{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T05:16:00Z","timestamp":1769577360046,"version":"3.49.0"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T00:00:00Z","timestamp":1529452800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11128-018-1954-2","type":"journal-article","created":{"date-parts":[[2018,6,20]],"date-time":"2018-06-20T06:47:25Z","timestamp":1529477245000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Simple hash function using discrete-time quantum walks"],"prefix":"10.1007","volume":"17","author":[{"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jing-Lin","family":"Bi","sequence":"additional","affiliation":[]},{"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,20]]},"reference":[{"key":"1954_CR1","unstructured":"RSA Laboratories: PKCS #1 v2.1: RSA Cryptography Standard, RSA Data Security, Inc. (2002). ftp:\/\/ftp.rsasecurity.com\/pub\/pkcs\/pkcs-1\/pkcs-1v2-1.pdf"},{"issue":"11","key":"1954_CR2","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password security-a case history. Commun. ACM 22(11), 594\u2013597 (1979)","journal-title":"Commun. ACM"},{"key":"1954_CR3","unstructured":"Hawkes, P., Paddon, M., Rose, G.: The Mundja streaming MAC. Presented at the ECRYPT Network of Excellence in Cryptology workshop on the State of the Art of Stream Ciphers, October 2004, Brugge, Belgium (2004). http:\/\/eprint.iacr.org\/2004\/271.pdf . Accessed 19 June 2018"},{"key":"1954_CR4","unstructured":"Chum, C., Jun, C., Zhang, X.: Implementation of randomize then-combine constructed hash function. In: Proceedings of 23rd Wireless Optical Communication Conference, IEEE Communication Society. Newark, New Jersey, May 9\u201310 (2014)"},{"key":"1954_CR5","doi-asserted-by":"crossref","unstructured":"Haitner, I., Holenstein, T., Reingold, O., Vadhan, S., Wee, H.: Universal one-way hash functions via inaccessible entropy. In: Gilbert H. (eds.) Advances in Cryptology\u2014EUROCRYPT 2010. EUROCRYPT 2010. Lecture Notes in Computer Science, vol 6110, pp. 616\u2013637. Springer, Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-13190-5_31"},{"issue":"5","key":"1954_CR6","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1002\/sec.576","volume":"6","author":"C Chum","year":"2013","unstructured":"Chum, C., Zhang, X.: Hash function based secret sharing scheme designs. Secur. Commun. Netw. 6(5), 584\u2013592 (2013)","journal-title":"Secur. Commun. Netw."},{"key":"1954_CR7","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I.: A design principle for hash functions. In: Advances in Cryptology-Crypto\u201989, LNCS 435, pp. 416\u2013427 (1989)","DOI":"10.1007\/0-387-34805-0_39"},{"issue":"6","key":"1954_CR8","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1049\/ip-e.1991.0056","volume":"138","author":"JK Gibson","year":"1991","unstructured":"Gibson, J.K.: Discrete logarithm hash function that is collision free and one way. IEEE Proc. Comput. Digit. Tech. 138(6), 407\u2013410 (1991)","journal-title":"IEEE Proc. Comput. Digit. Tech."},{"key":"1954_CR9","doi-asserted-by":"crossref","unstructured":"Merkle, R.: One way hash functions and DES. In: Advances in Cryptology-Crypto\u201989, LNCS 435, pp. 428\u2013446 (1990)","DOI":"10.1007\/0-387-34805-0_40"},{"key":"1954_CR10","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I. B.: Collision free hash functions and pubic key signature schemes. In: Advances in Cryptology-Eurocrypt\u201987, LNCS 304, pp. 203\u2013216 (1988)","DOI":"10.1007\/3-540-39118-5_19"},{"key":"1954_CR11","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD4 message digest algorithm. In: Advances in Cryptology-Crypto\u201990. Springer, Berlin (1990)","DOI":"10.17487\/rfc1186"},{"key":"1954_CR12","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 message digest algorithm. Request for Comments (RFC 1320), Internet Activities Board, Internet Privacy Task Force (1992)","DOI":"10.17487\/rfc1321"},{"key":"1954_CR13","unstructured":"Federal Information Processing Standards Publication 180, Secure Hash Standard (1993)"},{"key":"1954_CR14","unstructured":"Federal Information Processing Standards Publication 180-1, Secure Hash Standard (1995)"},{"key":"1954_CR15","unstructured":"Federal Information Processing Standards Publication 180-2, Secure Hash Standard (2004)"},{"key":"1954_CR16","unstructured":"NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition. NIST (2012)"},{"key":"1954_CR17","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Pieprzyk, J., Seberry, J.: Haval\u2014a one-way hashing algorithm with variable length of output. In: Advances in Cryptology, Aus-crypto\u201992. Springer, New York, pp. 83\u2013104 (1992)","DOI":"10.1007\/3-540-57220-1_54"},{"key":"1954_CR18","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s001459900019","volume":"10","author":"H Dobbertin","year":"1997","unstructured":"Dobbertin, H.: RIPEMD with two round compress function is not collision-free. J. Cryptol. 10, 51\u201369 (1997)","journal-title":"J. Cryptol."},{"key":"1954_CR19","doi-asserted-by":"crossref","unstructured":"den Boer, B., Bosselaers, A.: An attack on the last two rounds of MD4. In: Advances in Cryptology-Crypto\u201991, LNCS 576, pp. 194\u2013203 (1992)","DOI":"10.1007\/3-540-46766-1_14"},{"key":"1954_CR20","doi-asserted-by":"crossref","unstructured":"den Boer, B., Bosselaers, A.: Collisions for the compression function of MD5. In: Advances in Cryptology-Eurocrypt\u201993, LNCS 773, pp. 293\u2013304 (1994)","DOI":"10.1007\/3-540-48285-7_26"},{"key":"1954_CR21","doi-asserted-by":"crossref","unstructured":"Chabaud, F., Joux, A.: Differential collisions in SHA-0. In: Advances in Cryptology-Crypto\u201998, LNCS 1462, pp. 56\u201371 (1998)","DOI":"10.1007\/BFb0055720"},{"key":"1954_CR22","doi-asserted-by":"crossref","unstructured":"Dobbertin, H.: Cryptanalysis of MD4. Fast Software Encryption, LNCS 1039, pp. 53\u201369 (1996)","DOI":"10.1007\/3-540-60865-6_43"},{"key":"1954_CR23","unstructured":"Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. In: Rump Session of Crypto\u201904 E-print, 199 (2004)"},{"key":"1954_CR24","doi-asserted-by":"crossref","unstructured":"Wang, X., Lai, X., Feng, D., et al.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Proceedings of Eurocrypt\u201905, Aarhus, Denmark, pp. 1\u201318 (2005)","DOI":"10.1007\/11426639_1"},{"key":"1954_CR25","doi-asserted-by":"crossref","unstructured":"Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Proceedings of Eurocrypt\u201905, Aarhus, Denmark, pp. 19\u201335 (2005)","DOI":"10.1007\/11426639_2"},{"key":"1954_CR26","doi-asserted-by":"crossref","unstructured":"Lucks, S.: A failure-friendly design principle for hash functions. Asiacrypt 2005, LNCS 3788, pp. 474\u2013494 (2005)","DOI":"10.1007\/11593447_26"},{"key":"1954_CR27","unstructured":"Rivest, R.L.: Abelian square-free dithering for iterated hash functions. In: Presented at ECryt Hash Function Workshop. Cracow (2005)"},{"key":"1954_CR28","unstructured":"Biham E., Dunkelman O.: A framework for iterative hash functions\u2014HAIFA. Cryptology ePrint Archive: Report 2007\/278 (2007)"},{"key":"1954_CR29","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Sponge functions. ECRYPT Hash Workshop (2007)"},{"key":"1954_CR30","doi-asserted-by":"publisher","first-page":"2969","DOI":"10.1007\/s11277-016-3760-4","volume":"94","author":"Y-J Yang","year":"2017","unstructured":"Yang, Y.-J., Chen, F., Zhang, X.-M., Yu, J.-P., Zhang, P.: Research on the hash function structures and its application. Wirel. Pers. Commun. 94, 2969\u20132985 (2017)","journal-title":"Wirel. Pers. Commun."},{"key":"1954_CR31","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.eij.2012.08.003","volume":"13","author":"H Tiwari","year":"2012","unstructured":"Tiwari, H., Asawa, K.: A secure and efficient cryptographic hash function based on New-FORK-256. Egypt. Inf. J. 13, 199\u2013208 (2012)","journal-title":"Egypt. Inf. J."},{"issue":"1","key":"1954_CR32","first-page":"29","volume":"1","author":"M Abdulaziz","year":"2015","unstructured":"Abdulaziz, M., Khalil, I., Imad, F., Mohammad, A.: A new design of cryptographic hash function: gear. Int. J. Percept. Cognit. Comput. 1(1), 29\u201334 (2015)","journal-title":"Int. J. Percept. Cognit. Comput."},{"issue":"6","key":"1954_CR33","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1007\/s00521-015-2158-7","volume":"28","author":"YT Li","year":"2017","unstructured":"Li, Y.T., Li, X., Liu, X.W.: A fast and efficient hash function based on generalized chaotic mapping with variable parameters. Neural Comput. Appl. 28(6), 1405\u20131415 (2017)","journal-title":"Neural Comput. Appl."},{"issue":"10","key":"1954_CR34","doi-asserted-by":"publisher","first-page":"4484","DOI":"10.1016\/j.ijleo.2016.01.176","volume":"127","author":"YT Li","year":"2016","unstructured":"Li, Y.T.: Collision analysis and improvement of a hash function based on chaotic tent map. Optik 127(10), 4484\u20134489 (2016)","journal-title":"Optik"},{"issue":"4","key":"1954_CR35","doi-asserted-by":"crossref","first-page":"836","DOI":"10.23919\/CJE.2014.10851995","volume":"23","author":"P Zhen","year":"2014","unstructured":"Zhen, P., Zhao, G., Min, L.Q., Li, X.D.: Novel hash function based on coupled chaotic map lattice. Chin. J. Electron. 23(4), 836\u2013841 (2014)","journal-title":"Chin. J. Electron."},{"key":"1954_CR36","doi-asserted-by":"crossref","unstructured":"Aharonov, D., Ambainis, A., Kempe, J., et al.: Quantum walks on graphs. In: Proceedings of the 33rd ACM Symposium on Theory of Computing, pp. 50\u201359 (2001)","DOI":"10.1145\/380752.380758"},{"key":"1954_CR37","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1007\/s11128-012-0421-8","volume":"12","author":"D Li","year":"2013","unstructured":"Li, D., Zhang, J., Guo, F.-Z., Huang, W., Wen, Q.-Y., Chen, H.: Discrete-time interacting quantum walks and quantum hash schemes. Quantum Inf. Process. 12, 1501\u20131513 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1954_CR38","doi-asserted-by":"publisher","first-page":"2167","DOI":"10.1007\/s11128-012-0516-2","volume":"6","author":"D Li","year":"2013","unstructured":"Li, D., Zhang, J., Ma, X.W., Zhang, W.W., Wen, Q.Y.: Analysis of the two-particle controlled interacting quantum walks. Quantum Inf. Process. 6, 2167\u20132176 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1954_CR39","doi-asserted-by":"publisher","first-page":"19788","DOI":"10.1038\/srep19788","volume":"6","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Xu, P., Yang, R., Zhou, Y.H., Shi, W.M.: Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 6, 19788 (2016)","journal-title":"Sci. Rep."},{"key":"1954_CR40","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1038\/s41598-017-18566-6","volume":"8","author":"D Li","year":"2018","unstructured":"Li, D., Yang, Y.-G., Bi, J.-L., Yuan, J.-B., Xu, J.: Controlled alternate quantum walks based quantum Hash function. Sci. Rep. 8, 225 (2018)","journal-title":"Sci. Rep."},{"issue":"3","key":"1954_CR41","doi-asserted-by":"publisher","first-page":"030312","DOI":"10.1007\/s11433-017-9132-y","volume":"61","author":"Y-G Yang","year":"2018","unstructured":"Yang, Y.-G., Zhang, Y.-C., Xu, G., Chen, X.-B., Zhou, Y.-H., Shi, W.-M.: Improving the efficiency of quantum Hash function by dense coding of coin operators in discrete-time quantum walk. Sci. China-Phys. Mech. Astron. 61(3), 030312 (2018)","journal-title":"Sci. China-Phys. Mech. Astron."},{"key":"1954_CR42","doi-asserted-by":"publisher","first-page":"022307","DOI":"10.1103\/PhysRevA.85.022307","volume":"85","author":"P Xue","year":"2012","unstructured":"Xue, P., Sanders, B.C.: Two quantum walkers sharing coins. Phys. Rev. A 85, 022307 (2012)","journal-title":"Phys. Rev. A"},{"key":"1954_CR43","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.67.052307","volume":"67","author":"N Shenvi","year":"2003","unstructured":"Shenvi, N., Kempe, J., Whaley, K.B.: Quantum random-walk search algorithm. Phys. Rev. A 67, 052307 (2003)","journal-title":"Phys. Rev. A"},{"key":"1954_CR44","doi-asserted-by":"publisher","first-page":"033029","DOI":"10.1088\/1367-2630\/13\/3\/033029","volume":"13","author":"M Stefa\u0148\u00e1k","year":"2011","unstructured":"Stefa\u0148\u00e1k, M., Barnett, S.M., Koll\u00e1r, B., Kiss, T., Jex, I.: Directional correlations in quantum walks with two particles. New J. Phys. 13, 033029 (2011)","journal-title":"New J. Phys."},{"key":"1954_CR45","doi-asserted-by":"publisher","first-page":"167902","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"1954_CR46","unstructured":"Merkle R.C.: Secrecy, Authentication and Public Key Systems. Ph.D. thesis, UMI Research Press, Italy (1979)"},{"key":"1954_CR47","unstructured":"National Institute for Standards and Technology: Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA3) family (2007)"},{"key":"1954_CR48","doi-asserted-by":"crossref","unstructured":"Maurer U., Renner R., Holenstein C.: Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In: Theory of Cryptography Conference 2004. Lecture Notes in Computer Science, vol. 2951, pp. 21\u201339. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24638-1_2"},{"key":"1954_CR49","doi-asserted-by":"crossref","unstructured":"Coron J., Dodis Y., Malinaud C., Puniya P.: Merkle\u2013Damg\u00e5rd revisited: how to construct a hash function. In: Advances in Cryptology\u2014CRYPTO 2005, LNCS 3621, pp. 430\u2013448 (2005)","DOI":"10.1007\/11535218_26"},{"key":"1954_CR50","doi-asserted-by":"crossref","unstructured":"Bellare, M., Kohno, T.: Hash function balance and its impact on birthday attacks. Eurocrypt 04, LNCS 3027, pp. 401\u2013418 (2004)","DOI":"10.1007\/978-3-540-24676-3_24"},{"key":"1954_CR51","doi-asserted-by":"crossref","unstructured":"Saarinen, M.J.: A meeting-in-the-middle collision attack against the new FORK-256. Indocrypt 2007, LNCS 4859, pp. 10\u201317 (2007)","DOI":"10.1007\/978-3-540-77026-8_2"},{"issue":"4","key":"1954_CR52","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s001459900047","volume":"11","author":"H Dobbertin","year":"1998","unstructured":"Dobbertin, H.: Cryptanalysis of MD4. J. Cryptol. 11(4), 253\u2013271 (1998)","journal-title":"J. Cryptol."},{"key":"1954_CR53","doi-asserted-by":"crossref","unstructured":"Chabaud, F., Joux, A.: Differential collisions in SHA-0. Crypto\u201998, LNCS 1462, pp. 56\u201371 (1998)","DOI":"10.1007\/BFb0055720"},{"key":"1954_CR54","doi-asserted-by":"crossref","unstructured":"Sasaki, Y., Aoki, K.: Finding preimages in full MD5 faster than exhaustive search. Eurocrypt 2009, LNCS 5479, pp. 134\u2013152 (2009)","DOI":"10.1007\/978-3-642-01001-9_8"},{"issue":"3","key":"1954_CR55","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s13324-015-0116-2","volume":"6","author":"QL Zhao","year":"2016","unstructured":"Zhao, Q.L., Li, X.Y.: A bargmann system and the involutive solutions associated with a new 4-order lattice hierarchy. Anal. Math. Phys. 6(3), 237\u2013254 (2016)","journal-title":"Anal. Math. Phys."},{"issue":"2","key":"1954_CR56","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/s00233-015-9714-4","volume":"92","author":"YH Wang","year":"2016","unstructured":"Wang, Y.H.: Beyond regular semigroups. Semigroup Forum 92(2), 414\u2013448 (2016)","journal-title":"Semigroup Forum"},{"key":"1954_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, J.K., Wu, X.J., Xing, L.S., Zhang, C.: In Herbert bifurcation analysis of five-level cascaded H-bridge inverter using proportional-resonant plus time-delayed feedback. Int. J. Bifurcat. Chaos. 26, 11 (2016)","DOI":"10.1142\/S0218127416300317"},{"issue":"2","key":"1954_CR58","first-page":"479","volume":"6","author":"TQ Zhang","year":"2016","unstructured":"Zhang, T.Q., Meng, X.Z., Zhang, T.H.: Global analysis for a delayed siv model with direct and environmental transmissions. J. Appl. Anal. Comput. 6(2), 479\u2013491 (2016)","journal-title":"J. Appl. Anal. Comput."},{"issue":"3","key":"1954_CR59","first-page":"865","volume":"6","author":"XZ Meng","year":"2016","unstructured":"Meng, X.Z., Wang, L., Zhang, T.H.: Global dynamics analysis of a nonlinear impulsive stochastic chemostat system in a polluted environment. J. Appl. Anal. Comput. 6(3), 865\u2013875 (2016)","journal-title":"J. Appl. Anal. Comput."},{"key":"1954_CR60","first-page":"946","volume":"266","author":"X.Z Meng","year":"2015","unstructured":"Meng, X.Z., Zhao, S.N., Zhang, W.Y.: Adaptive dynamics analysis of a predator-prey model with selective disturbance. Appl. Math. Comput. 266, 946\u2013958 (2015)","journal-title":"Appl. Math. Comput."},{"key":"1954_CR61","volume":"2015","author":"WC Zhao","year":"2015","unstructured":"Zhao, W.C., Li, J., Meng, X.Z.: Dynamical analysis of SIR epidemic model with nonlinear pulse vaccination and lifelong immunity. Discrete Dyn. Nat. Soc. 2015, 848623 (2015)","journal-title":"Discrete Dyn. Nat. Soc."},{"key":"1954_CR62","first-page":"438","volume":"256","author":"YJ Cui","year":"2015","unstructured":"Cui, Y.J., Zou, Y.M.: An existence and uniqueness theorem for a second order nonlinear system with coupled integral boundary value conditions. Appl. Math. Comput. 256, 438\u2013444 (2015)","journal-title":"Appl. Math. Comput."},{"key":"1954_CR63","first-page":"9","volume":"231","author":"J Yu","year":"2014","unstructured":"Yu, J., Li, M.Q., Wang, Y.L., He, G.P.: A decomposition method for large-scale box constrained optimization. Appl. Math. Comput. 231, 9\u201315 (2014)","journal-title":"Appl. Math. Comput."},{"key":"1954_CR64","first-page":"222","volume":"249","author":"TS Jiang","year":"2014","unstructured":"Jiang, T.S., Jiang, Z.W., Ling, S.T.: An algebraic method for quaternion and complex least squares coneigen-problem in quantum mechanics. Appl. Math. Comput. 249, 222\u2013228 (2014)","journal-title":"Appl. Math. Comput."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-1954-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1954-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1954-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T06:30:28Z","timestamp":1751697028000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-1954-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,20]]},"references-count":64,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["1954"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-1954-2","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,20]]},"assertion":[{"value":"4 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"189"}}