{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T11:49:21Z","timestamp":1773316161516,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562084","type":"print"},{"value":"9789819562091","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6209-1_10","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:25:49Z","timestamp":1767320749000},"page":"178-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HBS Algorithmic Database Construction: A Chain-of-Thought-Driven Approach"],"prefix":"10.1007","author":[{"given":"Kaili","family":"Dou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yanyan","family":"Han","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaolin","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qi","family":"Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Duo","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yanru","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"issue":"7671","key":"10_CR1","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549(7671), 188\u2013194 (2017)","journal-title":"Nature"},{"key":"10_CR2","unstructured":"National Institute of Standards and Technology (NIST): Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. NISTIR 8413 (2022)"},{"key":"10_CR3","unstructured":"National Institute of Standards and Technology: Cryptographic Algorithm Validation Program (CAVP). Computer Security Resource Center (2022). https:\/\/csrc.nist.gov\/projects\/cryptographic-algorithm-validation-program"},{"key":"10_CR4","unstructured":"National Institute of Standards and Technology: Cryptographic Module Validation Program (CMVP) (2022). https:\/\/www.nist.gov\/publications\/cryptographic-module-validation-program-cmvp"},{"key":"10_CR5","unstructured":"Bernstein, D.J., Lange, T.: SUPERCOP: system for unified performance evaluation related to cryptographic operations and primitives (2013). https:\/\/bench.cr.yp.to\/supercop.html"},{"key":"10_CR6","first-page":"22199","volume":"35","author":"T Kojima","year":"2022","unstructured":"Kojima, T., Gu, S.S., Reid, M., et al.: Large language models are zero-shot reasoners. Adv. Neural. Inf. Process. Syst. 35, 22199\u201322213 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10_CR7","first-page":"24824","volume":"35","author":"J Wei","year":"2022","unstructured":"Wei, J., et al.: Chain-of-thought prompting elicits reasoning in large language models. Adv. Neural. Inf. Process. Syst. 35, 24824\u201324837 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"12","key":"10_CR8","doi-asserted-by":"publisher","first-page":"9437","DOI":"10.1016\/j.aej.2022.02.069","volume":"61","author":"F Liu","year":"2022","unstructured":"Liu, F.: Language database construction method based on big data and deep learning. Alex. Eng. J. 61(12), 9437\u20139446 (2022)","journal-title":"Alex. Eng. J."},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Yan, Z., Yang, H., **, Y., et al.: A study on the application of cloud-based database construction in language subject. In: Jansen, B.J., Zhou, Q., Ye, J. (eds.) CIPA 2023. LNDECT, vol, 196, pp. 1\u201312. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-97-1975-4_1","DOI":"10.1007\/978-981-97-1975-4_1"},{"key":"10_CR10","first-page":"24824","volume":"35","author":"J Wei","year":"2022","unstructured":"Wei, J., Wang, X., Schuurmans, D., et al.: Chain-of-thought prompting elicits reasoning in large language models. Adv. Neural. Inf. Process. Syst. 35, 24824\u201324837 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10_CR11","unstructured":"Zhang, Z., Zhang, A., Li, M., et al.: Automatic chain of thought prompting in large language models. arXiv preprint arXiv:2210.03493 (2022)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Jalali, S., Wohlin, C.: Systematic literature studies: database searches vs. backward snowballing. In: Proceedings of the ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 29\u201338 (2012)","DOI":"10.1145\/2372251.2372257"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Wohlin, C.: Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, pp. 1\u201310 (2014)","DOI":"10.1145\/2601248.2601268"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Badampudi, D., Wohlin, C., Petersen, K.: Experiences from using snowballing and database searches in systematic literature studies. In: Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering, pp. 1\u201310 (2015)","DOI":"10.1145\/2745802.2745818"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"McGrew, D., Curcio, M., Fluhrer, S.: RFC 8554: Leighton-Micali hash-based signatures (2019)","DOI":"10.17487\/RFC8554"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"H\u00fclsing, A., Butin, D., Gazdag, S., et al.: RFC 8391: XMSS: eXtended Merkle Signature Scheme (2018)","DOI":"10.17487\/RFC8391"},{"key":"10_CR17","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-208","author":"DA Cooper","year":"2020","unstructured":"Cooper, D.A., Apon, D.C., Dang, Q.H., Davidson, M.S., Dworkin, M.J., Miller, C.A.: Recommendation for stateful hash-based signature schemes (NIST Special Publication 800\u2013208). Natl. Inst. Stand. Technol. (2020). https:\/\/doi.org\/10.6028\/NIST.SP.800-208","journal-title":"Natl. Inst. Stand. Technol."},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology: Module-Lattice-Based Digital Signature Standard (Federal Information Processing Standards Publication 204). U.S. Department of Commerce (2024). https:\/\/doi.org\/10.6028\/NIST.FIPS.204","DOI":"10.6028\/NIST.FIPS.204"},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2020.3013019","volume":"8","author":"S Suhail","year":"2020","unstructured":"Suhail, S., Hussain, R., Khan, A., et al.: On the role of hash-based signatures in quantum-safe internet of things: current solutions and future directions. IEEE Internet Things J. 8(1), 1\u201317 (2020)","journal-title":"IEEE Internet Things J."},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Bavdekar, R., Chopde, E.J., Agrawal, A., et al.: Post quantum cryptography: a review of techniques, challenges and standardizations. In: 2023 International Conference on Information Networking (ICOIN), pp. 146\u2013151. IEEE (2023)","DOI":"10.1109\/ICOIN56518.2023.10048976"},{"key":"10_CR21","unstructured":"Li, Q., Li, J., Sheng, J., et al.: A survey on deep learning event extraction: approaches and applications. IEEE Trans. Neural Networks Learn. Syst. (2022)"},{"key":"10_CR22","unstructured":"OpenAI: ChatGPT (GPT-4) (2023). https:\/\/chat.openai.com"},{"key":"10_CR23","unstructured":"Anthropic: Claude (2023). https:\/\/claude.ai"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6209-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T17:43:33Z","timestamp":1773251013000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6209-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562084","9789819562091"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6209-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}