{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T17:12:08Z","timestamp":1763572328401,"version":"3.37.3"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T00:00:00Z","timestamp":1450742400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["comput. complex."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s00037-015-0121-8","type":"journal-article","created":{"date-parts":[[2015,12,22]],"date-time":"2015-12-22T08:43:18Z","timestamp":1450773798000},"page":"667-722","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Cryptographic Hardness of Random Local Functions"],"prefix":"10.1007","volume":"25","author":[{"given":"Benny","family":"Applebaum","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,22]]},"reference":[{"unstructured":"Dimitris Achlioptas (2009). Handbook of Satisfiability, chapter Random Satisfiability, 243\u2013268. IOS Press.","key":"121_CR1"},{"doi-asserted-by":"crossref","unstructured":"Dimitris Achlioptas & Federico Ricci-Tersenghi (2006). On the solution-space geometry of random constraint satisfaction problems. In 38th Annual ACM Symposium on Theory of Computing, Jon M. Kleinberg, editor, 130\u2013139. ACM Press, Seattle, Washington, USA.","key":"121_CR2","DOI":"10.1145\/1132516.1132537"},{"doi-asserted-by":"crossref","unstructured":"Mikl\u00f3s Ajtai & Cynthia Dwork (1997). A Public-Key Cryptosystem with Worst-Case\/Average-Case Equivalence. In 29th Annual ACM Symposium on Theory of Computing, 284\u2013293. ACM Press, El Paso, Texas, USA.","key":"121_CR3","DOI":"10.1145\/258533.258604"},{"doi-asserted-by":"crossref","unstructured":"Michael Alekhnovich (2003). More on Average Case vs Approximation Complexity. In 44th Annual Symposium on Foundations of Computer Science, 298\u2013307. IEEE Computer Society Press, Cambridge, Massachusetts, USA.","key":"121_CR4","DOI":"10.1109\/SFCS.2003.1238204"},{"unstructured":"Michael Alekhnovich, Edward A. Hirsch & Dmitry Itsykson (2005). Exponential Lower Bounds for the Running Time of DPLL Algorithms on Satisfiable Formulas. J. Autom. Reasoning 35(1\u20133), 51\u201372.","key":"121_CR5"},{"unstructured":"Noga Alon & Nabil Kahale (1994). A Spectral Technique for Coloring Random 3-Colorable Graphs. SIAM J. Comput 346\u2013355.","key":"121_CR6"},{"issue":"5","key":"121_CR7","doi-asserted-by":"crossref","first-page":"2008","DOI":"10.1137\/120884857","volume":"42","author":"Benny Applebaum","year":"2013","unstructured":"Applebaum Benny (2013) Pseudorandom generators with longstretch and low locality from random local one-way functions. SIAM J. Comput 42(5): 2008\u20132037","journal-title":"SIAM J. Comput"},{"doi-asserted-by":"crossref","unstructured":"Benny Applebaum, Boaz Barak & Avi Wigderson (2010). Public-key cryptography from different assumptions. In 42nd Annual ACM Symposium on Theory of Computing, Leonard J. Schulman, editor, 171\u2013180. ACM Press, Cambridge, Massachusetts, USA.","key":"121_CR8","DOI":"10.1145\/1806689.1806715"},{"doi-asserted-by":"crossref","unstructured":"Benny Applebaum, Andrej Bogdanov & Alon Rosen (2012). A Dichotomy for Local Small-Bias Generators. In TCC 2012: 9th Theory of Cryptography Conference, Ronald Cramer, editor, volume 7194 of Lecture Notes in Computer Science, 600\u2013617. Springer, Berlin, Germany, Taormina, Sicily, Italy.","key":"121_CR9","DOI":"10.1007\/978-3-642-28914-9_34"},{"unstructured":"Benny Applebaum, Yuval Ishai & Eyal Kushilevitz (2005). On One-Way Functions with Optimal Locality. Unpublished manuscript available at http:\/\/www.eng.tau.ac.il\/~bennyap .","key":"121_CR10"},{"issue":"2","key":"121_CR11","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s00037-006-0211-8","volume":"15","author":"Benny Applebaum","year":"2006","unstructured":"Applebaum Benny, Ishai Yuval, Kushilevitz Eyal (2006a) Computationally Private Randomizing Polynomials and Their Applications. Computational Complexity 15(2): 115\u2013162","journal-title":"Computational Complexity"},{"doi-asserted-by":"crossref","unstructured":"Benny Applebaum, Yuval Ishai & Eyal Kushilevitz (2006b). Cryptography in NC0. SIAM J. Comput 36(4), 845\u2013888 Preliminary version in FOCS 2004.","key":"121_CR12","DOI":"10.1137\/S0097539705446950"},{"issue":"1","key":"121_CR13","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/s00037-007-0237-6","volume":"17","author":"Benny Applebaum","year":"2008","unstructured":"Applebaum Benny, Ishai Yuval, Kushilevitz Eyal (2008) On Pseudorandom Generators with Linear Stretch in NC0. Computational Complexity 17(1): 38\u201369","journal-title":"Computational Complexity"},{"doi-asserted-by":"crossref","unstructured":"Benny Applebaum & Yoni Moses (2013). Locally Computable UOWHF with Linear Shrinkage. In Advances in Cryptology \u2013 EUROCRYPT 2013, Thomas Johansson & Phong Q. Nguyen, editors, volume 7881 of Lecture Notes in Computer Science, 486\u2013502. Springer, Berlin, Germany, Athens, Greece.","key":"121_CR14","DOI":"10.1007\/978-3-642-38348-9_29"},{"doi-asserted-by":"crossref","unstructured":"Per Austrin & Elchanan Mossel (2009). Approximation Resistant Predicates from Pairwise Independence. Computational Complexity 18(2).","key":"121_CR15","DOI":"10.1007\/s00037-009-0272-6"},{"doi-asserted-by":"crossref","unstructured":"B. Barak, S. O. Chan & P. Kothari (2015). Sum of Squares Lower Bounds from Pairwise Independence. In 47th Annual ACM Symposium on Theory of Computing, Rocco A. Servedio & Ronitt Rubinfeld, editors, 97\u2013106. ACM Press, Portland, OR, USA. Available at http:\/\/arxiv.org\/abs\/1501.00734 .","key":"121_CR16","DOI":"10.1145\/2746539.2746625"},{"doi-asserted-by":"crossref","unstructured":"Boaz Barak, Guy Kindler & David Steurer (2013). On the optimality of semidefinite relaxations for average-case and generalized constraint satisfaction. In ITCS 2013: 4th Innovations in Theoretical Computer Science, Robert D. Kleinberg, editor, 197\u2013214. Association for Computing Machinery, Berkeley, CA, USA.","key":"121_CR17","DOI":"10.1145\/2422436.2422460"},{"issue":"2","key":"121_CR18","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/375827.375835","volume":"48","author":"Eli Ben-Sasson","year":"2001","unstructured":"Ben-Sasson Eli, Wigderson Avi (2001) Short Proofs Are Narrow\u2013Resolution Made Simple. J. ACM 48(2): 149\u2013169","journal-title":"J. ACM"},{"doi-asserted-by":"crossref","unstructured":"Siavosh Benabbas, Konstantinos Georgiou, Avner Magen & Madhur Tulsiani (2012). SDP Gaps from Pairwise Independence. Theory of Computing 8(12), 269\u2013289. http:\/\/www.theoryofcomputing.org\/articles\/v008a012 .","key":"121_CR19","DOI":"10.4086\/toc.2012.v008a012"},{"unstructured":"Avrim L. Blum (1994). Relevant Examples and Relevant Features: Thoughts from Computational Learning Theory. In Proc. of AAAI Fall Symposium on Relevance, 14\u201318.","key":"121_CR20"},{"issue":"1-2","key":"121_CR21","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/S0004-3702(97)00063-5","volume":"97","author":"Avrim L. Blum","year":"1997","unstructured":"Blum Avrim L., Langley Pat (1997) Selection of relevant features and examples in machine learning. Artificial Intelligence 97(1-2): 245\u2013271","journal-title":"Artificial Intelligence"},{"doi-asserted-by":"crossref","unstructured":"Andrej Bogdanov, Periklis A. Papakonstantinou & Andrew Wan (2011). Pseudorandomness for Read-Once Formulas. In 52nd Annual Symposium on Foundations of Computer Science, Rafail Ostrovsky, editor, 240\u2013246. IEEE Computer Society Press, Palm Springs, California, USA.","key":"121_CR22","DOI":"10.1109\/FOCS.2011.57"},{"issue":"1","key":"121_CR23","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s00037-011-0034-0","volume":"21","author":"Andrej Bogdanov","year":"2012","unstructured":"Bogdanov Andrej, Qiao Youming (2012) On the security of Goldreich\u2019s one-way function. Computational Complexity 21(1): 83\u2013127","journal-title":"Computational Complexity"},{"doi-asserted-by":"crossref","unstructured":"Andrej Bogdanov & Alon Rosen (2011). Input Locality and Hardness Amplification. In TCC 2011: 8th Theory of Cryptography Conference, Yuval Ishai, editor, volume 6597 of Lecture Notes in Computer Science, 1\u201318. Springer, Berlin, Germany, Providence, RI, USA.","key":"121_CR24","DOI":"10.1007\/978-3-642-19571-6_1"},{"issue":"6","key":"121_CR25","doi-asserted-by":"crossref","first-page":"2464","DOI":"10.1137\/070712109","volume":"39","author":"Andrej Bogdanov","year":"2010","unstructured":"Bogdanov Andrej, Viola Emanuele (2010) Pseudorandom Bits for Polynomials. SIAM J. Comput 39(6): 2464\u20132486","journal-title":"SIAM J. Comput"},{"doi-asserted-by":"crossref","unstructured":"Mark Braverman (2010). Polylogarithmic independence fools AC 0 circuits. J. ACM 57(5).","key":"121_CR26","DOI":"10.1145\/1754399.1754401"},{"doi-asserted-by":"crossref","unstructured":"Moses Charikar, Anthony Wirth (2004). Maximizing Quadratic Programs: Extending Grothendieck\u2019s Inequality. In 45th Annual Symposium on Foundations of Computer Science, 54\u201360. IEEE Computer Society Press, Rome, Italy.","key":"121_CR27","DOI":"10.1109\/FOCS.2004.39"},{"doi-asserted-by":"crossref","unstructured":"Amin Coja-Oghlan (2009). Random Constraint Satisfaction Problems. In Proceedings Fifth Workshop on Developments in Computational Models\u2013Computational Models From Nature, DCM 2009, Rhodes, Greece, 11th July 2009., 32\u201337.","key":"121_CR28","DOI":"10.4204\/EPTCS.9.4"},{"issue":"3","key":"121_CR29","first-page":"14","volume":"6","author":"James Cook","year":"2014","unstructured":"Cook James, Etesami Omid, Miller Rachel, Trevisan Luca (2014) On the One-Way Function Candidate Proposed by Goldreich. ACM Transactions on Computation Theory 6(3): 14\u201311435","journal-title":"ACM Transactions on Computation Theory"},{"unstructured":"Mary Cryan & Peter Bro Miltersen (2001). On Pseudorandom Generators in NC. In Proc. of 26th Mathematical Foundations of Computer Science (MFCS), 272\u2013284.","key":"121_CR30"},{"issue":"8","key":"121_CR31","doi-asserted-by":"crossref","first-page":"3441","DOI":"10.1137\/100783030","volume":"39","author":"Ilias Diakonikolas","year":"2010","unstructured":"Diakonikolas Ilias, Gopalan Parikshit, Jaiswal Ragesh, Servedio Rocco A., Viola Emanuele (2010) Bounded Independence Fools Halfspaces. SIAM J. Comput 39(8): 3441\u20133462","journal-title":"SIAM J. Comput"},{"doi-asserted-by":"crossref","unstructured":"Ilias Diakonikolas, Daniel M. Kane & Jelani Nelson (2010b). Bounded Independence Fools Degree-2 Threshold Functions. In 51st Annual Symposium on Foundations of Computer Science, 11\u201320. IEEE Computer Society Press, Las Vegas, Nevada, USA.","key":"121_CR32","DOI":"10.1109\/FOCS.2010.8"},{"issue":"5","key":"121_CR33","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie W., Hellman M. E. (1976) New Directions in Cryptography. IEEE Transactions on Information Theory 22(5): 644\u2013654","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"Uriel Feige (2002). Relations between average case complexity and approximation complexity. In 34th Annual ACM Symposium on Theory of Computing, 534\u2013543. ACM Press, Montr\u00e9al, Qu\u00e9bec, Canada.","key":"121_CR34","DOI":"10.1145\/509907.509985"},{"doi-asserted-by":"crossref","unstructured":"Uriel Feige, Jeong Han Kim & Eran Ofek (2006). Witnesses for non-satisfiability of dense random 3CNF formulas. In 47th Annual Symposium on Foundations of Computer Science, 497\u2013508. IEEE Computer Society Press, Berkeley, CA, USA.","key":"121_CR35","DOI":"10.1109\/FOCS.2006.78"},{"doi-asserted-by":"crossref","unstructured":"Vitaly Feldman, Will Perkins & Santosh Vempala (2015). On the Complexity of Random Satisfiability Problems with Planted Solutions. In 47th Annual ACM Symposium on Theory of Computing, Rocco A. Servedio & Ronitt Rubinfeld, editors, 77\u201386. ACM Press, Portland, OR, USA.","key":"121_CR36","DOI":"10.1145\/2746539.2746577"},{"doi-asserted-by":"crossref","unstructured":"Abraham Flaxman (2008a). Random Planted 3-SAT. In Encyclopedia of Algorithms, Ming-Yang Kao, editor. Springer. ISBN 978-0-387-30162-4. http:\/\/dx.doi.org\/10.1007\/978-0-387-30162-4_330 .","key":"121_CR37","DOI":"10.1007\/978-0-387-30162-4_330"},{"issue":"4","key":"121_CR38","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1002\/rsa.20213","volume":"32","author":"Abraham Flaxman","year":"2008","unstructured":"Flaxman Abraham (2008) A spectral technique for random satisfiable 3CNF formulas. Random Struct. Algorithms 32(4): 519\u2013534","journal-title":"Random Struct. Algorithms"},{"issue":"6","key":"121_CR39","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1145\/227683.227684","volume":"42","author":"Michel X. Goemans","year":"1995","unstructured":"Goemans Michel X., Williamson David P. (1995) Improved Approximation Algorithms for Maximum Cut and Satisfiability Problems Using Semidefinite Programming. J. ACM 42(6): 1115\u20131145","journal-title":"J. ACM"},{"unstructured":"Oded Goldreich (2000). Candidate One-Way Functions Based on Expander Graphs. Electronic Colloquium on Computational Complexity (ECCC) 7(090). http:\/\/citeseer.nj.nec.com\/382413.html .","key":"121_CR40"},{"doi-asserted-by":"crossref","unstructured":"Oded Goldreich (2001). Foundations of Cryptography: Basic Tools. Cambridge University Press. ISBN 0521791723.","key":"121_CR41","DOI":"10.1017\/CBO9780511546891"},{"doi-asserted-by":"crossref","unstructured":"Oded Goldreich (2004). Foundations of Cryptography: Basic Applications. Cambridge University Press. ISBN 0521791723.","key":"121_CR42","DOI":"10.1017\/CBO9780511721656"},{"unstructured":"Oded Goldreich, Silvio Micali & Avi Wigderson (1987). How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. In 19th Annual ACM Symposium on Theory of Computing, Alfred Aho, editor, 218\u2013229. ACM Press, New York City, New York, USA. See (Goldreich 2004, Chapter 7).","key":"121_CR43"},{"issue":"4","key":"121_CR44","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s00037-008-0256-y","volume":"17","author":"Johan H\u00e5stad","year":"2008","unstructured":"H\u00e5stad Johan (2008) Every 2-CSP Allows Nontrivial Approximation. Computational Complexity 17(4): 549\u2013566","journal-title":"Computational Complexity"},{"doi-asserted-by":"crossref","unstructured":"Russell Impagliazzo, Noam Nisan & Avi Wigderson (1994). Pseudorandomness for network algorithms. In 26th Annual ACM Symposium on Theory of Computing, 356\u2013364. ACM Press, Montr\u00e9al, Qu\u00e9bec, Canada.","key":"121_CR45","DOI":"10.1145\/195058.195190"},{"doi-asserted-by":"crossref","unstructured":"Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai & David Zuckerman (2013). Robust Pseudorandom Generators. In ICALP 2013: 40th International Colloquium on Automata, Languages and Programming, Part I, Fedor V. Fomin, Rusins Freivalds, Marta Z. Kwiatkowska & David Peleg, editors, volume 7965 of Lecture Notes in Computer Science, 576\u2013588. Springer, Berlin, Germany, Riga, Latvia.","key":"121_CR46","DOI":"10.1007\/978-3-642-39206-1_49"},{"doi-asserted-by":"crossref","unstructured":"Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky & Amit Sahai (2008). Cryptography with constant computational overhead. In 40th Annual ACM Symposium on Theory of Computing, Richard E. Ladner & Cynthia Dwork, editors, 433\u2013442. ACM Press, Victoria, British Columbia, Canada.","key":"121_CR47","DOI":"10.1145\/1374376.1374438"},{"doi-asserted-by":"crossref","unstructured":"Dmitry Itsykson (2010). Lower bound on average-case complexity of inversion of Goldreich\u2019s function by drunken backtracking algorithms. In Computer Science - Theory and Applications, 5th International Computer Science Symposium in Russia, 204\u2013215.","key":"121_CR48","DOI":"10.1007\/978-3-642-13182-0_19"},{"issue":"1","key":"121_CR49","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/174644.174647","volume":"41","author":"Michael J. Kearns","year":"1994","unstructured":"Kearns Michael J., Valiant Leslie G. (1994) Cryptographic Limitations on Learning Boolean Formulae and Finite Automata. J. ACM 41(1): 67\u201395","journal-title":"J. ACM"},{"unstructured":"Subhash Khot (2002). On the power of unique 2-prover 1-round games. In 34th Annual ACM Symposium on Theory of Computing, 767\u2013775. ACM Press, Montr\u00e9al, Qu\u00e9bec, Canada.","key":"121_CR50"},{"doi-asserted-by":"crossref","unstructured":"Subhash Khot (2004). Ruling Out PTAS for Graph Min-Bisection, Densest Subgraph and Bipartite Clique. In 45th Annual Symposium on Foundations of Computer Science, 136\u2013145. IEEE Computer Society Press, Rome, Italy.","key":"121_CR51","DOI":"10.1109\/FOCS.2004.59"},{"issue":"1","key":"121_CR52","doi-asserted-by":"crossref","first-page":"69","DOI":"10.4086\/toc.2009.v005a003","volume":"5","author":"Shachar Lovett","year":"2009","unstructured":"Lovett Shachar (2009) Unconditional Pseudorandom Generators for Low Degree Polynomials. Theory of Computing 5(1): 69\u201382","journal-title":"Theory of Computing"},{"unstructured":"R. J. McEliece (1978). A Public-Key Cryptosystem Based On Algebraic Coding Theory. The Deep Space Network Progress Report, DSN PR 42\u201344, January and February 1978.","key":"121_CR53"},{"unstructured":"Elchanan Mossel, Amir Shpilka & Luca Trevisan (2003). On e-Biased Generators in NC0. In 44th Annual Symposium on Foundations of Computer Science, 136\u2013145. IEEE Computer Society Press, Cambridge, Massachusetts, USA.","key":"121_CR54"},{"doi-asserted-by":"crossref","unstructured":"Joseph Naor & Moni Naor (1993). Small-bias probability spaces: Efficient constructions and applications. SIAM J. Comput 22(4), 838\u2013856. Preliminary version in Proc. 22th STOC, 1990.","key":"121_CR55","DOI":"10.1137\/0222053"},{"doi-asserted-by":"crossref","unstructured":"Moni Naor & Moti Yung (1989). Universal One-Way Hash Functions and their Cryptographic Applications. In 21st Annual ACM Symposium on Theory of Computing, 33\u201343. ACM Press, Seattle, Washington, USA.","key":"121_CR56","DOI":"10.1145\/73007.73011"},{"doi-asserted-by":"crossref","unstructured":"Ryan O\u2019Donnell & David Witmer (2014). Goldreich\u2019s PRG: Evidence for Near-Optimal Polynomial Stretch. In Proc. of IEEE 29th Conference on Computational Complexity, 1\u201312.","key":"121_CR57","DOI":"10.1109\/CCC.2014.9"},{"unstructured":"M. Rabin (1981). How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computation Laboratory.","key":"121_CR58"},{"issue":"2","key":"121_CR59","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"Ronald L. Rivest","year":"1978","unstructured":"Rivest Ronald L., Adi Shamir, Adleman Leonard M. (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Comm. of the ACM 21(2): 120\u2013126","journal-title":"Comm. of the ACM"},{"issue":"5","key":"121_CR60","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TIT.1984.1056949","volume":"IT-30","author":"T. Siegenthaler","year":"1984","unstructured":"Siegenthaler T. (1984) Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory IT-30(5): 776\u2013779","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"Madhur Tulsiani & Pratik Worah (2013). LS+ Lower Bounds from Pairwise Independence. In Proc. of IEEE 28th Conference on Computational Complexity, 121\u2013132.","key":"121_CR61","DOI":"10.1109\/CCC.2013.21"},{"issue":"2","key":"121_CR62","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/s00037-009-0273-5","volume":"18","author":"Emanuele Viola","year":"2009","unstructured":"Viola Emanuele (2009) The Sum of D Small-Bias Generators Fools Polynomials of Degree D. Computational Complexity 18(2): 209\u2013217","journal-title":"Computational Complexity"}],"container-title":["computational complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00037-015-0121-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00037-015-0121-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00037-015-0121-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T17:18:38Z","timestamp":1567444718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00037-015-0121-8"}},"subtitle":["Survey"],"short-title":[],"issued":{"date-parts":[[2015,12,22]]},"references-count":62,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["121"],"URL":"https:\/\/doi.org\/10.1007\/s00037-015-0121-8","relation":{},"ISSN":["1016-3328","1420-8954"],"issn-type":[{"type":"print","value":"1016-3328"},{"type":"electronic","value":"1420-8954"}],"subject":[],"published":{"date-parts":[[2015,12,22]]}}}