{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:03:48Z","timestamp":1764785028984},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994. From the exact formula for evaluating the bias of a differential-linear distinguisher (JoC 2017), to the differential-linear connectivity table technique for dealing with the dependencies in the switch between the differential and linear parts (EUROCRYPT 2019), and to the improvements in the context of cryptanalysis of ARX primitives (CRYPTO 2020, EUROCRYPT 2021), we have seen significant development of the differential-linear attack during the last four years. In this work, we further extend this framework by replacing the differential part of the attack by rotational-XOR differentials. Along the way, we establish the theoretical link between the rotational-XOR differential and linear approximations and derive the closed formula for the bias of rotational differential-linear distinguishers, completely generalizing the results on ordinary differential-linear distinguishers due to Blondeau, Leander, and Nyberg (JoC 2017) to the case of rotational differential-linear cryptanalysis. We then revisit the rotational cryptanalysis from the perspective of differential-linear cryptanalysis and generalize Morawiecki et al.\u2019s technique for analyzing , which leads to a practical method for estimating the bias of a (rotational) differential-linear distinguisher in the special case where the output linear mask is a unit vector. Finally, we apply the rotational differential-linear technique to the cryptographic permutations involved in , , , and . This gives significant improvements over existing cryptanalytic results, or offers explanations for previous experimental distinguishers without a theoretical foundation. To confirm the validity of our analysis, all distinguishers with practical complexities are verified experimentally. Moreover, we discuss the possibility of applying the rotational differential-linear technique to S-box-based designs or keyed primitives, and propose some open problems for future research.<\/jats:p>","DOI":"10.1007\/s00145-022-09440-4","type":"journal-article","created":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T20:04:48Z","timestamp":1671048288000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Rotational Differential-Linear Cryptanalysis Revisited"],"prefix":"10.1007","volume":"36","author":[{"given":"Yunwen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zhongfeng","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Siwei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,14]]},"reference":[{"key":"9440_CR1","doi-asserted-by":"crossref","unstructured":"J.-P. Aumasson, D.\u00a0J. Bernstein, Siphash: A fast short-input PRF. in Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, Proceedings (2012), pp. 489\u2013508","DOI":"10.1007\/978-3-642-34931-7_28"},{"key":"9440_CR2","doi-asserted-by":"crossref","unstructured":"J.-P. Aumasson, P. Jovanovic, S. Neves. Analysis of NORX: investigating differential and rotational properties. in Progress in Cryptology - LATINCRYPT 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florian\u00f3polis, Brazil, September 17-19, 2014, Revised Selected Papers (2014), pp. 306\u2013324","DOI":"10.1007\/978-3-319-16295-9_17"},{"issue":"4","key":"9440_CR3","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1007\/s00145-018-9285-0","volume":"32","author":"Y Todo","year":"2019","unstructured":"Tomer Ashur and Yunwen Liu. Rotational cryptanalysis in the presence of constants. IACR Trans. Symmetric Cryptol., 2016(1):57\u201370, 2016.","journal-title":"J. Cryptol."},{"key":"9440_CR4","doi-asserted-by":"crossref","unstructured":"C. Beierle, A. Biryukov, L.\u00a0Cardoso dos Santos, J. Gro\u00dfsch\u00e4dl, L. Perrin, A. Udovenko, V. Velichkov, Q. Wang, Alzette: A 64-bit arx-box - (feat. CRAX and TRAX). in Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III (2020), pp. 419\u2013448","DOI":"10.1007\/978-3-030-56877-1_15"},{"key":"9440_CR5","doi-asserted-by":"crossref","unstructured":"S. Banik, A. Bogdanov, T. Isobe, K. Shibutani, H. Hiwatari, T. Akishita, F. Regazzoni, Midori: A block cipher for low energy. in Tetsu Iwata and Jung\u00a0Hee Cheon, editors, Advances in Cryptology \u2013 ASIACRYPT 2015 (Springer, Berlin Heidelberg, 2015), pp. 411\u2013436","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"9440_CR6","unstructured":"S. Barbero, E. Bellini, R.\u00a0H. Makarim, Rotational analysis of ChaCha permutation. CoRR, 2008.13406, (2020)"},{"issue":"1","key":"9440_CR7","doi-asserted-by":"publisher","first-page":"57","DOI":"10.46586\/tosc.v2016.i1.57-70","volume":"2016","author":"Tomer Ashur","year":"2016","unstructured":"M. Broll, F. Canale, N. David, A. Florez-Gutierrez, G. Leander, M. Naya-Plasencia, Y. Todo, Further improving differential-linear attacks: Applications to chaskey and serpent. Cryptology ePrint Archive, Report 2021\/820, 2021. https:\/\/eprint.iacr.org\/2021\/820","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9440_CR8","doi-asserted-by":"crossref","unstructured":"Guido Bertoni, Joan Daemen, Seth Hoffert, Micha\u00ebl Peeters, Gilles\u00a0Van Assche, and Ronny\u00a0Van Keer. Farfalle: parallel permutation-based cryptography. IACR Trans. Symmetric Cryptol., 2017(4):1\u201338, 2017.","DOI":"10.46586\/tosc.v2017.i4.1-38"},{"key":"9440_CR9","doi-asserted-by":"crossref","unstructured":"A. Bar-On, O. Dunkelman, N. Keller, A. Weizman, DLCT: A new tool for differential-linear cryptanalysis. in Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I (2019), pp. 313\u2013342","DOI":"10.1007\/978-3-030-17653-2_11"},{"key":"9440_CR10","doi-asserted-by":"crossref","unstructured":"C\u00e9line Blondeau, Gregor Leander, and Kaisa Nyberg. Differential-linear cryptanalysis revisited. J. Cryptology, 30(3):859\u2013888, 2017.","DOI":"10.1007\/s00145-016-9237-5"},{"key":"9440_CR11","doi-asserted-by":"crossref","unstructured":"C. Beierle, G. Leander, Y. Todo, Improved differential-linear attacks with applications to ARX ciphers. in Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part III (2020), pp. 329\u2013358","DOI":"10.1007\/978-3-030-56877-1_12"},{"key":"9440_CR12","unstructured":"X. Bonnetain, Tight Bounds for Simon\u2019s Algorithm. IACR Cryptol. ePrint Arch., 2020:919, (2020). https:\/\/eprint.iacr.org\/2020\/919"},{"key":"9440_CR13","unstructured":"A. Canteaut, Lecture notes on cryptographic Boolean functions, (2016). https:\/\/www.rocq.inria.fr\/secret\/Anne.Canteaut\/"},{"key":"9440_CR14","unstructured":"C. Carlet, Boolean functions for cryptography and error correcting codes, (2006). https:\/\/www.rocq.inria.fr\/secret\/Anne.Canteaut\/"},{"key":"9440_CR15","doi-asserted-by":"crossref","unstructured":"C. Cid, T. Huang, T. Peyrin, Y.\u00a0Sasaki, L. Song, Boomerang connectivity table: A new cryptanalysis tool. in Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018, Proceedings, Part II (2018), pp. 683\u2013714","DOI":"10.1007\/978-3-319-78375-8_22"},{"key":"9440_CR16","unstructured":"M. Coutinho, T.\u00a0C.\u00a0Souza Neto, Improved linear approximations to ARX ciphers and attacks against chacha. Cryptology ePrint Archive, Report 2021\/224, (2021). https:\/\/eprint.iacr.org\/2021\/224"},{"key":"9440_CR17","doi-asserted-by":"crossref","unstructured":"F. Chabaud, S. Vaudenay, Links between differential and linear cryptanalysis. in Advances in Cryptology - EUROCRYPT \u201994, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings (1994), pp. 356\u2013365","DOI":"10.1007\/BFb0053450"},{"issue":"3","key":"9440_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.46586\/tosc.v2017.i3.24-36","volume":"2017","author":"Yunwen Liu","year":"2017","unstructured":"Joan Daemen, Seth Hoffert, Gilles\u00a0Van Assche, and Ronny\u00a0Van Keer. The design of Xoodoo and Xoofff. IACR Trans. Symmetric Cryptol., 2018(4):1\u201338, 2018.","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9440_CR19","doi-asserted-by":"crossref","unstructured":"D. Dinu, L. Perrin, A. Udovenko, V. Velichkov, J. Gro\u00dfsch\u00e4dl, A. Biryukov, Design strategies for ARX with provable bounds: SPARX and LAX. in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (2016), pp. 484\u2013513","DOI":"10.1007\/978-3-662-53887-6_18"},{"key":"9440_CR20","unstructured":"L.\u00a0He, H. Yu, Cryptanalysis of reduced-round siphash. IACR Cryptol. ePrint Arch. 2019\/865, (2019)"},{"key":"9440_CR21","doi-asserted-by":"crossref","unstructured":"L. Kraleva, T. Ashur, V. Rijmen, Rotational cryptanalysis on MAC algorithm Chaskey. in Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I (2020), pp. 153-168","DOI":"10.1007\/978-3-030-57808-4_8"},{"issue":"3","key":"9440_CR22","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s00145-016-9237-5","volume":"30","author":"C\u00e9line Blondeau","year":"2017","unstructured":"S. K\u00f6lbl, G. Leander, T. Tiessen, Observations on the SIMON block cipher family. in Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I (2015), pp. 161\u2013185","journal-title":"J. Cryptol."},{"key":"9440_CR23","doi-asserted-by":"crossref","unstructured":"D. Khovratovich, I. Nikolic, Rotational cryptanalysis of ARX. in Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers (2010), pp. 333\u2013346","DOI":"10.1007\/978-3-642-13858-4_19"},{"key":"9440_CR24","doi-asserted-by":"crossref","unstructured":"D. Khovratovich, I. Nikolic, J. Pieprzyk, P. Sokolowski, R. Steinfeld, Rotational cryptanalysis of ARX revisited. in Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (2015), pp. 519\u2013536","DOI":"10.1007\/978-3-662-48116-5_25"},{"key":"9440_CR25","doi-asserted-by":"crossref","unstructured":"D. Khovratovich, I. Nikolic, C. Rechberger, Rotational rebound attacks on reduced Skein. in Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010, Proceedings (2010), pp. 1\u201319","DOI":"10.1007\/978-3-642-17373-8_1"},{"key":"9440_CR26","doi-asserted-by":"crossref","unstructured":"G. Leander, M.\u00a0A. Abdelraheem, H. AlKhzaimi, E. Zenner, A cryptanalysis of PRINTcipher: The invariant subspace attack. in Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011, Proceedings (2011), pp. 206\u2013221","DOI":"10.1007\/978-3-642-22792-9_12"},{"key":"9440_CR27","doi-asserted-by":"crossref","unstructured":"G. Leurent, Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning. in Marc Fischlin and Jean-S\u00e9bastien Coron, editors, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, volume 9665 of Lecture Notes in Computer Science (Springer, 2016), pp. 344\u2013371","DOI":"10.1007\/978-3-662-49890-3_14"},{"key":"9440_CR28","unstructured":"Z. Liu, D. Gu, J. Zhang, W. Li, Differential-multiple linear cryptanalysis. in Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers (2009), pp. 35\u201349"},{"key":"9440_CR29","doi-asserted-by":"crossref","unstructured":"S.\u00a0K. Langford, M.\u00a0E. Hellman, Differential-linear cryptanalysis. in Advances in Cryptology - CRYPTO \u201994, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings (1994), pp. 17\u201325","DOI":"10.1007\/3-540-48658-5_3"},{"issue":"4","key":"9440_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2018.i4.1-38","volume":"2018","author":"Joan Daemen","year":"2018","unstructured":"J. Lu, Y. Liu, T. Ashur, B. Sun, C. Li, Rotational-XOR cryptanalysis of Simon-like block ciphers. in Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings (2020), pp. 105\u2013124","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9440_CR31","doi-asserted-by":"crossref","unstructured":"G. Leander, B. Minaud, S. R\u00f8njom, A generic approach to invariant subspace attacks: Cryptanalysis of Robin, iSCREAM and Zorro. in Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I (2015), pp. 254\u2013283","DOI":"10.1007\/978-3-662-46800-5_11"},{"key":"9440_CR32","unstructured":"G. Leander, A. Poschmann, On the classification of 4 bit S-Boxes. in Claude Carlet and Berk Sunar, editors, Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings, volume 4547 of Lecture Notes in Computer Science (Springer, 2007), pp. 159\u2013176"},{"key":"9440_CR33","doi-asserted-by":"crossref","unstructured":"Y. Liu, S. Sun, C. Li, Rotational cryptanalysis from a differential-linear perspective - practical distinguishers for round-reduced FRIET, Xoodoo, and Alzette. in Anne Canteaut and Fran\u00e7ois-Xavier Standaert, editors, Advances in Cryptology - EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part I, volume 12696 of Lecture Notes in Computer Science (Springer, 2021), pp. 741\u2013770","DOI":"10.1007\/978-3-030-77870-5_26"},{"key":"9440_CR34","doi-asserted-by":"crossref","unstructured":"T.\u00a0Van Le, R. Sparr, R. Wernsdorf, Y. Desmedt, Complementation-like and cyclic properties of AES round functions. in Hans Dobbertin, Vincent Rijmen, and Aleksandra Sowa, editors, Advanced Encryption Standard - 4th International Conference AES 2004, volume 3373 of Lecture Notes in Computer Science (Springer, 2004), pp. 128\u2013141","DOI":"10.1007\/11506447_11"},{"key":"9440_CR35","doi-asserted-by":"crossref","unstructured":"J. Lu. A methodology for differential-linear cryptanalysis and its applications. Des. Codes Cryptogr. 77(1):11\u201348, (2015)","DOI":"10.1007\/s10623-014-9985-x"},{"key":"9440_CR36","doi-asserted-by":"crossref","unstructured":"Yunwen Liu, Glenn\u00a0De Witte, Adri\u00e1n Ranea, and Tomer Ashur. Rotational-XOR cryptanalysis of reduced-round SPECK. IACR Trans. Symmetric Cryptol., 2017(3):24\u201336, 2017.","DOI":"10.46586\/tosc.v2017.i3.24-36"},{"issue":"4","key":"9440_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2017.i4.1-38","volume":"2017","author":"Guido Bertoni","year":"2017","unstructured":"M. Matsui, Linear cryptanalysis method for DES cipher. in Advances in Cryptology - EUROCRYPT \u201993, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings (1993), pp. 386\u2013397","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"9440_CR38","doi-asserted-by":"crossref","unstructured":"P. Morawiecki, J. Pieprzyk, M. Srebrny, Rotational cryptanalysis of round-reduced Keccak. in Shiho Moriai, editor, Fast Software Encryption 2013, volume 8424 of Lecture Notes in Computer Science (Springer, 2013), pp. 241\u2013262","DOI":"10.1007\/978-3-662-43933-3_13"},{"key":"9440_CR39","doi-asserted-by":"crossref","unstructured":"T. Simon, L. Batina, J. Daemen, V. Grosso, P.M. Costa Massolino, K. Papagiannopoulos, F. Regazzoni, N. Samwel, Friet: An authenticated encryption scheme with built-in fault detection. in Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part I (2020), pp. 581-611","DOI":"10.1007\/978-3-030-45721-1_21"},{"key":"9440_CR40","doi-asserted-by":"crossref","unstructured":"T. Tiessen, Polytopic cryptanalysis. in Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I (2016), pp. 214\u2013239","DOI":"10.1007\/978-3-662-49890-3_9"},{"key":"9440_CR41","doi-asserted-by":"crossref","unstructured":"Yosuke Todo, Gregor Leander, and Yu\u00a0Sasaki. Nonlinear invariant attack: Practical attack on full SCREAM, iSCREAM, and Midori64. J. Cryptol., 32(4):1383\u20131422, 2019.","DOI":"10.1007\/s00145-018-9285-0"},{"key":"9440_CR42","doi-asserted-by":"crossref","unstructured":"Y. Todo, M. Morii, Bit-based division property and application to Simon family. in Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers (2016), pp. 357\u2013377","DOI":"10.1007\/978-3-662-52993-5_18"},{"key":"9440_CR43","doi-asserted-by":"crossref","unstructured":"Y. Todo, Structural evaluation by generalized integral property. in Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I (2015), pp. 287\u2013314","DOI":"10.1007\/978-3-662-46800-5_12"},{"key":"9440_CR44","doi-asserted-by":"crossref","unstructured":"D.A. Wagner, The boomerang attack. in Fast Software Encryption, 6th International Workshop, FSE \u201999, Rome, Italy, March 24-26, 1999, Proceedings (1999), pp. 156-170","DOI":"10.1007\/3-540-48519-8_12"},{"key":"9440_CR45","doi-asserted-by":"crossref","unstructured":"Y. Xu, B. Wu, D. Lin, Rotational-linear attack: A new framework of cryptanalysis on ARX ciphers with applications to Chaskey. in Debin Gao, Qi\u00a0Li, Xiaohong Guan, and Xiaofeng Liao, editors, Information and Communications Security - 23rd International Conference, ICICS 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part II, volume 12919 of Lecture Notes in Computer Science (Springer, 2021), pp. 192\u2013209","DOI":"10.1007\/978-3-030-88052-1_12"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-022-09440-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00145-022-09440-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-022-09440-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T23:02:55Z","timestamp":1674601375000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00145-022-09440-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["9440"],"URL":"https:\/\/doi.org\/10.1007\/s00145-022-09440-4","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,14]]},"assertion":[{"value":"11 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"3"}}