{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T06:11:59Z","timestamp":1775801519701,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":49,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819608904","type":"print"},{"value":"9789819608911","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0891-1_13","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:37:46Z","timestamp":1733956666000},"page":"396-429","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["SQIPrime: A Dimension 2 Variant of\u00a0SQISignHD with\u00a0Non-smooth Challenge Isogenies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4179-9547","authenticated-orcid":false,"given":"Max","family":"Duparc","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1821-8406","authenticated-orcid":false,"given":"Tako Boris","family":"Fouotsa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"13_CR1","unstructured":"Basso, A.: POKE: A framework for efficient PKEs, split KEMs, and OPRFs from higher-dimensional isogenies. Cryptology ePrint Archive, Paper 2024\/624 (2024), https:\/\/eprint.iacr.org\/2024\/624"},{"key":"13_CR2","unstructured":"Basso, A., Feo, L.D., Dartois, P., Leroux, A., Maino, L., Pope, G., Robert, D., Wesolowski, B.: SQIsign2D-West: The Fast, the Small, and the Safer. Cryptology ePrint Archive, Paper 2024\/760 (2024), https:\/\/eprint.iacr.org\/2024\/760"},{"key":"13_CR3","doi-asserted-by":"publisher","unstructured":"Basso, A., Maino, L., Pope, G.: FESTA: Fast encryption from supersingular torsion attacks. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0VII. LNCS, vol. 14444, pp. 98\u2013126. Springer, Singapore (Dec 2023). https:\/\/doi.org\/10.1007\/978-981-99-8739-9_4","DOI":"10.1007\/978-981-99-8739-9_4"},{"issue":"1","key":"13_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2140\/obs.2020.4.39","volume":"4","author":"DJ Bernstein","year":"2020","unstructured":"Bernstein, D.J., De\u00a0Feo, L., Leroux, A., Smith, B.: Faster computation of isogenies of large prime degree. Open Book Series 4(1), 39\u201355 (2020)","journal-title":"Open Book Series"},{"key":"13_CR5","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., Hamburg, M., Krasnova, A., Lange, T.: Elligator: elliptic-curve points indistinguishable from uniform random strings. In: Sadeghi, A.R., Gligor, V.D., Yung, M. (eds.) ACM CCS 2013. pp. 967\u2013980. ACM Press (Nov 2013).https:\/\/doi.org\/10.1145\/2508859.2516734","DOI":"10.1145\/2508859.2516734"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Beullens, W., Kleinjung, T., Vercauteren, F.: CSI-FiSh: Efficient isogeny based signatures through class group computations. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT\u00a02019, Part\u00a0I. LNCS, vol. 11921, pp. 227\u2013247. Springer, Cham (Dec 2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_9","DOI":"10.1007\/978-3-030-34578-5_9"},{"key":"13_CR7","doi-asserted-by":"publisher","unstructured":"Bruno, G., Santos, M.C.R., Costello, C., Eriksen, J.K., Meyer, M., Naehrig, M., Sterner, B.: Cryptographic smooth neighbors. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0VII. LNCS, vol. 14444, pp. 190\u2013221. Springer, Singapore (Dec 2023).https:\/\/doi.org\/10.1007\/978-981-99-8739-9_7","DOI":"10.1007\/978-981-99-8739-9_7"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 423\u2013447. Springer, Cham (Apr 2023).https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"13_CR9","doi-asserted-by":"publisher","unstructured":"Chen, M., Leroux, A., Panny, L.: SCALLOP-HD: group action from 2-dimensional isogenies. In: Tang, Q., Teague, V. (eds.) PKC\u00a02024, Part\u00a0II. LNCS, vol. 14603, pp. 190\u2013216. Springer, Cham (Apr 2024).https:\/\/doi.org\/10.1007\/978-3-031-57725-3_7","DOI":"10.1007\/978-3-031-57725-3_7"},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Costello, C.: B-SIDH: Supersingular isogeny Diffie-Hellman using twisted torsion. In: Moriai, S., Wang, H. (eds.) ASIACRYPT\u00a02020, Part\u00a0II. LNCS, vol. 12492, pp. 440\u2013463. Springer, Cham (Dec 2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_15","DOI":"10.1007\/978-3-030-64834-3_15"},{"key":"13_CR11","doi-asserted-by":"publisher","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQIsignHD: New dimensions in cryptography. In: Joye, M., Leander, G. (eds.) EUROCRYPT\u00a02024, Part\u00a0I. LNCS, vol. 14651, pp. 3\u201332. Springer, Cham (May 2024).https:\/\/doi.org\/10.1007\/978-3-031-58716-0_1","DOI":"10.1007\/978-3-031-58716-0_1"},{"key":"13_CR12","unstructured":"Dartois, P., Maino, L., Pope, G., Robert, D.: An algorithmic approach to $$(2,2)$$-isogenies in the theta model and applications to isogeny-based cryptography. Cryptology ePrint Archive, Paper 2023\/1747 (2023), https:\/\/eprint.iacr.org\/2023\/1747"},{"key":"13_CR13","unstructured":"De\u00a0Feo, L.: Mathematics of isogeny based cryptography. arXiv preprint arXiv:1711.04062 (2017)"},{"key":"13_CR14","doi-asserted-by":"publisher","unstructured":"De Feo, L., Delpech de Saint Guilhem, C., Fouotsa, T.B., Kutas, P., Leroux, A., Petit, C., Silva, J., Wesolowski, B.: S\u00e9ta: Supersingular encryption from torsion attacks. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT\u00a02021, Part\u00a0IV. LNCS, vol. 13093, pp. 249\u2013278. Springer, Cham (Dec 2021).https:\/\/doi.org\/10.1007\/978-3-030-92068-5_9","DOI":"10.1007\/978-3-030-92068-5_9"},{"key":"13_CR15","doi-asserted-by":"publisher","unstructured":"De Feo, L., Fouotsa, T.B., Panny, L.: Isogeny problems with level structure. In: Joye, M., Leander, G. (eds.) EUROCRYPT\u00a02024, Part\u00a0VII. LNCS, vol. 14657, pp. 181\u2013204. Springer, Cham (May 2024).https:\/\/doi.org\/10.1007\/978-3-031-58754-2_7","DOI":"10.1007\/978-3-031-58754-2_7"},{"key":"13_CR16","doi-asserted-by":"publisher","unstructured":"De Feo, L., Galbraith, S.D.: SeaSign: Compact isogeny signatures from class group actions. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT\u00a02019, Part\u00a0III. LNCS, vol. 11478, pp. 759\u2013789. Springer, Cham (May 2019). https:\/\/doi.org\/10.1007\/978-3-030-17659-4_26","DOI":"10.1007\/978-3-030-17659-4_26"},{"issue":"3","key":"13_CR17","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1515\/jmc-2012-0015","volume":"8","author":"L De Feo","year":"2014","unstructured":"De\u00a0Feo, L., Jao, D., Pl\u00fbt, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Journal of Mathematical Cryptology 8(3), 209\u2013247 (2014)","journal-title":"Journal of Mathematical Cryptology"},{"key":"13_CR18","doi-asserted-by":"publisher","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: Compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT\u00a02020, Part\u00a0I. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (Dec 2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3","DOI":"10.1007\/978-3-030-64837-4_3"},{"key":"13_CR19","doi-asserted-by":"publisher","unstructured":"De Feo, L., Leroux, A., Longa, P., Wesolowski, B.: New algorithms for the deuring correspondence - towards practical and secure SQISign signatures. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 659\u2013690. Springer, Cham (Apr 2023).https:\/\/doi.org\/10.1007\/978-3-031-30589-4_23","DOI":"10.1007\/978-3-031-30589-4_23"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Deuring, M.: Die typen der multiplikatorenringe elliptischer funktionenk\u00f6rper. In: Abhandlungen aus dem mathematischen Seminar der Universit\u00e4t Hamburg. vol.\u00a014, pp. 197\u2013272. Springer Berlin\/Heidelberg (1941)","DOI":"10.1007\/BF02940746"},{"key":"13_CR21","unstructured":"Duparc, M., Fouotsa, T.B.: SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies. Cryptology ePrint Archive, Paper 2024\/773 (2024), https:\/\/eprint.iacr.org\/2024\/773"},{"key":"13_CR22","unstructured":"Duparc, M., Fouotsa, T.B., Vaudenay, S.: SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks. Cryptology ePrint Archive, Paper 2024\/400 (2024), https:\/\/eprint.iacr.org\/2024\/400"},{"key":"13_CR23","doi-asserted-by":"publisher","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO\u201986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Berlin, Heidelberg (Aug 1987).https:\/\/doi.org\/10.1007\/3-540-47721-7_12","DOI":"10.1007\/3-540-47721-7_12"},{"key":"13_CR24","unstructured":"Fouotsa, T.B.: A note on the prime in SQISignHD. Online (2024), https:\/\/github.com\/BorisFouotsa\/BorisFouotsa.github.io\/blob\/main\/files\/A_note_on_the_prime_in_SQISignHD.pdf"},{"key":"13_CR25","doi-asserted-by":"publisher","unstructured":"Fouotsa, T.B., Petit, C.: SHealS and HealS: Isogeny-based PKEs from a key validation method for SIDH. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT\u00a02021, Part\u00a0IV. LNCS, vol. 13093, pp. 279\u2013307. Springer, Cham (Dec 2021).https:\/\/doi.org\/10.1007\/978-3-030-92068-5_10","DOI":"10.1007\/978-3-030-92068-5_10"},{"key":"13_CR26","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1112\/S1461157000000097","volume":"2","author":"SD Galbraith","year":"1999","unstructured":"Galbraith, S.D.: Constructing isogenies between elliptic curves over finite fields. LMS Journal of Computation and Mathematics 2, 118\u2013138 (1999)","journal-title":"LMS Journal of Computation and Mathematics"},{"key":"13_CR27","doi-asserted-by":"publisher","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification protocols and signature schemes based on supersingular isogeny problems. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT\u00a02017, Part\u00a0I. LNCS, vol. 10624, pp. 3\u201333. Springer, Cham (Dec 2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_1","DOI":"10.1007\/978-3-319-70694-8_1"},{"key":"13_CR28","doi-asserted-by":"publisher","unstructured":"Jao, D., De\u00a0Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29\u2013December 2, 2011. Proceedings 4. pp. 19\u201334. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5","DOI":"10.1007\/978-3-642-25405-5"},{"issue":"485","key":"13_CR29","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1515\/1997.485.932","volume":"1997","author":"E Kani","year":"1997","unstructured":"Kani, E.: The number of curves of genus two with elliptic differentials. Journal f\u00fcr die reine und angewandte Mathematik 1997(485), 93\u2013122 (1997).https:\/\/doi.org\/10.1515\/1997.485.932","journal-title":"Journal f\u00fcr die reine und angewandte Mathematik"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.P.: On the quaternion-isogeny path problem. LMS Journal of Computation and Mathematics 17(A), 418\u2013432 (2014)","DOI":"10.1112\/S1461157014000151"},{"issue":"6","key":"13_CR31","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1007\/s10623-024-01366-1","volume":"92","author":"S Kunzweiler","year":"2024","unstructured":"Kunzweiler, S.: Efficient computation of $$(2^n, 2^n)$$-isogenies. Designs, Codes and Cryptography 92(6), 1761\u20131802 (2024)","journal-title":"Designs, Codes and Cryptography"},{"key":"13_CR32","unstructured":"Leroux, A.: Quaternion Algebra and Isogeny-Based Cryptography. Ph.D. thesis, Ecole doctorale de l\u2019Institut Polytechnique de Paris (2022)"},{"key":"13_CR33","unstructured":"Leroux, A.: Verifiable random function from the Deuring correspondence and higher dimensional isogenies. Cryptology ePrint Archive, Paper 2023\/1251 (2023), https:\/\/eprint.iacr.org\/2023\/1251"},{"key":"13_CR34","doi-asserted-by":"publisher","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 448\u2013471. Springer, Cham (Apr 2023).https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"13_CR35","unstructured":"Moriya, T.: IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram. Cryptology ePrint Archive, Paper 2023\/1506 (2023), https:\/\/eprint.iacr.org\/2023\/1506"},{"key":"13_CR36","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., Onuki, H.: QFESTA: Efficient algorithms and parameters for FESTA using quaternion algebras. In: Reyzin, L., Stebila, D. (eds.) CRYPTO\u00a02024, Part\u00a0V. LNCS, vol. 14924, pp. 75\u2013106. Springer, Cham (Aug 2024).https:\/\/doi.org\/10.1007\/978-3-031-68388-6_4","DOI":"10.1007\/978-3-031-68388-6_4"},{"key":"13_CR37","unstructured":"Nakagawa, K., Onuki, H.: SQIsign2D-East: A new signature scheme using 2-dimensional isogenies. Cryptology ePrint Archive, Paper 2024\/771 (2024), https:\/\/eprint.iacr.org\/2024\/771"},{"key":"13_CR38","unstructured":"NIST: Post-Quantum Cryptography: Digital Signature Schemes, https:\/\/csrc.nist.gov\/projects\/pqc-dig-sig\/standardization"},{"key":"13_CR39","unstructured":"Onuki, H., Nakagawa, K.: Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign. Cryptology ePrint Archive, Paper 2024\/778 (2024), https:\/\/eprint.iacr.org\/2024\/778"},{"key":"13_CR40","unstructured":"Page, A., Robert, D.: Introducing Clapoti(s): Evaluating the isogeny class group action in polynomial time. Cryptology ePrint Archive, Paper 2023\/1766 (2023), https:\/\/eprint.iacr.org\/2023\/1766"},{"key":"13_CR41","doi-asserted-by":"publisher","unstructured":"Page, A., Wesolowski, B.: The supersingular endomorphism ring and one endomorphism problems are equivalent. In: Joye, M., Leander, G. (eds.) EUROCRYPT\u00a02024, Part\u00a0VI. LNCS, vol. 14656, pp. 388\u2013417. Springer, Cham (May 2024).https:\/\/doi.org\/10.1007\/978-3-031-58751-1_14","DOI":"10.1007\/978-3-031-58751-1_14"},{"key":"13_CR42","unstructured":"Robert, D.: Fonctions th\u00eata et applications \u00e0 la cryptographie. Ph.D. thesis, Universit\u00e9 Henri Poincar\u00e9-Nancy I (2010)"},{"key":"13_CR43","unstructured":"Robert, D.: Evaluating isogenies in polylogarithmic time. Cryptology ePrint Archive, Paper 2022\/1068 (2022), https:\/\/eprint.iacr.org\/2022\/1068"},{"key":"13_CR44","doi-asserted-by":"publisher","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 472\u2013503. Springer, Cham (Apr 2023).https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"13_CR45","unstructured":"Santos, M.C.R., Costello, C., Smith, B.: Efficient (3,3)-isogenies on fast Kummer surfaces. Cryptology ePrint Archive, Paper 2024\/144 (2024), https:\/\/eprint.iacr.org\/2024\/144"},{"key":"13_CR46","doi-asserted-by":"publisher","unstructured":"Santos, M.C.R., Eriksen, J.K., Meyer, M., Reijnders, K.: Apr\u00e8sSQI: Extra fast verification for SQIsign using extension-field signing. In: Joye, M., Leander, G. (eds.) EUROCRYPT\u00a02024, Part\u00a0I. LNCS, vol. 14651, pp. 63\u201393. Springer, Cham (May 2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_3","DOI":"10.1007\/978-3-031-58716-0_3"},{"key":"13_CR47","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The arithmetic of elliptic curves, vol.\u00a0106. Springer (2009)","DOI":"10.1007\/978-0-387-09494-6"},{"key":"13_CR48","first-page":"238","volume":"273","author":"J V\u00e9lu","year":"1971","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques. Comptes-Rendus de l\u2019Acad\u00e9mie des Sciences 273, 238\u2013241 (1971)","journal-title":"Comptes-Rendus de l\u2019Acad\u00e9mie des Sciences"},{"key":"13_CR49","doi-asserted-by":"publisher","unstructured":"Yoo, Y., Azarderakhsh, R., Jalali, A., Jao, D., Soukharev, V.: A post-quantum digital signature scheme based on supersingular isogenies. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 163\u2013181. Springer, Cham (Apr 2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_9","DOI":"10.1007\/978-3-319-70972-7_9"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0891-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:44:15Z","timestamp":1733957055000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0891-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819608904","9789819608911"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0891-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}