{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:22:34Z","timestamp":1774120954940,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,5,10]],"date-time":"2012-05-10T00:00:00Z","timestamp":1336608000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s00145-012-9125-6","type":"journal-article","created":{"date-parts":[[2012,5,9]],"date-time":"2012-05-09T06:25:39Z","timestamp":1336544739000},"page":"313-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":138,"title":["Quark: A Lightweight Hash"],"prefix":"10.1007","volume":"26","author":[{"given":"Jean-Philippe","family":"Aumasson","sequence":"first","affiliation":[]},{"given":"Luca","family":"Henzen","sequence":"additional","affiliation":[]},{"given":"Willi","family":"Meier","sequence":"additional","affiliation":[]},{"given":"Mar\u00eda","family":"Naya-Plasencia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,10]]},"reference":[{"key":"9125_CR1","volume-title":"ECRYPT Symmetric Key Encryption Workshop 2011","author":"M. \u00c5gren","year":"2011","unstructured":"M. \u00c5gren, M. Hell, T. Johansson, W. Meier, A new version of Grain-128 with authentication, in ECRYPT Symmetric Key Encryption Workshop 2011 (2011). Available at \n                    http:\/\/skew2011.mat.dtu.dk\/"},{"key":"9125_CR2","series-title":"LNCS","first-page":"202","volume-title":"ACISP","author":"J.-P. Aumasson","year":"2009","unstructured":"J.-P. Aumasson, E. Brier, W. Meier, M. Naya-Plasencia, T. Peyrin, Inside the hypercube, in ACISP, ed. by C. Boyd, J. Manuel Gonz\u00e1lez Nieto. LNCS, vol. 5594 (Springer, Berlin, 2009), pp. 202\u2013213"},{"key":"9125_CR3","volume-title":"SHARCS","author":"J.-P. Aumasson","year":"2009","unstructured":"J.-P. Aumasson, I. Dinur, L. Henzen, W. Meier, A. Shamir, Efficient FPGA implementations of highly-dimensional cube testers on the stream cipher Grain-128, in SHARCS (2009)"},{"key":"9125_CR4","series-title":"LNCS","first-page":"1","volume-title":"FSE","author":"J.-P. Aumasson","year":"2009","unstructured":"J.-P. Aumasson, I. Dinur, W. Meier, A. Shamir, Cube testers and key recovery attacks on reduced-round MD6 and Trivium, in FSE, ed. by O. Dunkelman. LNCS, vol. 5665 (Springer, Berlin, 2009), pp. 1\u201322"},{"key":"9125_CR5","first-page":"1","volume-title":"Mangard and Standaert [50]","author":"J.-P. Aumasson","year":"2010","unstructured":"J.-P. Aumasson, L. Henzen, W. Meier, M. Naya-Plasencia, Quark: a lightweight hash, in Mangard and Standaert [50] (2010), pp. 1\u201315"},{"key":"9125_CR6","first-page":"176","volume-title":"Gong and Gupta [39]","author":"G.V. Bard","year":"2010","unstructured":"G.V. Bard, N. Courtois, J. Nakahara, P. Sepehrdad, B. Zhang, Algebraic, AIDA\/cube and side channel analysis of KATAN family of block ciphers, in Gong and Gupta [39] (2010), pp. 176\u2013196"},{"key":"9125_CR7","series-title":"LNCS","first-page":"299","volume-title":"ASIACRYPT","author":"M. Bellare","year":"2006","unstructured":"M. Bellare, T. Ristenpart, Multi-property-preserving hash domain extension and the EMD transform, in ASIACRYPT, ed. by X. Lai, K. Chen. LNCS, vol. 4284 (Springer, Berlin, 2006), pp. 299\u2013314"},{"key":"9125_CR8","volume-title":"CT-MWSCAS","author":"M. Bernet","year":"2009","unstructured":"M. Bernet, L. Henzen, H. Kaeslin, N. Felber, W. Fichtner, Hardware implementations of the SHA-3 candidates Shabal and CubeHash, in CT-MWSCAS (IEEE, New York, 2009)"},{"key":"9125_CR9","unstructured":"D.J. Bernstein, CubeHash appendix: complexity of generic attacks. Submission to NIST, 2008. \n                    http:\/\/cubehash.cr.yp.to\/submission\/generic.pdf"},{"key":"9125_CR10","unstructured":"D.J. Bernstein, CubeHash parameter tweak: 16 times faster, 2009. \n                    http:\/\/cubehash.cr.yp.to\/submission\/tweak.pdf"},{"key":"9125_CR11","unstructured":"D.J. Bernstein, CubeHash specification (2.B.1). Submission to NIST (Round 2), 2009. \n                    http:\/\/cubehash.cr.yp.to\/submission2\/spec.pdf"},{"key":"9125_CR12","volume-title":"Second NIST Cryptographic Hash Function Workshop","author":"G. Bertoni","year":"2006","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, RadioGat\u00fan, a belt-and-mill hash function, in Second NIST Cryptographic Hash Function Workshop (2006). \n                    http:\/\/radiogatun.noekeon.org\/"},{"key":"9125_CR13","series-title":"LNCS","first-page":"181","volume-title":"EUROCRYPT","author":"G. Bertoni","year":"2008","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, On the indifferentiability of the sponge construction, in EUROCRYPT, ed. by N.P. Smart. LNCS, vol. 4965 (Springer, Berlin, 2008), pp. 181\u2013197"},{"key":"9125_CR14","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, Keccak sponge function family main document (version 2.1). Submission to NIST (Round 2), 2010. \n                    http:\/\/keccak.noekeon.org\/Keccak-main-2.1.pdf"},{"key":"9125_CR15","first-page":"33","volume-title":"Mangard and Standaert [50]","author":"G. Bertoni","year":"2010","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, Sponge-based pseudo-random number generators, in Mangard and Standaert [50] (2010), pp. 33\u201347"},{"key":"9125_CR16","volume-title":"ECRYPT Symmetric Key Encryption Workshop 2011","author":"G. Bertoni","year":"2011","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, On the security of the keyed sponge construction, in ECRYPT Symmetric Key Encryption Workshop 2011 (2011). Available at \n                    http:\/\/skew2011.mat.dtu.dk\/"},{"key":"9125_CR17","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, Sponge functions. \n                    http:\/\/sponge.noekeon.org\/SpongeFunctions.pdf"},{"key":"9125_CR18","doi-asserted-by":"crossref","unstructured":"G. Bertoni, J. Daemen, M. Peeters, G. Van Assche, Duplexing the sponge: single-pass authenticated encryption and other applications. Cryptology ePrint Archive, Report 2011\/499, 2011","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"9125_CR19","unstructured":"E. Biham, O. Dunkelman, A framework for iterative hash functions\u2014HAIFA. Cryptology ePrint Archive, Report 2007\/278, 2007"},{"key":"9125_CR20","series-title":"LNCS","first-page":"245","volume-title":"FSE","author":"A. Biryukov","year":"1999","unstructured":"A. Biryukov, D. Wagner, Slide attacks, in FSE, ed. by L. Knudsen. LNCS, vol. 1636 (Springer, Berlin, 1999), pp. 245\u2013259"},{"key":"9125_CR21","doi-asserted-by":"crossref","unstructured":"A. Bogdanov, C. Rechberger, A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN. Cryptology ePrint Archive, Report 2010\/532, 2010","DOI":"10.1007\/978-3-642-19574-7_16"},{"key":"9125_CR22","series-title":"LNCS","first-page":"450","volume-title":"CHES","author":"A. Bogdanov","year":"2007","unstructured":"A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: an ultra-lightweight block cipher, in CHES, ed. by P. Paillier, I. Verbauwhede. LNCS, vol. 4727 (Springer, Berlin, 2007), pp. 450\u2013466"},{"key":"9125_CR23","series-title":"LNCS","first-page":"283","volume-title":"CHES","author":"A. Bogdanov","year":"2008","unstructured":"A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, Hash functions and RFID tags: mind the gap, in CHES, ed. by E. Oswald, P. Rohatgi. LNCS, vol. 5154 (Springer, Berlin, 2008), pp. 283\u2013299"},{"key":"9125_CR24","series-title":"LNCS","first-page":"312","volume-title":"CHES","author":"A. Bogdanov","year":"2011","unstructured":"A. Bogdanov, M. Knezevic, G. Leander, D. Toz, K. Varici, I. Verbauwhede, SPONGENT: a lightweight hash function, in CHES, ed. by B. Preneel, T. Takagi. LNCS, vol. 6917 (Springer, Berlin, 2011), pp.\u00a0312\u2013325"},{"key":"9125_CR25","series-title":"LNCS","first-page":"302","volume-title":"CT-RSA","author":"J.Y. Cho","year":"2010","unstructured":"J.Y. Cho, Linear cryptanalysis of reduced-round PRESENT, in CT-RSA, ed. by J. Pieprzyk. LNCS, vol. 5985 (Springer, Berlin, 2010), pp. 302\u2013317"},{"key":"9125_CR26","series-title":"LNCS","volume-title":"Cryptographic Hardware and Embedded Systems\u2014CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6\u20139, 2009, Proceedings","year":"2009","unstructured":"C. Clavier, K. Gaj (eds.), Cryptographic Hardware and Embedded Systems\u2014CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6\u20139, 2009, Proceedings. LNCS, vol.\u00a05747 (Springer, Berlin, 2009)"},{"key":"9125_CR27","series-title":"LNCS","first-page":"430","volume-title":"CRYPTO","author":"J.-S. Coron","year":"2005","unstructured":"J.-S. Coron, Y. Dodis, C. Malinaud, P. Puniya, Merkle\u2013Damg\u00e5rd revisited: how to construct a hash function, in CRYPTO, ed. by V. Shoup. LNCS, vol. 3621 (Springer, Berlin, 2005), pp. 430\u2013448"},{"key":"9125_CR28","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"C. Canni\u00e8re De","year":"2008","unstructured":"C. De Canni\u00e8re, B. Preneel, Trivium, in New Stream Cipher Designs. LNCS, vol. 4986 (Springer, Berlin, 2008), pp. 84\u201397"},{"key":"9125_CR29","volume-title":"SASC 2008","author":"C. Canni\u00e8re De","year":"2008","unstructured":"C. De Canni\u00e8re, \u00d6. K\u00fcc\u00fck, B. Preneel, Analysis of Grain\u2019s initialization algorithm, in SASC 2008 (2008)"},{"key":"9125_CR30","first-page":"272","volume-title":"Clavier and Gaj [26]","author":"C. Canni\u00e8re De","year":"2009","unstructured":"C. De Canni\u00e8re, O. Dunkelman, M. Knezevic, KATAN and KTANTAN\u2014a family of small and efficient hardware-oriented block ciphers, in Clavier and Gaj [26] (2009), pp. 272\u2013288"},{"key":"9125_CR31","series-title":"LNCS","first-page":"278","volume-title":"EUROCRYPT","author":"I. Dinur","year":"2009","unstructured":"I. Dinur, A. Shamir, Cube attacks on tweakable black box polynomials, in EUROCRYPT, ed. by A.\u00a0Joux. LNCS, vol. 5479 (Springer, Berlin, 2009), pp. 278\u2013299"},{"key":"9125_CR32","doi-asserted-by":"crossref","unstructured":"I. Dinur, A. Shamir, Breaking Grain-128 with dynamic cube attacks. Cryptology ePrint Archive, Report 2010\/570, 2010","DOI":"10.1007\/978-3-642-21702-9_10"},{"key":"9125_CR33","series-title":"LNCS","first-page":"327","volume-title":"ASIACRYPT","author":"I. Dinur","year":"2011","unstructured":"I. Dinur, T. G\u00fcneysu, C. Paar, A. Shamir, R. Zimmermann, An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware, in ASIACRYPT, ed. by D.H.\u00a0Lee, X. Wang. LNCS, vol. 7073 (Springer, Berlin, 2011), pp. 327\u2013343"},{"key":"9125_CR34","series-title":"LNCS","first-page":"268","volume-title":"INDOCRYPT","author":"H. Englund","year":"2007","unstructured":"H. Englund, T. Johansson, M.S. Turan, A framework for chosen IV statistical analysis of stream ciphers, in INDOCRYPT, ed. by K. Srinathan, C. Pandu Rangan, M. Yung. LNCS, vol. 4859 (Springer, Berlin, 2007), pp. 268\u2013281"},{"key":"9125_CR35","series-title":"LNCS","first-page":"372","volume-title":"OTM Workshops (1)","author":"M. Feldhofer","year":"2006","unstructured":"M. Feldhofer, C. Rechberger, A case against currently used hash functions in RFID protocols, in OTM Workshops (1), ed. by R. Meersman, Z. Tari, P. Herrero. LNCS, vol. 4277 (Springer, Berlin, 2006), pp.\u00a0372\u2013381"},{"key":"9125_CR36","first-page":"1839","volume-title":"ISCAS 2007","author":"M. Feldhofer","year":"2007","unstructured":"M. Feldhofer, J. Wolkerstorfer, Strong crypto for RFID tags\u2014a comparison of low-power hardware implementations, in ISCAS 2007 (IEEE, New York, 2007), pp. 1839\u20131842"},{"key":"9125_CR37","volume-title":"SASC 2007","author":"W. Fischer","year":"2007","unstructured":"W. Fischer, B.M. Gammel, O. Kniffler, J. Velten, Differential power analysis of stream ciphers, in SASC 2007 (2007)"},{"key":"9125_CR38","first-page":"66","volume-title":"Clavier and Gaj [26]","author":"P.-A. Fouque","year":"2009","unstructured":"P.-A. Fouque, G. Leurent, D. R\u00e9al, F. Valette, Practical electromagnetic template attack on HMAC, in Clavier and Gaj [26] (2009), pp. 66\u201380"},{"key":"9125_CR39","series-title":"LNCS","volume-title":"Progress in Cryptology\u2014INDOCRYPT 2010\u201411th International Conference on Cryptology in India","year":"2010","unstructured":"G. Gong, K.C. Gupta (eds.), Progress in Cryptology\u2014INDOCRYPT 2010\u201411th International Conference on Cryptology in India, Hyderabad, India, December 12\u201315, 2010. LNCS, vol.\u00a06498 (Springer, Berlin, 2010)"},{"key":"9125_CR40","volume-title":"SASC","author":"T. Good","year":"2008","unstructured":"T. Good, M. Benaissa, Hardware performance of eSTREAM phase-III stream cipher candidates, in SASC (2008)"},{"key":"9125_CR41","series-title":"LNCS","first-page":"222","volume-title":"CRYPTO","author":"J. Guo","year":"2011","unstructured":"J. Guo, T. Peyrin, A. Poschmann, The PHOTON family of lightweight hash functions, in CRYPTO, ed. by P. Rogaway. LNCS, vol. 6841 (Springer, Berlin, 2011), pp. 222\u2013239"},{"key":"9125_CR42","unstructured":"J. Guo, T. Peyrin, A. Poschmann, The PHOTON family of lightweight hash functions (2011). Available on \n                    https:\/\/sites.google.com\/site\/photonhashfunction\/\n                    \n                  . Full version of [41]"},{"key":"9125_CR43","volume-title":"IEEE International Symposium on Information Theory (ISIT 2006)","author":"M. Hell","year":"2006","unstructured":"M. Hell, T. Johansson, A. Maximov, W. Meier, A stream cipher proposal: Grain-128, in IEEE International Symposium on Information Theory (ISIT 2006) (2006)"},{"issue":"1","key":"9125_CR44","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M. Hell","year":"2007","unstructured":"M. Hell, T. Johansson, W. Meier, Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput.\n                  2(1), 86\u201393 (2007)","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"9125_CR45","series-title":"LNCS","first-page":"258","volume-title":"RFIDSec","author":"E.B. Kavun","year":"2010","unstructured":"E.B. Kavun, T. Yalcin, A lightweight implementation of Keccak hash function for radio-frequency identification applications, in RFIDSec, ed. by S.B.O. Yalcin. LNCS, vol. 6370 (Springer, Berlin, 2010), pp. 258\u2013269"},{"key":"9125_CR46","series-title":"LNCS","first-page":"183","volume-title":"EUROCRYPT","author":"J. Kelsey","year":"2006","unstructured":"J. Kelsey, T. Kohno, Herding hash functions and the Nostradamus attack, in EUROCRYPT, ed. by S. Vaudenay. LNCS, vol. 4004 (Springer, Berlin, 2006), pp. 183\u2013200"},{"key":"9125_CR47","series-title":"LNCS","first-page":"130","volume-title":"ASIACRYPT","author":"S. Knellwolf","year":"2010","unstructured":"S. Knellwolf, W. Meier, M. Naya-Plasencia, Conditional differential cryptanalysis of NLFSR-based cryptosystems, in ASIACRYPT, ed. by M. Abe. LNCS, vol. 6477 (Springer, Berlin, 2010), pp. 130\u2013145"},{"key":"9125_CR48","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-28496-0_12","volume-title":"Selected Areas in Cryptography","author":"S. Knellwolf","year":"2012","unstructured":"S. Knellwolf, W. Meier, M. Naya-Plasencia, Conditional differential cryptanalysis of Trivium and KATAN, in Selected Areas in Cryptography, ed. by A.\u00a0Miri, S. Vaudenay. LNCS, vol. 7118 (Springer, Berlin, 2012), pp. 200\u2013212"},{"key":"9125_CR49","series-title":"LNCS","first-page":"321","volume-title":"ACISP","author":"Y. Lee","year":"2008","unstructured":"Y. Lee, K. Jeong, J. Sung, S. Hong, Related-key chosen IV attacks on Grain-v1 and Grain-128, in ACISP, ed. by Y. Mu, W. Susilo, J. Seberry. LNCS, vol. 5107 (Springer, Berlin, 2008), pp. 321\u2013335"},{"key":"9125_CR50","series-title":"LNCS","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop","year":"2010","unstructured":"S. Mangard, F.-X. Standaert (eds.), Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17\u201320, 2010. LNCS, vol.\u00a06225 (Springer, Berlin, 2010)"},{"key":"9125_CR51","series-title":"LNCS","first-page":"317","volume-title":"WISA","author":"R.P. McEvoy","year":"2007","unstructured":"R.P. McEvoy, M. Tunstall, C.C. Murphy, W.P. Marnane, Differential power analysis of HMAC based on SHA-2, and countermeasures, in WISA, ed. by S. Kim, M. Yung, H.-W. Lee. LNCS, vol. 4867 (Springer, Berlin, 2007), pp. 317\u2013332"},{"key":"9125_CR52","unstructured":"NIST, Cryptographic hash algorithm competition. \n                    http:\/\/www.nist.gov\/hash-competition"},{"key":"9125_CR53","volume-title":"Workshop on RFID Security RFIDsec","author":"M. O\u2019Neill","year":"2008","unstructured":"M. O\u2019Neill, Low-cost SHA-1 hash function architecture for RFID tags, in Workshop on RFID Security RFIDsec (2008)"},{"key":"9125_CR54","first-page":"97","volume-title":"30th Symposium on Information Theory in the Benelux","author":"M. Renauld","year":"2009","unstructured":"M. Renauld, F.-X. Standaert, Combining algebraic and side-channel cryptanalysis against block ciphers, in 30th Symposium on Information Theory in the Benelux (2009), pp. 97\u2013104. \n                    http:\/\/www.dice.ucl.ac.be\/~fstandae\/68.pdf"},{"key":"9125_CR55","first-page":"260","volume-title":"SECRYPT","author":"M.-J.O. Saarinen","year":"2006","unstructured":"M.-J.O. Saarinen, Chosen-IV statistical attacks on eStream ciphers, in SECRYPT, ed. by M. Malek, E.\u00a0Fern\u00e1ndez-Medina, J. Hernando (INSTICC Press, Setubal, 2006), pp. 260\u2013266"},{"key":"9125_CR56","series-title":"LNCS","first-page":"485","volume-title":"EUROCRYPT","author":"P. Sarkar","year":"2000","unstructured":"P. Sarkar, S. Maitra, Construction of nonlinear boolean functions with important cryptographic properties, in EUROCRYPT, ed. by B. Preneel. LNCS, vol. 1807 (Springer, Berlin, 2000), pp. 485\u2013506"},{"key":"9125_CR57","series-title":"LNCS","first-page":"144","volume-title":"FSE","author":"A. Shamir","year":"2008","unstructured":"A. Shamir, SQUASH\u2014a new MAC with provable security properties for highly constrained devices such as RFID tags, in FSE, ed. by K. Nyberg. LNCS, vol. 5086 (Springer, Berlin, 2008), pp. 144\u2013157"},{"key":"9125_CR58","first-page":"210","volume-title":"Gong and Gupta [39]","author":"P. Stankovski","year":"2010","unstructured":"P. Stankovski, Greedy distinguishers and nonrandomness detectors, in Gong and Gupta [39] (2010), pp.\u00a0210\u2013226"},{"key":"9125_CR59","unstructured":"G. Van Assche, Errata for Keccak presentation. Email sent to the NIST SHA-3 mailing list on Feb. 7, 2011, on behalf of the Keccak team"},{"key":"9125_CR60","series-title":"LNCS","first-page":"433","volume-title":"ACISP","author":"L. Wei","year":"2011","unstructured":"L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang, S. Ling, Improved meet-in-the-middle cryptanalysis of KTANTAN (poster), in ACISP, ed. by U. Parampalli, P. Hawkes. LNCS, vol. 6812 (Springer, Berlin, 2011), pp. 433\u2013438"},{"key":"9125_CR61","volume-title":"ECRYPT Hash Workshop 2007","author":"H. Yoshida","year":"2007","unstructured":"H. Yoshida, D. Watanabe, K. Okeya, J. Kitahara, H. Wu, O. Kucuk, B. Preneel, MAME: a compression function with reduced hardware requirements, in ECRYPT Hash Workshop 2007 (2007)"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9125-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-012-9125-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9125-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9125-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:08:26Z","timestamp":1586333306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-012-9125-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,10]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["9125"],"URL":"https:\/\/doi.org\/10.1007\/s00145-012-9125-6","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,10]]},"assertion":[{"value":"29 September 2010","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2012","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}