{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:26:20Z","timestamp":1765106780468,"version":"3.46.0"},"publisher-location":"Singapore","reference-count":46,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819550951","type":"print"},{"value":"9789819550968","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5096-8_19","type":"book-chapter","created":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:36Z","timestamp":1765106676000},"page":"608-640","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Solving Concealed ILWE and\u00a0Its Application for\u00a0Breaking Masked Dilithium"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4584-1765","authenticated-orcid":false,"given":"Simon","family":"Damm","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1916-7033","authenticated-orcid":false,"given":"Asja","family":"Fischer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5965-5675","authenticated-orcid":false,"given":"Alexander","family":"May","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2191-172X","authenticated-orcid":false,"given":"Soundes","family":"Marzougui","sequence":"additional","affiliation":[]},{"given":"Leander","family":"Schwarz","sequence":"additional","affiliation":[]},{"given":"Henning","family":"Seidler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5372-4825","authenticated-orcid":false,"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9388-5324","authenticated-orcid":false,"given":"Jonas","family":"Thietke","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7967-2103","authenticated-orcid":false,"given":"Vincent Quentin","family":"Ulitzsch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,8]]},"reference":[{"key":"19_CR1","unstructured":"MOSEK ApS. MOSEK Optimizer API for Python 11.0.7 (2024)"},{"issue":"1","key":"19_CR2","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/S0378-3758(02)00402-0","volume":"118","author":"O Arslan","year":"2004","unstructured":"Arslan, O.: Convergence behavior of an iterative reweighting algorithm to compute multivariate m-estimates for location and scatter. J. Stat. Plan. Inference 118(1), 115\u2013128 (2004)","journal-title":"J. Stat. Plan. Inference"},{"issue":"1","key":"19_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1080\/23307706.2017.1397554","volume":"5","author":"A Agrawal","year":"2018","unstructured":"Agrawal, A., Verschueren, R., Diamond, S., Boyd, S.: A rewriting system for convex optimization problems. J. Control Dec. 5(1), 42\u201360 (2018)","journal-title":"J. Control Dec."},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Barthe, G., Bela\u00efd, S., Espitau, T., Fouque, P.-A., Rossi, M., Tibouchi, M.: Galactics: Gaussian sampling for lattice-based constant-time implementation of cryptographic signatures, revisited. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2147\u20132164 (2019)","DOI":"10.1145\/3319535.3363223"},{"issue":"4","key":"19_CR5","doi-asserted-by":"publisher","first-page":"553","DOI":"10.46586\/tches.v2022.i4.553-588","volume":"2022","author":"O Bronchain","year":"2022","unstructured":"Bronchain, O., Cassiers, G.: Bitslicing arithmetic\/Boolean masking conversions for fun and profit: with application to lattice-based KEMS. IACR Trans. Cryptographic Hardware Embedded Syst. 2022(4), 553\u2013588 (2022)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"issue":"2","key":"19_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.46586\/tches.v2018.i2.22-45","volume":"2018","author":"L Bettale","year":"2018","unstructured":"Bettale, L., Coron, J.-S., Zeitoun, R.: Improved high-order conversion from Boolean to arithmetic masking. IACR Trans. Cryptographic Hardware Embedded Syst. 2018(2), 22\u201345 (2018)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-030-03326-2_17","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"J Bootle","year":"2018","unstructured":"Bootle, J., Delaplace, C., Espitau, T., Fouque, P.-A., Tibouchi, M.: LWE without modular reduction and improved side-channel attacks against BLISS. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11272, pp. 494\u2013524. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03326-2_17"},{"key":"19_CR8","unstructured":"Bai, S., et al.: Dilithium reference implementation. https:\/\/github.com\/pq-crystals\/dilithium. Accessed 22 Jun 2023"},{"key":"19_CR9","unstructured":"Bai, S., et al.: CRYSTALS-dilithium, algorithm specifications and supporting documentation (2021). https:\/\/pq-crystals.org\/dilithium\/data\/dilithium-specification-round3-20210208.pdf"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press (2004)","DOI":"10.1017\/CBO9780511804441"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Berzati, A., Viera, A.C., Chartouny, M., Madec, S., Vergnaud, D., Vigilant, D.: Exploiting intermediate value leakage in dilithium: a template-based approach. Cryptology ePrint Archive, Paper 2023\/050 (2023)","DOI":"10.46586\/tches.v2023.i4.188-210"},{"issue":"4","key":"19_CR12","doi-asserted-by":"publisher","first-page":"335","DOI":"10.46586\/tches.v2024.i4.335-354","volume":"2024","author":"J-S Coron","year":"2024","unstructured":"Coron, J.-S., G\u00e9rard, F., Lepoint, T., Trannoy, M., Zeitoun, R.: Improved high-order masked generation of masking vector and rejection sampling in dilithium. IACR Trans. Cryptographic Embedded Syst. 2024(4), 335\u2013354 (2024)","journal-title":"IACR Trans. Cryptographic Embedded Syst."},{"issue":"2","key":"19_CR13","first-page":"1","volume":"2022","author":"J-S Coron","year":"2022","unstructured":"Coron, J.-S., G\u00e9rard, F., Montoya, S., Zeitoun, R.: High-order table-based conversion algorithms and masking lattice-based encryption. IACR Trans. Cryptographic Hardware Embedded Syst. 2022(2), 1\u201340 (2022)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"issue":"4","key":"19_CR14","doi-asserted-by":"publisher","first-page":"110","DOI":"10.46586\/tches.v2023.i4.110-145","volume":"2023","author":"J-S Coron","year":"2023","unstructured":"Coron, J.-S., G\u00e9rard, F., Trannoy, M., Zeitoun, R.: Improved gadgets for the high-order masking of dilithium. IACR Trans. Cryptographic Hardware Embedded Syst. 2023(4), 110\u2013145 (2023)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"issue":"83","key":"19_CR15","first-page":"1","volume":"17","author":"S Diamond","year":"2016","unstructured":"Diamond, S., Boyd, S.: CVXPY: a python-embedded modeling language for convex optimization. J. Mach. Learn. Res. 17(83), 1\u20135 (2016)","journal-title":"J. Mach. Learn. Res."},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-40041-4_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"L Ducas","year":"2013","unstructured":"Ducas, L., Durmus, A., Lepoint, T., Lyubashevsky, V.: Lattice signatures and bimodal Gaussians. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 40\u201356. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_3"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Damm, S., Krauss, N., May, A., Nowakowski, J., Thietke, J.: One bit to rule them all \u2013 imperfect randomness harms lattice signatures. PKC and eprint (2025, to appear in)","DOI":"10.1007\/978-3-031-91820-9_10"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Commun. ACM 24(6), 381\u2013395 (1981)","DOI":"10.1145\/358669.358692"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12"},{"issue":"3","key":"19_CR20","first-page":"21","volume":"2018","author":"Leon Groot Bruinderink and Peter Pessl","year":"2018","unstructured":"Leon Groot Bruinderink and Peter Pessl: Differential fault attacks on deterministic lattice signatures. IACR Trans. Cryptographic Hardware Embedded Syst. 2018(3), 21\u201343 (2018)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"issue":"7825","key":"19_CR21","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1038\/s41586-020-2649-2","volume":"585","author":"CR Harris","year":"2020","unstructured":"Harris, C.R., et al.: Array programming with NumPy. Nature 585(7825), 357\u2013362 (2020)","journal-title":"Nature"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Hermelink, J., Ning, K.-C., Petri, R.: Finding and protecting the weakest link: on side-channel attacks on masked ML-DSA. IACR Cryptol. ePrint Arch. pp. 276 (2025)","DOI":"10.1007\/978-3-032-01901-1_1"},{"key":"19_CR23","series-title":"Wiley Series in Probability and Statistics","doi-asserted-by":"publisher","DOI":"10.1002\/9780470434697","volume-title":"Robust Statistics","author":"PJ Huber","year":"2009","unstructured":"Huber, P.J., Ronchetti, E.M.: Robust Statistics. Wiley Series in Probability and Statistics, 2nd edn. Wiley, Hoboken (2009)","edition":"2"},{"issue":"1","key":"19_CR24","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1214\/aoms\/1177703732","volume":"35","author":"PJ Huber","year":"1964","unstructured":"Huber, P.J.: Robust estimation of a location parameter. Ann. Math. Stat. 35(1), 73\u2013101 (1964)","journal-title":"Ann. Math. Stat."},{"key":"19_CR25","unstructured":"NewAE\u00a0Technology Inc. CW1173: ChipWhisperer-Lite (2018)"},{"key":"19_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Krahmer, E., Pessl, P., Land, G., G\u00fcneysu, T.: Correction fault attacks on randomized crystals-dilithium. Cryptology ePrint Archive (2024)","DOI":"10.46586\/tches.v2024.i3.174-199"},{"key":"19_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1007\/978-3-642-10366-7_35","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"V Lyubashevsky","year":"2009","unstructured":"Lyubashevsky, V.: Fiat-Shamir with aborts: applications to lattice and factoring-based signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 598\u2013616. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10366-7_35"},{"key":"19_CR29","doi-asserted-by":"publisher","first-page":"1868","DOI":"10.1109\/TIFS.2020.3045904","volume":"16","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Zhou, Y., Sun, S., Wang, T., Zhang, R., Ming, J.: On the security of lattice-based fiat-Shamir signatures in the presence of randomness leakage. IEEE Trans. Inf. Forensics Secur. 16, 1868\u20131879 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR30","series-title":"Wiley Series in Probability and Statistics","volume-title":"Robust Statistics: Theory and Methods (with R)","author":"RA Maronna","year":"2019","unstructured":"Maronna, R.A., Martin, R.D., Yohai, V.J., Salibi\u00e1n-Barrera, M.: Robust Statistics: Theory and Methods (with R). Wiley Series in Probability and Statistics, vol. 7, 2nd edn. Wiley, Newark (2019)","edition":"2"},{"key":"19_CR31","unstructured":"Moore, H.R.: Robust regression using maximum-likelihood weighting and assuming Cauchy-distributed random error. Ph.D. thesis, Monterey, California. Naval Postgraduate School (1977)"},{"issue":"1","key":"19_CR32","doi-asserted-by":"publisher","first-page":"175","DOI":"10.46586\/tches.v2022.i1.175-220","volume":"2022","author":"B Marshall","year":"2021","unstructured":"Marshall, B., Page, D., Webb, J.: Miracle: Micro-architectural leakage evaluation: a study of micro-architectural power leakage across many devices. IACR Trans. Cryptographic Hardware Embedded Syst. 2022(1), 175\u2013220 (2021)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Marzougui, S., Wisiol, N., Gersch, P., Kr\u00e4mer, J., Seifert, J-P.: Machine-learning side-channel attacks on the Galactics constant-time implementation of bliss. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES \u201922, New York, NY, USA. Association for Computing Machinery (2022)","DOI":"10.1145\/3538969.3538980"},{"key":"19_CR34","unstructured":"National Institute of Standards and Technology (NIST). Module-Lattice-Based Digital Signature Standard (2024)"},{"key":"19_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-319-64647-3_17","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"K Papagiannopoulos","year":"2017","unstructured":"Papagiannopoulos, K., Veshchikov, N.: Mind the gap: towards secure 1st-order masking in software. In: Guilley, S. (ed.) COSADE 2017. LNCS, vol. 10348, pp. 282\u2013297. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64647-3_17"},{"key":"19_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2022.3215913","volume":"18","author":"Z Qiao","year":"2022","unstructured":"Qiao, Z., Liu, Y., Zhou, Y., Ming, J., Jin, C., Li, H.: Practical public template attacks on crystals-dilithium with randomness leakages. IEEE Trans. Inf. Forensics Secur. 18, 1\u201314 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR37","unstructured":"Ravi, P., Jhanwar, M.P., Howe, J., Chattopadhyay, A., Bhasin, S.: Side-channel assisted existential forgery attack on Dilithium - A NIST PQC candidate. Cryptology ePrint Archive, Report 2018\/821 (2018)"},{"key":"19_CR38","doi-asserted-by":"publisher","first-page":"183175","DOI":"10.1109\/ACCESS.2020.3029521","volume":"8","author":"B-Y Sim","year":"2020","unstructured":"Sim, B.-Y., et al.: Single-trace attacks on message encoding in lattice-based KEMS. IEEE Access 8, 183175\u2013183191 (2020)","journal-title":"IEEE Access"},{"key":"19_CR39","series-title":"Wiley Series in Probability and Statistics","doi-asserted-by":"publisher","DOI":"10.1002\/9780471722199","volume-title":"Linear Regression Analysis","author":"GAF Seber","year":"2003","unstructured":"Seber, G.A.F., Lee, A.J.: Linear Regression Analysis. Wiley Series in Probability and Statistics, 2nd edn. Wiley-Interscience, Hoboken (2003)","edition":"2"},{"key":"19_CR40","doi-asserted-by":"crossref","unstructured":"Steffen, H., Land, G., Kogelheide, L., G\u00fcneysu, T.: Breaking and protecting the crystal: side-channel analysis of dilithium in hardware. Cryptology ePrint Archive, Paper 2022\/1410 (2022)","DOI":"10.1007\/978-3-031-40003-2_25"},{"key":"19_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/978-3-030-17259-6_18","volume-title":"Public-Key Cryptography \u2013 PKC 2019","author":"T Schneider","year":"2019","unstructured":"Schneider, T., Paglialonga, C., Oder, T., G\u00fcneysu, T.: Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto. In: Lin, D., Sako, K. (eds.) PKC 2019. LNCS, vol. 11443, pp. 534\u2013564. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17259-6_18"},{"issue":"10","key":"19_CR42","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1109\/LSP.2014.2329811","volume":"21","author":"E Tsakonas","year":"2014","unstructured":"Tsakonas, E., Jald\u00e9n, J., Sidiropoulos, N.D., Ottersten, B.: Convergence of the Huber regression m-estimate in the presence of dense outliers. IEEE Signal Process. Lett. 21(10), 1211\u20131214 (2014)","journal-title":"IEEE Signal Process. Lett."},{"key":"19_CR43","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/s10208-011-9099-z","volume":"12","author":"JA Tropp","year":"2012","unstructured":"Tropp, J.A.: User-friendly tail bounds for sums of random matrices. Found. Comput. Math. 12, 389\u2013434 (2012)","journal-title":"Found. Comput. Math."},{"issue":"4","key":"19_CR44","doi-asserted-by":"publisher","first-page":"367","DOI":"10.46586\/tches.v2023.i4.367-392","volume":"2023","author":"VQ Ulitzsch","year":"2023","unstructured":"Ulitzsch, V.Q., Marzougui, S., Bagia, A., Tibouchi, M., Seifert, J.-P.: Loop aborts strike back: defeating fault countermeasures in lattice signatures with ILP. IACR Trans. Cryptographic Hardware Embedded Syst. 2023(4), 367\u2013392 (2023)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"key":"19_CR45","series-title":"LNCS","first-page":"3","volume-title":"SAC 2022","author":"VQ Ulitzsch","year":"2024","unstructured":"Ulitzsch, V.Q., Marzougui, S., Tibouchi, M., Seifert, J.-P.: Profiling side-channel attacks on dilithium - a small bit-fiddling leak breaks it all. In: Smith, B., Wu, H. (eds.) SAC 2022. LNCS, vol. 13742, pp. 3\u201332. Springer, Cham (2024)"},{"key":"19_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-91356-4_1","volume-title":"Information Security","author":"T Wang","year":"2021","unstructured":"Wang, T., Liu, Y., Xu, J., Hu, L., Tao, Y., Zhou, Y.: Integer LWE with non-subgaussian error and related attacks. In: Liu, J.K., Katsikas, S., Meng, W., Susilo, W., Intan, R. (eds.) ISC 2021. LNCS, vol. 13118, pp. 3\u201325. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-91356-4_1"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5096-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T11:24:40Z","timestamp":1765106680000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5096-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"ISBN":["9789819550951","9789819550968"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5096-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,8]]},"assertion":[{"value":"8 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}