.org\/10.1109\/TCAD.2013.2244643","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"issue":"1","key":"15_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1070\/RM9928","volume":"76","author":"S Ballet","year":"2021","unstructured":"Ballet, S., Pieltant, J., Rambaud, M., Randriambololona, H., Rolland, R., Chaumine, J.: On the tensor rank of multiplication in finite extensions of finite fields and related issues in algebraic geometry. Russ. Math. Surv. 76(1), 29 (2021)","journal-title":"Russ. Math. Surv."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Bonnetain, X., Hosoyamada, A., Naya-Plasencia, M., Sasaki, Y., Schrottenloher, A.: Quantum attacks without superposition queries: the offline Simon\u2019s algorithm. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 552\u2013583. Springer (2019)","DOI":"10.1007\/978-3-030-34578-5_20"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-030-92062-3_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"X Bonnetain","year":"2021","unstructured":"Bonnetain, X., Leurent, G., Naya-Plasencia, M., Schrottenloher, A.: Quantum linearization attacks. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13090, pp. 422\u2013452. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92062-3_15"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Boyar, J., Peralta, R.: A small depth-16 circuit for the AES s-box. In: IFIP International Information Security Conference, pp. 287\u2013298. Springer (2012)","DOI":"10.1007\/978-3-642-30436-1_24"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Canright, D.: A very compact S-box for AES. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 441\u2013455. Springer (2005)","DOI":"10.1007\/11545262_32"},{"issue":"4","key":"15_CR8","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0885-064X(88)90012-X","volume":"4","author":"DV Chudnovsky","year":"1988","unstructured":"Chudnovsky, D.V., Chudnovsky, G.V.: Algebraic complexities and algebraic curves over finite fields. J. Complex. 4(4), 285\u2013316 (1988)","journal-title":"J. Complex."},{"key":"15_CR9","unstructured":"Chun, M., Baksi, A., Chattopadhyay, A.: Dorcis: Depth optimized quantum implementation of substitution boxes. Cryptology ePrint Archive (2023)"},{"issue":"10","key":"15_CR10","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.1109\/TC.2021.3135759","volume":"71","author":"D Chung","year":"2021","unstructured":"Chung, D., Lee, S., Choi, D., Lee, J.: Alternative tower field construction for quantum implementation of the AES S-box. IEEE Trans. Comput. 71(10), 2553\u20132564 (2021)","journal-title":"IEEE Trans. Comput."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Dasu, V.A., Baksi, A., Sarkar, S., Chattopadhyay, A.: Lighter-r: optimized reversible circuit implementation for sboxes. 2019 32nd IEEE International System-on-Chip Conference (SOCC), pp. 260\u2013265 (2019)","DOI":"10.1109\/SOCC46988.2019.1570548320"},{"issue":"4","key":"15_CR12","volume":"13","author":"M DeCross","year":"2023","unstructured":"DeCross, M., Chertkov, E., Kohagen, M., Foss-Feig, M.: Qubit-reuse compilation with mid-circuit measurement and reset. Phys. Rev. X 13(4), 041057 (2023)","journal-title":"Phys. Rev. X"},{"issue":"3","key":"15_CR13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.86.032324","volume":"86","author":"AG Fowler","year":"2012","unstructured":"Fowler, A.G., Mariantoni, M., Martinis, J.M., Cleland, A.N.: Surfacae codes: towards practical large-scale quantum computation. Physical Review fv A-Atomic, Molecular, and Optical Physics 86(3), 032324 (2012)","journal-title":"Physical Review fv A-Atomic, Molecular, and Optical Physics"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"74","DOI":"10.22331\/q-2018-06-18-74","volume":"2","author":"C Gidney","year":"2018","unstructured":"Gidney, C.: Halving the cost of quantum addition. Quantum 2, 74 (2018)","journal-title":"Quantum"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Grassl, M., Langenberg, B., Roetteler, M., Steinwandt, R.: Applying grover\u2019s algorithm to AES: quantum resource estimates. In: International Workshop on Post-Quantum Cryptography, pp. 29\u201343. Springer (2016)","DOI":"10.1007\/978-3-319-29360-8_3"},{"key":"15_CR16","doi-asserted-by":"publisher","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212\u2013219. STOC \u201996, Association for Computing Machinery, New York, NY, USA (1996). https:\/\/doi.org\/10.1145\/237814.237866","DOI":"10.1145\/237814.237866"},{"issue":"11","key":"15_CR17","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1109\/TCAD.2006.871622","volume":"25","author":"P Gupta","year":"2006","unstructured":"Gupta, P., Agrawal, A., Jha, N.K.: An algorithm for synthesis of reversible logic circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 25(11), 2317\u20132330 (2006)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Huang, Z., Sun, S.: Synthesizing quantum circuits of AES with lower T-depth and less qubits. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 614\u2013644. Springer (2022)","DOI":"10.1007\/978-3-031-22969-5_21"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Huang, Z., Zhang, F., Lin, D.: Constructing quantum implementations with the minimal T-depth or minimal width and their applications. Cryptology ePrint Archive (2025)","DOI":"10.1007\/978-3-031-91107-1_6"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Jang, K., Baksi, A., Kim, H., Song, G., Seo, H., Chattopadhyay, A.: Quantum analysis of AES. IACR Commun. Cryptol. 2(1) (2025). https:\/\/doi.org\/10.62056\/ay11zo-3y","DOI":"10.62056\/ay11zo-3y"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Jaques, S., Naehrig, M., Roetteler, M., Virdia, F.: Implementing grover oracles for quantum key search on AES and LowMC. In: Advances in Cryptology\u2013EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10\u201314, 2020, Proceedings, Part II 30, pp. 280\u2013310. Springer (2020)","DOI":"10.1007\/978-3-030-45724-2_10"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Jean, J., Peyrin, T., Sim, S.M., Tourteaux, J.: Optimizing implementations of lightweight building blocks. Cryptology ePrint Archive (2017)","DOI":"10.46586\/tosc.v2017.i4.130-168"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"Jones, C.: Low-overhead constructions for the fault-tolerant Toffoli gate. Phys. Rev. A 87, 022328 (Feb 2013). https:\/\/doi.org\/10.1103\/PhysRevA.87.022328, https:\/\/link.aps.org\/doi\/10.1103\/PhysRevA.87.022328","DOI":"10.1103\/PhysRevA.87.022328"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Advances in Cryptology\u2013CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II 36, pp. 207\u2013237. Springer (2016)","DOI":"10.1007\/978-3-662-53008-5_8"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TQE.2020.2965697","volume":"1","author":"B Langenberg","year":"2020","unstructured":"Langenberg, B., Pham, H., Steinwandt, R.: Reducing the cost of implementing the advanced encryption standard as a quantum circuit. IEEE Trans. Quant. Eng. 1, 1\u201312 (2020)","journal-title":"IEEE Trans. Quant. Eng."},{"issue":"9","key":"15_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-022-1921-y","volume":"65","author":"Z Li","year":"2022","unstructured":"Li, Z., Cai, B., Sun, H., Liu, H., Wan, L., Qin, S., Wen, Q., Gao, F.: Novel quantum circuit implementation of advanced encryption standard with low costs. Sci. China Phys., Mech. Astronom. 65(9), 290311 (2022)","journal-title":"Sci. China Phys., Mech. Astronom."},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"1171753","DOI":"10.3389\/fphy.2023.1171753","volume":"11","author":"Z Li","year":"2023","unstructured":"Li, Z., Gao, F., Qin, S., Wen, Q.: New record in the number of qubits for a quantum implementation of AES. Front. Phys. 11, 1171753 (2023)","journal-title":"Front. Phys."},{"issue":"5","key":"15_CR28","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/s11128-025-04749-y","volume":"24","author":"H Liao","year":"2025","unstructured":"Liao, H., Luo, Q., Zheng, Y., Lv, Y., Ding, L.: Quantum circuit implementation for $$\\mathbb{F} _{2^8}$$ multiplication based on algebraic curve method. Quantum Inf. Process. 24(5), 138 (2025). https:\/\/doi.org\/10.1007\/s11128-025-04749-y","journal-title":"Quantum Inf. Process."},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Lidl, R., Niederreiter, H.: Finite fields. Cambridge university press (1997)","DOI":"10.1017\/CBO9780511525926"},{"issue":"7","key":"15_CR30","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/s11128-023-04002-4","volume":"22","author":"D Lin","year":"2023","unstructured":"Lin, D., Xiang, Z., Xu, R., Zeng, X., Zhang, S.: Quantum circuit implementations of SM4 block cipher based on different gate sets. Quantum Inf. Process. 22(7), 282 (2023)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"15_CR31","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/s11128-023-04043-9","volume":"22","author":"D Lin","year":"2023","unstructured":"Lin, D., Xiang, Z., Xu, R., Zhang, S., Zeng, X.: Optimized quantum implementation of AES. Quantum Inf. Process. 22(9), 352 (2023)","journal-title":"Quantum Inf. Process."},{"key":"15_CR32","doi-asserted-by":"publisher","unstructured":"Liu, Q., Preneel, B., Zhao, Z., Wang, M.: Improved quantum circuits for AES: Reducing the depth and the number of qubits. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 67\u201398. Springer (2023). https:\/\/doi.org\/10.1007\/978-981-99-8727-6_3","DOI":"10.1007\/978-981-99-8727-6_3"},{"key":"15_CR33","doi-asserted-by":"publisher","unstructured":"Liu, Y., et al.: Magic state distillation and cost analysis in fault-tolerant universal quantum computation. Quant. Sci. Technol. 8(4), 043001 (Aug 2023). https:\/\/doi.org\/10.1088\/2058-9565\/ace6ca","DOI":"10.1088\/2058-9565\/ace6ca"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Luo, Q.b., Ding, L., Yang, G.w., Li, X.y.: Analysis of converting $$\\mathfrak{C}^*$$-circuit into $$\\mathfrak{C}^*$$-circuit. EPJ Quan. Technol. 12(1) (2025)","DOI":"10.1140\/epjqt\/s40507-025-00317-6"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Luo, Q.b., Yang, G.w., Li, X.y., Li, Q.: Quantum reversible circuits for GF($$2^8$$) multiplicative inverse. EPJ Quant. Technol. 9(1), 24 (2022)","DOI":"10.1140\/epjqt\/s40507-022-00144-z"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"National Institute of Standards and Technology: Advanced Encryption Standard (AES). Federal Information Processing Standards Publication\u00a0197, U.S. Department of Commerce (Nov 2001). https:\/\/doi.org\/10.6028\/NIST.FIPS.197","DOI":"10.6028\/NIST.FIPS.197"},{"key":"15_CR37","unstructured":"National Institute of Standards and Technology (NIST): Post-quantum cryptography: Digital signature schemes (2022). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/standardization\/call-for-proposals"},{"key":"15_CR38","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum computation and quantum information. Cambridge university press (2010)"},{"issue":"3","key":"15_CR39","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.95.032338","volume":"95","author":"J O\u2019Gorman","year":"2017","unstructured":"O\u2019Gorman, J., Campbell, E.T.: Quantum computation with realistic magic-state factories. Phys. Rev. A 95(3), 032338 (2017)","journal-title":"Phys. Rev. A"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Preskill, J.: Fault-tolerant quantum computation. Introduct. Quant. Comput. Inform. 213 (1998)","DOI":"10.1142\/9789812385253_0008"},{"key":"15_CR41","volume-title":"Efficient Implementation of the Rijndael S-box","author":"V Rijmen","year":"2000","unstructured":"Rijmen, V.: Efficient Implementation of the Rijndael S-box. Katholieke Universiteit Leuven, Dept. ESAT. Belgium (2000)"},{"issue":"2","key":"15_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2431211.2431220","volume":"45","author":"M Saeedi","year":"2013","unstructured":"Saeedi, M., Markov, I.L.: Synthesis and optimization of reversible circuits-a survey. ACM Comput. Surv. (CSUR) 45(2), 1\u201334 (2013)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A compact Rijndael hardware architecture with S-box optimization. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 239\u2013254. Springer (2001)","DOI":"10.1007\/3-540-45682-1_15"},{"key":"15_CR44","doi-asserted-by":"publisher","unstructured":"Selinger, P.: Quantum circuits of T-depth one. Phys. Rev. A 87, 042302 (Apr 2013). https:\/\/doi.org\/10.1103\/PhysRevA.87.042302","DOI":"10.1103\/PhysRevA.87.042302"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Shi, H., Feng, X.: Quantum circuits of AES with a low-depth linear layer and a new structure. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 358\u2013395. Springer (2024)","DOI":"10.1007\/978-981-96-0944-4_12"},{"issue":"2","key":"15_CR46","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"issue":"5","key":"15_CR47","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474\u20131483 (1997)","journal-title":"SIAM J. Comput."},{"key":"15_CR48","doi-asserted-by":"crossref","unstructured":"Toffoli, T.: Reversible computing. International colloquium on automata, languages, and programming, pp. 632\u2013644 (1980)","DOI":"10.1007\/3-540-10003-2_104"},{"issue":"4","key":"15_CR49","doi-asserted-by":"publisher","first-page":"41501","DOI":"10.1007\/s11467-021-1141-2","volume":"17","author":"ZG Wang","year":"2022","unstructured":"Wang, Z.G., Wei, S.J., Long, G.L.: A quantum circuit design of AES requiring fewer quantum qubits and gate operations. Front. Phys. 17(4), 41501 (2022)","journal-title":"Front. Phys."},{"key":"15_CR50","doi-asserted-by":"crossref","unstructured":"Xiang, Z., Zeng, X., Lin, D., Bao, Z., Zhang, S.: Optimizing Implementations of Linear Layers. Universitatsbibliothek der Ruhr-Universitat Bochum (2020)","DOI":"10.46586\/tosc.v2020.i2.120-145"},{"key":"15_CR51","doi-asserted-by":"publisher","unstructured":"Zhang, M., Shi, T., Wu, W., Sui, H.: Optimized quantum circuit of AES with interlacing-uncompute structure. IEEE Trans. Comput. (2024). https:\/\/doi.org\/10.1109\/TC.2024.3449094","DOI":"10.1109\/TC.2024.3449094"},{"key":"15_CR52","doi-asserted-by":"crossref","unstructured":"Zou, J., Wei, Z., Sun, S., Liu, X., Wu, W.: Quantum circuit implementations of AES with fewer qubits. In: Advances in Cryptology\u2013ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7\u201311, 2020, Proceedings, Part II 26, pp. 697\u2013726. Springer (2020)","DOI":"10.1007\/978-3-030-64834-3_24"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5096-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:38Z","timestamp":1765106678000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5096-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"ISBN":["9789819550951","9789819550968"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5096-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,8]]},"assertion":[{"value":"8 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}