{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:07:23Z","timestamp":1765357643904,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Youth Foundation of South China Normal University","award":["23KJ28"],"award-info":[{"award-number":["23KJ28"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172410"],"award-info":[{"award-number":["62172410"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key R &D Program of China","doi-asserted-by":"crossref","award":["2018YFA0704704"],"award-info":[{"award-number":["2018YFA0704704"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R &D Program of Chin","award":["2022YFB2701900"],"award-info":[{"award-number":["2022YFB2701900"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s10623-024-01458-y","type":"journal-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T06:26:13Z","timestamp":1721888773000},"page":"3813-3842","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Utilizing FWT in linear cryptanalysis of block ciphers with various structures"],"prefix":"10.1007","volume":"92","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8021-6183","authenticated-orcid":false,"given":"Yin","family":"Lv","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2809-8647","authenticated-orcid":false,"given":"Danping","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,25]]},"reference":[{"key":"1458_CR1","unstructured":"Ahmadian Z., Rasoolzadeh S., Salmasizadeh M., Aref M.R.: Automated dynamic cube attack on block ciphers: cryptanalysis of SIMON and KATAN. In: IACR Cryptology ePrint Archive (2015). http:\/\/eprint.iacr.org\/2015\/040."},{"key":"1458_CR2","doi-asserted-by":"publisher","unstructured":"Alzakari S.A., Vora P.L.: Linear and partly-pseudo-linear cryptanalysis of reduced-round SPARX cipher. In: Batina, L., Li, G. (eds.) Applications and Techniques in Information Security\u201411th International Conference, ATIS 2020, 12\u201313 November 2020, Proceedings. Communications in Computer and Information Science, vol 1338, pp. 108\u2013121. Springer, Brisbane (2020). https:\/\/doi.org\/10.1007\/978-981-33-4706-9_8.","DOI":"10.1007\/978-981-33-4706-9_8"},{"key":"1458_CR3","doi-asserted-by":"publisher","unstructured":"Bard G.V., Courtois Jr N.T., Nakahara J., Sepehrdad P., Zhang B.: Algebraic, AIDA\/cube and side channel analysis of KATAN family of block ciphers. In: Gong, G., Gupta, K.C. (eds) Progress in Cryptology\u2014INDOCRYPT 2010\u201411th International Conference on Cryptology in India, 12\u201315 December 2010. Proceedings. Lecture Notes in Computer Science, vol 6498, pp. 176\u2013196. Springer, Hyderabad (2010). https:\/\/doi.org\/10.1007\/978-3-642-17401-8_14.","DOI":"10.1007\/978-3-642-17401-8_14"},{"key":"1458_CR4","unstructured":"Biryukov A., Teh J.S., Udovenko A.: Advancing the meet-in-the-filter technique: applications to CHAM and KATAN. In: IACR Cryptology ePrint Archive (2023). https:\/\/eprint.iacr.org\/2023\/851."},{"key":"1458_CR5","doi-asserted-by":"publisher","unstructured":"Biryukov A., Canni\u00e8re C.D., Quisquater M.: On multiple linear approximations. In: Franklin, M.K. (ed) Advances in Cryptology\u2014CRYPTO 2004, 24th Annual International Cryptology Conference, 15\u201319 August 2004, Proceedings. Lecture Notes in Computer Science, vol 3152, pp. 1\u201322. Springer, Santa Barbara (2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_1.","DOI":"10.1007\/978-3-540-28628-8_1"},{"issue":"2","key":"1458_CR6","doi-asserted-by":"publisher","first-page":"162","DOI":"10.13154\/TOSC.V2016.I2.162-191","volume":"2016","author":"C Blondeau","year":"2016","unstructured":"Blondeau C., Nyberg K.: Improved parameter estimates for correlation and capacity deviates in linear cryptanalysis. IACR Trans. Symmetric Cryptol. 2016(2), 162\u2013191 (2016). https:\/\/doi.org\/10.13154\/TOSC.V2016.I2.162-191.","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"3","key":"1458_CR7","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10623-012-9697-z","volume":"70","author":"A Bogdanov","year":"2014","unstructured":"Bogdanov A., Rijmen V.: Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptogr. 70(3), 369\u2013383 (2014). https:\/\/doi.org\/10.1007\/s10623-012-9697-z.","journal-title":"Des. Codes Cryptogr."},{"key":"1458_CR8","doi-asserted-by":"publisher","unstructured":"Bogdanov A., Wang M.: Zero correlation linear cryptanalysis with reduced data complexity. In: Canteaut, A. (ed.) Fast Software Encryption\u201419th International Workshop, FSE 2012, 19\u201321 March 2012. Revised Selected Papers. Lecture Notes in Computer Science, vol 7549, pp. 29\u201348. Springer, Washington, DC (2012). https:\/\/doi.org\/10.1007\/978-3-642-34047-5_3.","DOI":"10.1007\/978-3-642-34047-5_3"},{"key":"1458_CR9","doi-asserted-by":"publisher","unstructured":"Bogdanov A., Leander G., Nyberg K., Wang M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang, X., Sako, K. (eds) Advances in Cryptology\u2014ASIACRYPT 2012\u201418th International Conference on the Theory and Application of Cryptology and Information Security, 2\u20136 December 2012. Proceedings. Lecture Notes in Computer Science, vol 7658, pp. 244\u2013261. Springer, Beijing (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_16.","DOI":"10.1007\/978-3-642-34961-4_16"},{"key":"1458_CR10","doi-asserted-by":"publisher","unstructured":"Canni\u00e8re C.D., Dunkelman O., Knezevic M.: KATAN and KTANTAN\u2014a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds) Cryptographic Hardware and Embedded Systems\u2014CHES 2009, 11th International Workshop, 6\u20139 September 2009, Proceedings. Lecture Notes in Computer Science, vol 5747, pp. 272\u2013288. Springer, Lausanne (2009). https:\/\/doi.org\/10.1007\/978-3-642-04138-9_20.","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"1458_CR11","doi-asserted-by":"publisher","unstructured":"Chen J., Teh J., Su C., Samsudin A., Fang J.: Improved (related-key) attacks on round-reduced KATAN-32\/48\/64 based on the extended boomerang framework. In: Liu, J.K., Steinfeld, R. (eds.) Information Security and Privacy\u201421st Australasian Conference, ACISP 2016, 4\u20136 July 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol 9723, pp. 333\u2013346. Springer, Melbourne (2016). https:\/\/doi.org\/10.1007\/978-3-319-40367-0_21.","DOI":"10.1007\/978-3-319-40367-0_21"},{"key":"1458_CR12","doi-asserted-by":"publisher","unstructured":"Collard B., Standaert F., Quisquater J.: Improving the time complexity of Matsui\u2019s linear cryptanalysis. In: Nam, K., Rhee, G. (eds.) Information Security and Cryptology\u2014ICISC 2007, 10th International Conference, 29\u201330 November 2007, Proceedings. Lecture Notes in Computer Science, vol 4817, pp. 77\u201388. Springer, Seoul (2007). https:\/\/doi.org\/10.1007\/978-3-540-76788-6_7.","DOI":"10.1007\/978-3-540-76788-6_7"},{"key":"1458_CR13","doi-asserted-by":"publisher","unstructured":"Daemen J., Govaerts R., Vandewalle J.: Correlation matrices. In: Preneel, B. (ed.) Fast Software Encryption: Second International Workshop, 14\u201316 December 1994, Proceedings. Lecture Notes in Computer Science, vol 1008, pp. 275\u2013285. Springer, Leuven (1994). https:\/\/doi.org\/10.1007\/3-540-60590-8_21.","DOI":"10.1007\/3-540-60590-8_21"},{"key":"1458_CR14","doi-asserted-by":"publisher","unstructured":"Dinu D., Perrin L., Udovenko A., Velichkov V., Gro\u00dfsch\u00e4dl J., Biryukov A.: Design strategies for ARX with provable bounds: SPARX and LAX. In: Cheon, J.H., Takagi, T. (eds.) Advances in Cryptology\u2014ASIACRYPT 2016\u201422nd International Conference on the Theory and Application of Cryptology and Information Security, 4\u20138 December 2016, Proceedings, Part I. Lecture Notes in Computer Science, vol 10031, pp. 484\u2013513. Hanoi, Vietnam (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_18.","DOI":"10.1007\/978-3-662-53887-6_18"},{"key":"1458_CR15","doi-asserted-by":"publisher","unstructured":"Fl\u00f3rez-Guti\u00e9rrez A., Naya-Plasencia M.: Improving key-recovery in linear attacks: application to 28-round PRESENT. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology\u2014EUROCRYPT 2020\u201439th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 10\u201314 May 2020, Proceedings, Part I. Lecture Notes in Computer Science, vol 12105, pp. 221\u2013249. Springer, Zagreb (2020). https:\/\/doi.org\/10.1007\/978-3-030-45721-1_9.","DOI":"10.1007\/978-3-030-45721-1_9"},{"key":"1458_CR16","doi-asserted-by":"publisher","unstructured":"Fl\u00f3rez-Guti\u00e9rrez A.: Optimising linear key recovery attacks with affine Walsh Transform pruning. In: Agrawal, S., Lin, D. (eds.) Advances in Cryptology\u2014ASIACRYPT 2022\u201428th International Conference on the Theory and Application of Cryptology and Information Security, 5\u20139 December 2022, Proceedings, Part IV. Lecture Notes in Computer Science, vol 13794, pp. 447\u2013476. Springer, Taipei (2022). https:\/\/doi.org\/10.1007\/978-3-031-22972-5_16.","DOI":"10.1007\/978-3-031-22972-5_16"},{"key":"1458_CR17","doi-asserted-by":"publisher","unstructured":"Gentleman W.M., Sande G.: Fast Fourier Transforms: for fun and profit. In: American Federation of Information Processing Societies: Proceedings of the AFIPS \u201966 Fall Joint Computer Conference, 7\u201310 November 1966. AFIPS Conference Proceedings, vol 29, pp. 563\u2013578. AFIPS\/ACM\/Spartan Books, Washington, DC (1966). https:\/\/doi.org\/10.1145\/1464291.1464352.","DOI":"10.1145\/1464291.1464352"},{"key":"1458_CR18","doi-asserted-by":"publisher","DOI":"10.1561\/0100000006","author":"RM Gray","year":"2005","unstructured":"Gray R.M.: Toeplitz and circulant matrices: a review. Found. Trends Commun. Inf. Theory (2005). https:\/\/doi.org\/10.1561\/0100000006.","journal-title":"Found. Trends Commun. Inf. Theory"},{"key":"1458_CR19","doi-asserted-by":"publisher","unstructured":"Hermelin M., Cho J.Y., Nyberg K.: Multidimensional linear cryptanalysis of reduced round Serpent. In: Mu, Y., Susilo, W., Seberry, J. (eds) Information Security and Privacy, 13th Australasian Conference, ACISP 2008, 7\u20139 July 2008, Proceedings. Lecture Notes in Computer Science, vol 5107, pp. 203\u2013215. Springer, Wollongong (2008). https:\/\/doi.org\/10.1007\/978-3-540-70500-0_15.","DOI":"10.1007\/978-3-540-70500-0_15"},{"key":"1458_CR20","doi-asserted-by":"publisher","unstructured":"Hermelin M., Cho J.Y., Nyberg K.: Multidimensional extension of Matsui\u2019s algorithm 2. In: Dunkelman, O. (ed) Fast Software Encryption, 16th International Workshop, FSE 2009, 22\u201325 February 2009, Revised Selected Papers. Lecture Notes in Computer Science, vol 5665, pp. 209\u2013227. Springer, Leuven (2009). https:\/\/doi.org\/10.1007\/978-3-642-03317-9_13.","DOI":"10.1007\/978-3-642-03317-9_13"},{"key":"1458_CR21","doi-asserted-by":"publisher","unstructured":"Leurent G., Pernot C., Schrottenloher A.: Clustering effect in SIMON and SIMECK. In: Tibouchi, M., Wang, H. (eds) Advances in Cryptology\u2014ASIACRYPT 2021\u201427th International Conference on the Theory and Application of Cryptology and Information Security, 6\u201310 December 2021, Proceedings, Part I. Lecture Notes in Computer Science, vol 13090, pp. 272\u2013302. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-3-030-92062-3_10.","DOI":"10.1007\/978-3-030-92062-3_10"},{"key":"1458_CR22","doi-asserted-by":"publisher","unstructured":"Matsui M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed) Advances in Cryptology\u2014EUROCRYPT \u201993, Workshop on the Theory and Application of Cryptographic Techniques, 23\u201327 May 1993, Proceedings. Lecture Notes in Computer Science, vol 765, pp. 386\u2013397. Springer, Lofthus (1993). https:\/\/doi.org\/10.1007\/3-540-48285-7_33.","DOI":"10.1007\/3-540-48285-7_33"},{"key":"1458_CR23","doi-asserted-by":"publisher","unstructured":"Matsui M.: The first experimental cryptanalysis of the data encryption standard. In: Desmedt, Y. (ed.) Advances in Cryptology\u2014CRYPTO \u201994, 14th Annual International Cryptology Conference, 21\u201325 August 1994, Proceedings. Lecture Notes in Computer Science, vol 839, pp. 1\u201311. Springer, Santa Barbara (1994). https:\/\/doi.org\/10.1007\/3-540-48658-5_1.","DOI":"10.1007\/3-540-48658-5_1"},{"key":"1458_CR24","unstructured":"National Institute of Standards and Technology: Data encryption standard. In: Federal Information Processing Standards Publication, FIPS 46 US. Department of Commerce (1977). url:https:\/\/www.bighole.nl\/\/pub\/mirror\/www.bitsavers.org\/pdf\/nbs\/fips\/FIPS_46-1_Data_Encryption_Standard_Jan88.pdf."},{"key":"1458_CR25","doi-asserted-by":"publisher","unstructured":"Nguyen P.H., Wu H., Wang H.: Improving the algorithm 2 in multidimensional linear cryptanalysis. In: Parampalli, U., Hawkes, P. (eds.) Information Security and Privacy\u201416th Australasian Conference, ACISP 2011, 11\u201313 July 2011. Proceedings. Lecture Notes in Computer Science, vol 6812, pp. 61\u201374. Springer, Melbourne (2011). https:\/\/doi.org\/10.1007\/978-3-642-22497-3_5.","DOI":"10.1007\/978-3-642-22497-3_5"},{"key":"1458_CR26","doi-asserted-by":"publisher","unstructured":"Nyberg K.: Linear approximation of block ciphers. In: Santis, A.D. (ed) Advances in Cryptology\u2014EUROCRYPT \u201994, Workshop on the Theory and Application of Cryptographic Techniques, 9\u201312 May 1994, Proceedings. Lecture Notes in Computer Science, vol 950, pp. 439\u2013444. Springer, Perugia (1994). https:\/\/doi.org\/10.1007\/BFb0053460.","DOI":"10.1007\/BFb0053460"},{"key":"1458_CR27","doi-asserted-by":"crossref","unstructured":"Rasoolzadeh S., Raddum H.: Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN. In: IACR Cryptology ePrint Archive (2016). http:\/\/eprint.iacr.org\/2016\/077.","DOI":"10.1515\/tmmp-2016-0037"},{"issue":"1\u20133","key":"1458_CR28","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s10623-012-9679-1","volume":"66","author":"A R\u00f6ck","year":"2013","unstructured":"R\u00f6ck A., Nyberg K.: Generalization of Matsui\u2019s algorithm 1 to linear hull for key-alternating block ciphers. Des. Codes Cryptogr. 66(1\u20133), 175\u2013193 (2013). https:\/\/doi.org\/10.1007\/s10623-012-9679-1.","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"1458_CR29","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00145-007-9013-7","volume":"21","author":"AA Sel\u00e7uk","year":"2008","unstructured":"Sel\u00e7uk A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptol. 21(1), 131\u2013147 (2008). https:\/\/doi.org\/10.1007\/s00145-007-9013-7.","journal-title":"J. Cryptol."},{"key":"1458_CR30","doi-asserted-by":"publisher","unstructured":"Shi D., Hu L., Sun S., Song L.: Linear (hull) cryptanalysis of round-reduced versions of KATAN. In: Camp, O., Furnell, S., Mori, P. (eds) Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, 19\u201321 February 2016, pp. 364\u2013371. SciTePress, Rome (2016). https:\/\/doi.org\/10.5220\/0005739103640371.","DOI":"10.5220\/0005739103640371"},{"key":"1458_CR31","doi-asserted-by":"publisher","unstructured":"Sun S., Hu L., Wang P., Qiao K., Ma X., Song L.: Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers. In: Sarkar, P., Iwata, T. (eds.) Advances in Cryptology\u2014ASIACRYPT 2014\u201420th International Conference on the Theory and Application of Cryptology and Information Security, 7\u201311 December 2014. Proceedings, Part I. Lecture Notes in Computer Science, vol 8873, pp. 158\u2013178. Springer, Kaoshiung (2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_9.","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"1458_CR32","doi-asserted-by":"publisher","unstructured":"Tolba M., Abdelkhalek A., Youssef A.M.: Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-128. In: Adams, C., Camenisch, J. (eds) Selected Areas in Cryptography\u2014SAC 2017\u201424th International Conference, 16\u201318 August 2017, Revised Selected Papers. Lecture Notes in Computer Science, vol 10719, pp. 423\u2013441. Springer, Ottawa (2017). https:\/\/doi.org\/10.1007\/978-3-319-72565-9_22.","DOI":"10.1007\/978-3-319-72565-9_22"},{"key":"1458_CR33","doi-asserted-by":"publisher","unstructured":"Wang Y., Wu W.: Improved multidimensional zero-correlation linear cryptanalysis and applications to LBlock and TWINE. In: Susilo, W., Mu, Y. (eds) Information Security and Privacy\u201419th Australasian Conference, ACISP 2014, 7\u20139 July 2014. Proceedings. Lecture Notes in Computer Science, vol 8544, pp. 1\u201316. Springer, Wollongong (2014). https:\/\/doi.org\/10.1007\/978-3-319-08344-5_1.","DOI":"10.1007\/978-3-319-08344-5_1"},{"issue":"6","key":"1458_CR34","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.ipl.2014.01.007","volume":"114","author":"L Wen","year":"2014","unstructured":"Wen L., Wang M., Bogdanov A., Chen H.: Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard. Inf. Process. Lett. 114(6), 322\u2013330 (2014). https:\/\/doi.org\/10.1016\/j.ipl.2014.01.007.","journal-title":"Inf. Process. Lett."},{"key":"1458_CR35","doi-asserted-by":"publisher","unstructured":"Zhang Y., Lyu L., Qiao K., Zhang Z., Sun S., Hu L.: Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK. In: 2021 IEEE Sustainable Power and Energy Conference (iSPEC), 23\u201325 December 2021, pp. 147\u2013167. IEEE, Nanjing (2021). https:\/\/doi.org\/10.1007\/978-3-030-93206-0_10.","DOI":"10.1007\/978-3-030-93206-0_10"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01458-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-024-01458-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01458-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T18:04:25Z","timestamp":1727633065000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-024-01458-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,25]]},"references-count":35,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["1458"],"URL":"https:\/\/doi.org\/10.1007\/s10623-024-01458-y","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2024,7,25]]},"assertion":[{"value":"12 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}