{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T01:03:58Z","timestamp":1759971838687,"version":"build-2065373602"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10586-025-05483-x","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T12:35:58Z","timestamp":1757594158000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Effect of hash functions on speed and security within Bitcoin\u2019s proof-of-work (PoW)"],"prefix":"10.1007","volume":"28","author":[{"given":"Arieb Ashraf","family":"Sofi","sequence":"first","affiliation":[]},{"given":"Ajaz Hussain","family":"Mir","sequence":"additional","affiliation":[]},{"given":"Zamrooda","family":"Jabeen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"key":"5483_CR1","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, p. 21260 (2008)"},{"issue":"5","key":"5483_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2021.106881","volume":"40","author":"M Gietzmann","year":"2021","unstructured":"Gietzmann, M., Grossetti, F.: Blockchain and other distributed ledger technologies: where is the accounting? J. Account. Public Policy 40(5), 106881 (2021)","journal-title":"J. Account. Public Policy"},{"key":"5483_CR3","doi-asserted-by":"publisher","first-page":"102048","DOI":"10.1016\/j.phycom.2023.102048.","volume":"58","author":"I Keshta","year":"2023","unstructured":"Keshta, I., Aoudni, Y., Sandhu, M., Singh, A., Xalikovich, P.A., Rizwan, A., Soni, M., Lalar, S.: Blockchain aware proxy re-encryption algorithm-based data sharing scheme. Phys. Commun. 58, 102048 (2023). https:\/\/doi.org\/10.1016\/j.phycom.2023.102048. (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1874490723000514)","journal-title":"Phys. Commun."},{"key":"5483_CR4","doi-asserted-by":"publisher","first-page":"43620","DOI":"10.1109\/ACCESS.2021.3065880","volume":"9","author":"B Lashkari","year":"2021","unstructured":"Lashkari, B., Musilek, P.: A comprehensive review of blockchain consensus mechanisms. IEEE Access 9, 43620 (2021)","journal-title":"IEEE Access"},{"key":"5483_CR5","doi-asserted-by":"crossref","unstructured":"Alharby, M., Alssaiari, A., Alateef, S., Thomas, N., Moorsel, A.v.: A quantitative analysis of the security of pow-based blockchains. Cluster Computing, pp. 1\u201318 (2024)","DOI":"10.1007\/s10586-024-04645-7"},{"key":"5483_CR6","doi-asserted-by":"publisher","first-page":"102005","DOI":"10.1016\/j.phycom.2023.102005.","volume":"57","author":"M Soni","year":"2023","unstructured":"Soni, M., Singh, D.K.: Blockchain-based group authentication scheme for 6G communication network. Phys. Commun. 57, 102005 (2023). https:\/\/doi.org\/10.1016\/j.phycom.2023.102005. (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1874490723000083)","journal-title":"Phys. Commun."},{"key":"5483_CR7","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.ins.2019.08.031","volume":"507","author":"W Ren","year":"2020","unstructured":"Ren, W., Hu, J., Zhu, T., Ren, Y., Choo, K.K.R.: A flexible method to defend against computationally resourceful miners in blockchain proof of work. Inf. Sci. 507, 161 (2020)","journal-title":"Inf. Sci."},{"key":"5483_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-9975-3","volume-title":"Blockchain Essentials: Core Concepts and Implementations","author":"RS Mangrulkar","year":"2024","unstructured":"Mangrulkar, R.S., Chavan, P.V.: Blockchain Essentials: Core Concepts and Implementations. Springer, Berlin (2024)"},{"key":"5483_CR9","doi-asserted-by":"publisher","first-page":"106897","DOI":"10.1016\/j.compeleceng.2020.106897","volume":"90","author":"B Bhushan","year":"2021","unstructured":"Bhushan, B., Sinha, P., Sagayam, K.M., Andrew, J.: Untangling blockchain technology: a survey on state of the art, security threats, privacy services, applications and future research directions. Comput. Electr. Eng. 90, 106897 (2021)","journal-title":"Comput. Electr. Eng."},{"issue":"4","key":"5483_CR10","doi-asserted-by":"publisher","first-page":"3073","DOI":"10.1109\/TNSE.2021.3103558","volume":"8","author":"R Yang","year":"2021","unstructured":"Yang, R., Chang, X., Mi\u0161i\u0107, J., Mi\u0161i\u0107, V.B., Kang, H.: On selfholding attack impact on imperfect pow blockchain networks. IEEE Trans. Netw. Sci. Eng. 8(4), 3073 (2021)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"5483_CR11","doi-asserted-by":"crossref","unstructured":"Bada, A.O., Damianou, A., Angelopoulos,C.M., Katos,V.: In: 2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), IEEE. pp. 503\u2013511 (2021)","DOI":"10.1109\/DCOSS52077.2021.00083"},{"key":"5483_CR12","doi-asserted-by":"crossref","unstructured":"Sattaiah, K., Chinnaiah, K.: In: 2024 3rd International Conference for Innovation in Technology (INOCON)IEEE. pp. 1\u20136 (2024)","DOI":"10.1109\/INOCON60754.2024.10511929"},{"issue":"2014","key":"5483_CR13","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"key":"5483_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5195\/ledger.2017.48","volume":"2","author":"A Biryukov","year":"2017","unstructured":"Biryukov, A., Khovratovich, D.: Equihash: asymmetric proof-of-work based on the generalized birthday problem. Ledger 2, 1 (2017)","journal-title":"Ledger"},{"key":"5483_CR15","doi-asserted-by":"crossref","unstructured":"Atiwa, S., Dawji, Y., Refaey, A.,\u00a0Magierowski, S: In: 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), IEEE. pp. 1\u20136 (2020)","DOI":"10.1109\/CCECE47787.2020.9255709"},{"key":"5483_CR16","unstructured":"Daemen, J., Mella, S., Van\u00a0Assche,G.: Committing authenticated encryption based on shake, Cryptology ePrint Archive (2023)"},{"issue":"9","key":"5483_CR17","doi-asserted-by":"publisher","first-page":"475","DOI":"10.3390\/info14090475","volume":"14","author":"A Sideris","year":"2023","unstructured":"Sideris, A., Sanida, T., Dasygenis, M.: A novel hardware architecture for enhancing the KECCAK hash function in FPGA devices. Information 14(9), 475 (2023)","journal-title":"Information"},{"key":"5483_CR18","doi-asserted-by":"crossref","unstructured":"Lamriji, Y., Kasri,M., El\u00a0Makkaoui, K., Beni-Hssane,A.: In: 2023 3rd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), IEEE. pp. 1\u20138 (2023)","DOI":"10.1109\/IRASET57153.2023.10153031"},{"key":"5483_CR19","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies, 2nd edn. O\u2019Reilly Media (2017)"},{"issue":"4","key":"5483_CR20","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSP.2018.3111253","volume":"16","author":"I Giechaskiel","year":"2018","unstructured":"Giechaskiel, I., Cremers, C., Rasmussen, K.B.: When the crypto in cryptocurrencies breaks: Bitcoin security under broken primitives. IEEE Secur. Priv. 16(4), 46 (2018). https:\/\/doi.org\/10.1109\/MSP.2018.3111253","journal-title":"IEEE Secur. Priv."},{"key":"5483_CR21","doi-asserted-by":"publisher","unstructured":"A.H. Lone, R.\u00a0Naaz, In: 2020 IEEE International Conference for Innovation in Technology (INOCON), pp. 1\u20136 (2020) https:\/\/doi.org\/10.1109\/INOCON50539.2020.9298215","DOI":"10.1109\/INOCON50539.2020.9298215"},{"issue":"2","key":"5483_CR22","doi-asserted-by":"publisher","first-page":"2708","DOI":"10.1109\/JSYST.2020.3004468","volume":"15","author":"T Wang","year":"2021","unstructured":"Wang, T., Bai, X., Wang, H., Liew, S.C., Zhang, S.: Game-theoretical analysis of mining strategy for Bitcoin-NG blockchain protocol. IEEE Syst. J. 15(2), 2708 (2021). https:\/\/doi.org\/10.1109\/JSYST.2020.3004468","journal-title":"IEEE Syst. J."},{"issue":"2","key":"5483_CR23","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/LCA.2023.3289515","volume":"22","author":"K Jeon","year":"2023","unstructured":"Jeon, K., Lee, J., Kim, B., Kim, J.J.: Hardware accelerated reusable Merkle tree generation for bitcoin blockchain headers. IEEE Comput. Archit. Lett. 22(2), 69 (2023). https:\/\/doi.org\/10.1109\/LCA.2023.3289515","journal-title":"IEEE Comput. Archit. Lett."},{"key":"5483_CR24","doi-asserted-by":"publisher","unstructured":"Chan, W.K., Chin, J.J., Goh,V.T.: In: 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 1\u20136. (2020) https:\/\/doi.org\/10.23919\/ICITST51030.2020.9351346","DOI":"10.23919\/ICITST51030.2020.9351346"},{"issue":"2","key":"5483_CR25","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s11416-022-00447-w","volume":"19","author":"A Sadeghi-Nasab","year":"2023","unstructured":"Sadeghi-Nasab, A., Rafe, V.: A comprehensive review of the security flaws of hashing algorithms. J. Comput. Virol. Hack. Tech. 19(2), 287 (2023)","journal-title":"J. Comput. Virol. Hack. Tech."},{"issue":"2","key":"5483_CR26","first-page":"99","volume":"10","author":"M Badawy","year":"2023","unstructured":"Badawy, M.: Security evaluation of different hashing functions with RSA for digital signature. IJCI Int. J. Comput. Inform. 10(2), 99 (2023)","journal-title":"IJCI Int. J. Comput. Inform."},{"key":"5483_CR27","doi-asserted-by":"publisher","unstructured":"M.\u00a0Apriani, R.F. Sari.: In: 2021 7th International Conference on Electrical, Electronics and Information Engineering (ICEEIE), pp. 564\u2013569. (2021) https:\/\/doi.org\/10.1109\/ICEEIE52663.2021.9616831","DOI":"10.1109\/ICEEIE52663.2021.9616831"},{"key":"5483_CR28","doi-asserted-by":"publisher","unstructured":"M.\u00a0Coluzzi, A.\u00a0Brocco, P.\u00a0Contu, T.\u00a0Leidi.: In: 2023 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp. 346\u2013348. (2023) https:\/\/doi.org\/10.1109\/ISPASS57527.2023.00048","DOI":"10.1109\/ISPASS57527.2023.00048"},{"key":"5483_CR29","doi-asserted-by":"crossref","unstructured":"H.\u00a0El\u00a0Makhtoum, Y.\u00a0Bentaleb.: In: Networking, Intelligent Systems and Security: Proceedings of NISS 2021, pp. 343\u2013350. Springer (2022)","DOI":"10.1007\/978-981-16-3637-0_24"},{"issue":"(8)","key":"5483_CR30","doi-asserted-by":"publisher","first-page":"125","DOI":"10.3390\/fi12080125","volume":"12","author":"S Shahriar\u00a0Hazari","year":"2020","unstructured":"Shahriar\u00a0Hazari, S., Mahmoud, Q..H.: Improving transaction speed and scalability of blockchain systems via parallel proof of work. Future Internet 12((8)), 125 (2020)","journal-title":"Future Internet"},{"key":"5483_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.122406","volume":"190","author":"AF Yaz\u0131c\u0131","year":"2023","unstructured":"Yaz\u0131c\u0131, A.F., Olcay, A.B., Olcay, G.A.: A framework for maintaining sustainable energy use in bitcoin mining through switching efficient mining hardware. Technol. Forecast. Soc. Chang. 190, 122406 (2023)","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"5483_CR32","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.future.2023.04.016","volume":"147","author":"I Malakhov","year":"2023","unstructured":"Malakhov, I., Marin, A., Rossi, S.: Analysis of the confirmation time in proof-of-work blockchains. Futur. Gener. Comput. Syst. 147, 275 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"3","key":"5483_CR33","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.35940\/ijeat.C5305.029320","volume":"9","author":"H Kohad","year":"2020","unstructured":"Kohad, H., Kumar, S., Ambhaikar, A.: Scalability issues of blockchain technology. Int. J. Eng. Adv. Technol 9(3), 2385 (2020)","journal-title":"Int. J. Eng. Adv. Technol"},{"key":"5483_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103232","volume":"195","author":"AI Sanka","year":"2021","unstructured":"Sanka, A.I., Cheung, R.C.: A systematic review of blockchain scalability: issues, solutions, analysis and future research. J. Netw. Comput. Appl. 195, 103232 (2021)","journal-title":"J. Netw. Comput. Appl."},{"key":"5483_CR35","unstructured":"National Institute of Standards and Technology, Nist transitioning away from sha-1 for all applications. Tech. rep., U.S. Department of Commerce (2022). https:\/\/csrc.nist.gov\/news\/2022\/nist-transitioning-away-from-sha-1-for-all-apps"},{"key":"5483_CR36","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology, Secure hash standard (SHS). Tech. Rep. FIPS 180-4, U.S. Department of Commerce (2015) https:\/\/doi.org\/10.6028\/NIST.FIPS.180-4. https:\/\/doi.org\/10.6028\/NIST.FIPS.180-4","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"5483_CR37","unstructured":"J.P. Aumasson, S. Neves, Z. Wilcox-O\u2019Hearn, C. Winnerlein.: In: M. Jacobson, M. Locasto, P. Mohassel, R. Safavi-Naini (eds.) Applied Cryptography and Network Security, pp. 119\u2013135. Springer, Berlin (2013)"},{"key":"5483_CR38","unstructured":"J.\u00a0O\u2019Connor, J.P. Aumasson, S.\u00a0Neves, Z.\u00a0Wilcox-O\u2019Hearn.: BLAKE3: One Function, Fast Everywhere (2020) https:\/\/github.com\/BLAKE3-team\/BLAKE3-specs\/blob\/master\/blake3.pdf"},{"issue":"4","key":"5483_CR39","doi-asserted-by":"publisher","first-page":"1404","DOI":"10.1109\/TEM.2019.2932202","volume":"67","author":"F Wang","year":"2020","unstructured":"Wang, F., Chen, Y., Wang, R., Francis, A.O., Emmanuel, B., Zheng, W., Chen, J.: An experimental investigation into the hash functions used in blockchains. IEEE Trans. Eng. Manage. 67(4), 1404 (2020). https:\/\/doi.org\/10.1109\/TEM.2019.2932202","journal-title":"IEEE Trans. Eng. Manage."},{"key":"5483_CR40","doi-asserted-by":"publisher","first-page":"113385","DOI":"10.1016\/j.eswa.2020.113385","volume":"154","author":"SMH Bamakan","year":"2020","unstructured":"Bamakan, S.M.H., Motavali, A., Bondarti, A.B.: A survey of blockchain consensus algorithms performance evaluation criteria. Exp. Syst. Appl. 154, 113385 (2020)","journal-title":"Exp. Syst. Appl."},{"key":"5483_CR41","doi-asserted-by":"publisher","unstructured":"El\u00a0Sayed,A.I., Megahed, M.H. , Abdel\u00a0Azeem,M.H.: In: 2019 International Conference on Smart Applications, Communications and Networking (SmartNets), pp. 1\u20138 (2019) https:\/\/doi.org\/10.1109\/SmartNets48225.2019.9069757","DOI":"10.1109\/SmartNets48225.2019.9069757"},{"key":"5483_CR42","doi-asserted-by":"publisher","unstructured":"Bhonge,H.N. , Ambat, M.K., Chandavarkar,B.R.: In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20136. (2020) https:\/\/doi.org\/10.1109\/ICCCNT49239.2020.9225559","DOI":"10.1109\/ICCCNT49239.2020.9225559"},{"key":"5483_CR43","doi-asserted-by":"publisher","first-page":"112472","DOI":"10.1109\/ACCESS.2022.3215778","volume":"10","author":"D Upadhyay","year":"2022","unstructured":"Upadhyay, D., Gaikwad, N., Zaman, M., Sampalli, S.: Investigating the avalanche effect of various cryptographically secure hash functions and hash-based applications. IEEE Access 10, 112472 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3215778","journal-title":"IEEE Access"},{"key":"5483_CR44","doi-asserted-by":"crossref","unstructured":"Nishanthi,R., Khurana, S., Kumar, S.M., Deshpande, L.A., Thangarasu, N., Khanna,L.: In: 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE, pp. 1\u20136. (2024)","DOI":"10.1109\/ICCCNT61001.2024.10725217"},{"key":"5483_CR45","unstructured":"National Institute of Standards and Technology, Nist policy on hash functions. Tech. rep., U.S. Department of Commerce (2015). https:\/\/csrc.nist.gov\/projects\/hash-functions\/nist-policy-on-hash-functions"},{"key":"5483_CR46","doi-asserted-by":"publisher","first-page":"100254","DOI":"10.1016\/j.iot.2020.100254.","volume":"11","author":"R Martino","year":"2020","unstructured":"Martino, R., Cilardo, A.: Designing a SHA-256 processor for blockchain-based IoT applications. Internet of Things 11, 100254 (2020). https:\/\/doi.org\/10.1016\/j.iot.2020.100254. (https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660520300895)","journal-title":"Internet of Things"},{"key":"5483_CR47","doi-asserted-by":"publisher","unstructured":"Levina,A., Plotnikov, A., Ashmarov, E.: In: 2023 12th Mediterranean Conference on Embedded Computing (MECO), pp. 1\u20135. (2023)https:\/\/doi.org\/10.1109\/MECO58584.2023.10154990","DOI":"10.1109\/MECO58584.2023.10154990"},{"key":"5483_CR48","unstructured":"Bertoni, G., Daemen, J., Peeters,M., Van\u00a0Assche, G.: The sponge functions corner (2011). http:\/\/sponge.noekeon.org\/"},{"issue":"2","key":"5483_CR49","doi-asserted-by":"publisher","first-page":"370","DOI":"10.15803\/ijnc.9.2_370","volume":"9","author":"TN Dat","year":"2019","unstructured":"Dat, T.N., Iwai, K., Matsubara, T., Kurokawa, T.: Implementation of high speed hash function KECCAK on GPU. Int. J. Netw. Comput. 9(2), 370 (2019). https:\/\/doi.org\/10.15803\/ijnc.9.2_370","journal-title":"Int. J. Netw. Comput."},{"key":"5483_CR50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44757-4","author":"JP Aumasson","year":"2014","unstructured":"Aumasson, J.P., Meier, W., Phan, R., Henzen, L.: The Hash Function BLAKE (2014). https:\/\/doi.org\/10.1007\/978-3-662-44757-4","journal-title":"The Hash Function BLAKE"},{"key":"5483_CR51","first-page":"1","volume":"99","author":"ZA Jasim","year":"2025","unstructured":"Jasim, Z.A., Hadi, A.K.: Optimizing blockchain network performance using blake3 hash function in pos consensus algorithm. IEEE Access 99, 1 (2025)","journal-title":"IEEE Access"},{"key":"5483_CR52","doi-asserted-by":"publisher","unstructured":"Windarta,S., Ramli,K., Sudiana, D.: In: 2020 1st International Conference on Information Technology, Advanced Mechanical and Electrical Engineering (ICITAMEE), pp. 265\u2013269. (2020) https:\/\/doi.org\/10.1109\/ICITAMEE50454.2020.9398503","DOI":"10.1109\/ICITAMEE50454.2020.9398503"},{"issue":"2","key":"5483_CR53","first-page":"100067","volume":"3","author":"H Guo","year":"2022","unstructured":"Guo, H., Yu, X.: A survey on blockchain technology and its security. Blockchain: Res. Appl. 3(2), 100067 (2022)","journal-title":"Blockchain: Res. Appl."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05483-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05483-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05483-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:32:42Z","timestamp":1759944762000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05483-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"references-count":53,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["5483"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05483-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"18 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors of this manuscript declare that they have no conflicts of interest that could potentially influence the research or its findings. No financial support or funding from any organization or entity was received for this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"724"}}