{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:24:43Z","timestamp":1743114283720,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":53,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609468"},{"type":"electronic","value":"9789819609475"}],"license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0947-5_10","type":"book-chapter","created":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T04:27:54Z","timestamp":1733632074000},"page":"280-311","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["General Practical Cryptanalysis of\u00a0the\u00a0Sum of\u00a0Round-Reduced Block Ciphers and\u00a0ZIP-AES"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7749-8925","authenticated-orcid":false,"given":"Antonio","family":"Fl\u00f3rez-Guti\u00e9rrez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1140-0520","authenticated-orcid":false,"given":"Lorenzo","family":"Grassi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2579-8587","authenticated-orcid":false,"given":"Gregor","family":"Leander","sequence":"additional","affiliation":[]},{"given":"Ferdinand","family":"Sibleyras","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6839-4777","authenticated-orcid":false,"given":"Yosuke","family":"Todo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Anand, R., Banik, S., Caforio, A., Ishikawa, T., Isobe, T., Liu, F., Minematsu, K., Rahman, M., Sakamoto, K.: Gleeok: A family of low-latency prfs and its applications to authenticated encryption. IACR TCHES 2024(2), 545\u2013587 (2024)","DOI":"10.46586\/tches.v2024.i2.545-587"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Avanzi, R.: The QARMA block cipher family. almost MDS matrices over rings with zero divisors, nearly symmetric even-mansour constructions with non-involutory central rounds, and search heuristics for low-latency s-boxes. IACR ToSC 2017(1), 4\u201344 (2017)","DOI":"10.46586\/tosc.v2017.i1.4-44"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Avanzi, R., Banik, S., Dunkelman, O., Eichlseder, M., Ghosh, S., Nageler, M., Regazzoni, F.: The qarmav2 family of tweakable block ciphers. IACR ToSC 2023(3), 25\u201373 (2023)","DOI":"10.46586\/tosc.v2023.i3.25-73"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Banik, S., Isobe, T., Liu, F., Minematsu, K., Sakamoto, K.: Orthros: A low-latency PRF. IACR ToSC 2021(1), 37\u201377 (2021)","DOI":"10.46586\/tosc.v2021.i1.37-77"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M., Todo, Y.: GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 321\u2013345. Springer (2017)","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Bardeh, N.G., R\u00f8njom, S.: The Exchange Attack: How to Distinguish Six Rounds of AES with $$2^{88.2}$$ Chosen Plaintexts. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019, Part III. LNCS, vol. 11923, pp. 347\u2013370. Springer (2019)","DOI":"10.1007\/978-3-030-34618-8_12"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Beierle, C., Jean, J., K\u00f6lbl, S., Leander, G., Moradi, A., Peyrin, T., Sasaki, Y., Sasdrich, P., Sim, S.M.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016, Part II. LNCS, vol.\u00a09815, pp. 123\u2013153. Springer (2016)","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"10_CR8","unstructured":"Bellare, M., Impagliazzo, R.: A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion. IACR Cryptol. ePrint Arch. p.\u00a024 (1999)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Bellare, M., Krovetz, T., Rogaway, P.: Luby-rackoff backwards: Increasing security by making block ciphers non-invertible. In: Nyberg, K. (ed.) EUROCRYPT \u201998. LNCS, vol.\u00a01403, pp. 266\u2013280. Springer (1998)","DOI":"10.1007\/BFb0054132"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Biham, E., Biryukov, A., Dunkelman, O., Richardson, E., Shamir, A.: Initial observations on skipjack: Cryptanalysis of skipjack-3xor. In: Tavares, S.E., Meijer, H. (eds.) SAC\u201998. LNCS, vol.\u00a01556, pp. 362\u2013376. Springer (1998)","DOI":"10.1007\/3-540-48892-8_27"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Stern, J. (ed.) EUROCRYPT \u201999. LNCS, vol.\u00a01592, pp. 12\u201323. Springer (1999)","DOI":"10.1007\/3-540-48910-X_2"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Biham, E., Dunkelman, O., Keller, N.: The rectangle attack - rectangling the serpent. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 340\u2013357. Springer (2001)","DOI":"10.1007\/3-540-44987-6_21"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO \u201990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer (1990)","DOI":"10.1007\/3-540-38424-3_1"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Leander, G., Nyberg, K., Wang, M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol.\u00a07658, pp. 244\u2013261. Springer (2012)","DOI":"10.1007\/978-3-642-34961-4_16"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Rijmen, V.: Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptogr. 70(3), 369\u2013383 (2014)","DOI":"10.1007\/s10623-012-9697-z"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Borghoff, J., Canteaut, A., G\u00fcneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S.S., Yal\u00e7in, T.: PRINCE - A low-latency block cipher for pervasive computing applications (full version). IACR Cryptol. ePrint Arch. p.\u00a0529 (2012)","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Bozilov, D., Eichlseder, M., Knezevic, M., Lambin, B., Leander, G., Moos, T., Nikov, V., Rasoolzadeh, S., Todo, Y., Wiemer, F.: Princev2 - more security for (almost) no overhead. In: Dunkelman, O., Jr., M.J.J., O\u2019Flynn, C. (eds.) SAC 2020. LNCS, vol. 12804, pp. 483\u2013511. Springer (2020)","DOI":"10.1007\/978-3-030-81652-0_19"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Cid, C., Murphy, S., Robshaw, M.J.B.: Small Scale Variants of the AES. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 145\u2013162. Springer (2005)","DOI":"10.1007\/11502760_10"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Wide Trail Design Strategy. In: Honary, B. (ed.) 8th IMA. LNCS, vol.\u00a02260, pp. 222\u2013238. Springer (2001)","DOI":"10.1007\/3-540-45325-3_20"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: Security of a Wide Trail Design. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 1\u201311. Springer (2002)","DOI":"10.1007\/3-540-36231-2_1"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael - The Advanced Encryption Standard (AES), Second Edition. Information Security and Cryptography, Springer (2020)","DOI":"10.1007\/978-3-662-60769-5"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Demirci, H., Sel\u00e7uk, A.A.: A meet-in-the-middle attack on 8-round AES. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 116\u2013126. Springer (2008)","DOI":"10.1007\/978-3-540-71039-4_7"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Diffie, W., Hellman, M.E.: Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6), 74\u201384 (1977)","DOI":"10.1109\/C-M.1977.217750"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Dinur, I.: Tight indistinguishability bounds for the XOR of independent random permutations by fourier analysis. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024, Part I. LNCS, vol. 14651, pp. 33\u201362. Springer (2024)","DOI":"10.1007\/978-3-031-58716-0_2"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 278\u2013299. Springer (2009)","DOI":"10.1007\/978-3-642-01001-9_16"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Dutta, A., Nandi, M., Saha, A.: Proof of mirror theory for $$\\xi {\\text{max}}$$ = 2. IEEE Trans. Inf. Theory 68(9), 6218\u20136232 (2022)","DOI":"10.1109\/TIT.2022.3171178"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D.A., Whiting, D.: Improved Cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 213\u2013230. Springer (2000)","DOI":"10.1007\/3-540-44706-7_15"},{"key":"10_CR28","unstructured":"Fl\u00f3rez-Guti\u00e9rrez, A., Grassi, L., Leander, G., Sibleyras, F., Todo, Y.: General practical cryptanalysis of the sum of round-reduced block ciphers and zip-aes, full version of this paper"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Gilbert, H.: A Simplified Representation of AES. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014, Part I. LNCS, vol.\u00a08873, pp. 200\u2013222. Springer (2014)","DOI":"10.1007\/978-3-662-45611-8_11"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Grassi, L.: Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES. IACR ToSC 2018(2), 133\u2013160 (2018)","DOI":"10.46586\/tosc.v2018.i2.133-160"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Grassi, L., Rechberger, C.: Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES. In: Nguyen, K., Yang, G., Guo, F., Susilo, W. (eds.) ACISP 2022. LNCS, vol. 13494, pp. 24\u201345. Springer (2022)","DOI":"10.1007\/978-3-031-22301-3_2"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Grassi, L., Rechberger, C., R\u00f8njom, S.: Subspace Trail Cryptanalysis and its Applications to AES. IACR ToSC 2016(2), 192\u2013225 (2016)","DOI":"10.46586\/tosc.v2016.i2.192-225"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Grassi, L., Schofnegger, M.: Mixture Integral Attacks on Reduced-Round AES with a Known\/Secret S-Box. In: Bhargavan, K., Oswald, E., Prabhakaran, M. (eds.) INDOCRYPT 2020. LNCS, vol. 12578, pp. 312\u2013331. Springer (2020)","DOI":"10.1007\/978-3-030-65277-7_14"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Gunsing, A., Bhaumik, R., Jha, A., Mennink, B., Shen, Y.: Revisiting the indifferentiability of the sum of permutations. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO 2023, Part III. LNCS, vol. 14083, pp. 628\u2013660. Springer (2023)","DOI":"10.1007\/978-3-031-38548-3_21"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Hadipour, H., Derbez, P., Eichlseder, M.: Revisiting differential-linear attacks via a boomerang perspective with application to aes, ascon, clefia, skinny, present, knot, twine, warp, lblock, simeck, and SERPENT. In: Reyzin, L., Stebila, D. (eds.) CRYPTO 2024, Part IV. LNCS, vol. 14923, pp. 38\u201372. Springer (2024)","DOI":"10.1007\/978-3-031-68385-5_2"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Hebborn, P., Lambin, B., Leander, G., Todo, Y.: Lower bounds on the degree of block ciphers. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020, Part I. LNCS, vol. 12491, pp. 537\u2013566. Springer (2020)","DOI":"10.1007\/978-3-030-64837-4_18"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Hebborn, P., Lambin, B., Leander, G., Todo, Y.: Strong and tight security guarantees against integral distinguishers. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021, Part I. LNCS, vol. 13090, pp. 362\u2013391. Springer (2021)","DOI":"10.1007\/978-3-030-92062-3_13"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Hoang, V.T., Krovetz, T., Rogaway, P.: Robust authenticated-encryption AEZ and the problem that it solves. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015, Part I. LNCS, vol.\u00a09056, pp. 15\u201344. Springer (2015)","DOI":"10.1007\/978-3-662-46800-5_2"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Jha, A., Nandi, M.: A survey on applications of h-technique: Revisiting security analysis of PRP and PRF. Entropy 24(4), \u00a0462 (2022)","DOI":"10.3390\/e24040462"},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Kohno, T., Schneier, B.: Amplified boomerang attacks against reduced-round MARS and serpent. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 75\u201393. Springer (2000)","DOI":"10.1007\/3-540-44706-7_6"},{"key":"10_CR41","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 2nd. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer (1994)","DOI":"10.1007\/3-540-60590-8_16"},{"key":"10_CR42","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R., Rijmen, V.: Known-Key Distinguishers for Some Block Ciphers. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 315\u2013324. Springer (2007)","DOI":"10.1007\/978-3-540-76900-2_19"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Leander, G., Moos, T., Moradi, A., Rasoolzadeh, S.: The SPEEDY family of block ciphers engineering an ultra low-latency cipher from gate level for secure processor architectures. IACR TCHES 2021(4), 510\u2013545 (2021)","DOI":"10.46586\/tches.v2021.i4.510-545"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Li, M., Sun, L., Wang, M.: Automated key recovery attacks on round-reduced orthros. In: Batina, L., Daemen, J. (eds.) AFRICACRYPT 2022. LNCS, vol. 13503, pp. 189\u2013213. Springer Nature Switzerland (2022)","DOI":"10.1007\/978-3-031-17433-9_9"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Lucks, S.: The sum of prps is a secure PRF. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 470\u2013484. Springer (2000)","DOI":"10.1007\/3-540-45539-6_34"},{"key":"10_CR46","doi-asserted-by":"crossref","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT \u201993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer (1993)","DOI":"10.1007\/3-540-48285-7_33"},{"key":"10_CR47","doi-asserted-by":"crossref","unstructured":"Mennink, B., Neves, S.: Encrypted davies-meyer and its dual: Towards optimal security using mirror theory. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017, Part III. LNCS, vol. 10403, pp. 556\u2013583. Springer (2017)","DOI":"10.1007\/978-3-319-63697-9_19"},{"key":"10_CR48","doi-asserted-by":"crossref","unstructured":"Mennink, B., Neves, S.: Optimal PRFs from Blockcipher Designs. IACR ToSC 2017(3), 228\u2013252 (2017)","DOI":"10.46586\/tosc.v2017.i3.228-252"},{"key":"10_CR49","unstructured":"Patarin, J.: Introduction to mirror theory: Analysis of systems of linear equalities and linear non equalities for cryptography. IACR Cryptol. ePrint Arch. p.\u00a0287 (2010)"},{"key":"10_CR50","doi-asserted-by":"crossref","unstructured":"Sun, B., Liu, Z., Rijmen, V., Li, R., Cheng, L., Wang, Q., AlKhzaimi, H., Li, C.: Links among impossible differential, integral and zero correlation linear cryptanalysis. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015, Part I. LNCS, vol.\u00a09215, pp. 95\u2013115. Springer (2015)","DOI":"10.1007\/978-3-662-47989-6_5"},{"key":"10_CR51","doi-asserted-by":"crossref","unstructured":"Taka, K., Ishikawa, T., Sakamoto, K., Isobe, T.: An efficient strategy to construct a better differential on multiple-branch-based designs: Application to orthros. In: Rosulek, M. (ed.) CT-RSA 2023. LNCS, vol. 13871, pp. 277\u2013304. Springer (2023)","DOI":"10.1007\/978-3-031-30872-7_11"},{"key":"10_CR52","doi-asserted-by":"crossref","unstructured":"Wagner, D.A.: The boomerang attack. In: Knudsen, L.R. (ed.) FSE \u201999. LNCS, vol.\u00a01636, pp. 156\u2013170. Springer (1999)","DOI":"10.1007\/3-540-48519-8_12"},{"key":"10_CR53","doi-asserted-by":"crossref","unstructured":"Wang, S., Liu, M., Hou, S., Lin, D.: Differential-linear cryptanalysis of GIFT family and GIFT-based ciphers. IACR Communications in Cryptology 1(1) (2024)","DOI":"10.62056\/a6n5txol7"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0947-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T05:03:14Z","timestamp":1733634194000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0947-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"ISBN":["9789819609468","9789819609475"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0947-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,9]]},"assertion":[{"value":"9 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}