{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T15:01:53Z","timestamp":1776956513486,"version":"3.51.4"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:00Z","timestamp":1769472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:00Z","timestamp":1769472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62402511"],"award-info":[{"award-number":["62402511"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Wuhan Science and Technology Bureau","award":["2023010201020420"],"award-info":[{"award-number":["2023010201020420"]}]},{"DOI":"10.13039\/501100007129","name":"Shandong Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["ZR2024QA205"],"award-info":[{"award-number":["ZR2024QA205"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-05049-1","type":"journal-article","created":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T08:22:10Z","timestamp":1769502130000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the construction of quantum circuits for S-boxes with different criteria based on the SAT solver"],"prefix":"10.1007","volume":"25","author":[{"given":"Da","family":"Lin","sequence":"first","affiliation":[]},{"given":"Chunli","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shengyuan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Shizhu","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,27]]},"reference":[{"key":"5049_CR1","doi-asserted-by":"publisher","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, New York (1993) https:\/\/doi.org\/10.1007\/978-1-4613-9314-6","DOI":"10.1007\/978-1-4613-9314-6"},{"key":"5049_CR2","doi-asserted-by":"publisher","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (eds) Advances in Cryptology - EUROCRYPT \u201993 - Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23\u201327, 1993, Proceedings, vol. 765 of Lecture Notes in Computer Science, pp. 386\u2013397. Springer, (1994) https:\/\/doi.org\/10.1007\/3-540-48285-7_33","DOI":"10.1007\/3-540-48285-7_33"},{"key":"5049_CR3","doi-asserted-by":"publisher","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Gary L. Miller, (ed.) Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996, pp. 212\u2013219. ACM, (1996) https:\/\/doi.org\/10.1145\/237814.237866","DOI":"10.1145\/237814.237866"},{"issue":"5","key":"5049_CR4","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474\u20131483 (1997). https:\/\/doi.org\/10.1137\/S0097539796298637","journal-title":"SIAM J. Comput."},{"issue":"5","key":"5049_CR5","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997). https:\/\/doi.org\/10.1137\/S0097539795293172","journal-title":"SIAM J. Comput."},{"key":"5049_CR6","doi-asserted-by":"publisher","unstructured":"Grassl, M., Langenberg, B., Roetteler, M., Steinwandt, R.: Applying grover\u2019s algorithm to AES: quantum resource estimates. In: Takagi,T., (eds.), Post-Quantum Cryptography - PQCrypto 2016 - 7th International Workshop, Fukuoka, Japan, February 24-26, 2016, Proceedings, vol. 9606 of Lecture Notes in Computer Science, pp. 29\u201343. Springer, (2016) https:\/\/doi.org\/10.1007\/978-3-319-29360-8_3","DOI":"10.1007\/978-3-319-29360-8_3"},{"key":"5049_CR7","doi-asserted-by":"publisher","unstructured":"Jaques, S., Naehrig, M., Roetteler, M., Virdia, F.: Implementing grover oracles for quantum key search on AES and lowmc. In: Canteaut, A., Ishai, Y., (eds.) Advances in Cryptology - EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part II, vol. 12106 of Lecture Notes in Computer Science, pp. 280\u2013310. Springer, (2020) https:\/\/doi.org\/10.1007\/978-3-030-45724-2_10","DOI":"10.1007\/978-3-030-45724-2_10"},{"key":"5049_CR8","doi-asserted-by":"publisher","unstructured":"Zou, J., Wei, Z., Sun, S., Liu, X., Wu, W.: Quantum circuit implementations of aes with fewer qubits. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II, vol. 12492 of Lecture Notes in Computer Science, pp. 697\u2013726. Springer, (2020) https:\/\/doi.org\/10.1007\/978-3-030-64834-3_24","DOI":"10.1007\/978-3-030-64834-3_24"},{"key":"5049_CR9","doi-asserted-by":"publisher","unstructured":"Huang, Z., Sun, S.: Synthesizing quantum circuits of AES with lower t-depth and less qubits. In: Agrawal, S., Lin, D. (eds.) Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III, vol. 13793 of Lecture Notes in Computer Science, pp. 614\u2013644. Springer, (2022) https:\/\/doi.org\/10.1007\/978-3-031-22969-5_21","DOI":"10.1007\/978-3-031-22969-5_21"},{"key":"5049_CR10","unstructured":"NIST: Submission Rrequirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. https:\/\/csrc.nist.rip\/groups\/ST\/post-quantum-crypto\/documents\/call-for-proposals-final-dec-2016.pdf (2016)"},{"key":"5049_CR11","unstructured":"NIST: Call for Additional Digital Signature Schemes for the Post-Quantum Cryptography Standardization Process. https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/call-for-proposals-dig-sig-sept-2022.pdf (2023)"},{"issue":"4","key":"5049_CR12","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949). https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst. Tech. J."},{"key":"5049_CR13","doi-asserted-by":"publisher","unstructured":"Jean, J., Peyrin, T., Sim, S.M., Tourteaux, J.: Optimizing Implementations of Lightweight Building Blocks. IACR Trans. Symmetr. Cryptol. 2017(4), 130\u2013168 (2017) https:\/\/doi.org\/10.13154\/tosc.v2017.i4.130-168","DOI":"10.13154\/tosc.v2017.i4.130-168"},{"key":"5049_CR14","doi-asserted-by":"publisher","unstructured":"Bao, Z., Guo, J., Ling, S., Sasaki, Y.: PEIGEN - a platform for evaluation, implementation, and generation of S-boxes. IACR Trans. Symmetr. Cryptol. 2019(1), 330\u2013394 (2019) https:\/\/doi.org\/10.13154\/tosc.v2019.i1.330-394","DOI":"10.13154\/tosc.v2019.i1.330-394"},{"issue":"11","key":"5049_CR15","doi-asserted-by":"publisher","first-page":"1171753","DOI":"10.3389\/fphy.2023.1171753","volume":"2023","author":"Z Li","year":"2023","unstructured":"Li, Z., Gao, F., Qin, S., Wen, Q.: New record in the number of qubits for a quantum implementation of AES. Front. Phys. 2023(11), 1171753 (2023). https:\/\/doi.org\/10.3389\/fphy.2023.1171753","journal-title":"Front. Phys."},{"key":"5049_CR16","doi-asserted-by":"publisher","unstructured":"Lin, D., Xiang, Z., Xu, R., Zhang, S., Zeng, X.: Optimized Quantum Implementation of AES. Quant. Inf. Process.22, 352 (2023) https:\/\/doi.org\/10.1007\/s11128-023-04043-9","DOI":"10.1007\/s11128-023-04043-9"},{"key":"5049_CR17","doi-asserted-by":"publisher","unstructured":"Lin, D., Xiang, Z., Xu, R., Zeng, X., Zhang, S.: Quantum circuit implementations of SM4 block cipher based on different gate sets. Quant. Inform. Process. 22, 282 (2023) https:\/\/doi.org\/10.1007\/s11128-023-04002-4","DOI":"10.1007\/s11128-023-04002-4"},{"key":"5049_CR18","doi-asserted-by":"publisher","unstructured":"Dasu, V.A., Baksi, A., SarKar, S., Chattopadhyay, A.: LIGHTER-R: optimized reversible circuit implementation for SBoxes. In: SOCC 2019 - 32nd IEEE International System-on-Chip Conference, Singapore, 03-06 September 2019, pp. 260\u2013265. IEEE, (2019) https:\/\/doi.org\/10.1109\/SOCC46988.2019.1570548320","DOI":"10.1109\/SOCC46988.2019.1570548320"},{"key":"5049_CR19","unstructured":"Chun, M., Baksi, A., Chattopadhyay, A.: DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes. IACR Cryptology ePrint Archive 2023, 286 (2023) https:\/\/eprint.iacr.org\/2023\/286"},{"key":"5049_CR20","doi-asserted-by":"publisher","unstructured":"Stoffelen, K.: Optimizing S-box implementations for several criteria using SAT Solvers. In: Peyrin, T. (eds.) Fast Software Encryption - FSE 2016 - 23rd International Conference, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, vol. 9783 of Lecture Notes in Computer Science, pp. 140\u2013160. Springer, (2016) https:\/\/doi.org\/10.1007\/978-3-662-52993-5_8","DOI":"10.1007\/978-3-662-52993-5_8"},{"key":"5049_CR21","doi-asserted-by":"publisher","unstructured":"Bilgin, B., De Meyer, L., Duval, S., Levi, I., Standaert, F.X.: Low and depth and efficient inverses: a guide on S-boxes for low-latency masking. IACR Trans. Symmetr. Cryptol. 2020(1), 144\u2013184 (2020) https:\/\/doi.org\/10.13154\/tosc.v2020.i1.144-184","DOI":"10.13154\/tosc.v2020.i1.144-184"},{"key":"5049_CR22","doi-asserted-by":"publisher","unstructured":"Fan, Y., Wang, W., Li, Z., Lu, Z., Yiu, S.M., Wang, M.: Forced independent optimized implementation of 4-bit S-box. In: Baek, J., Ruj, S. (eds.) Information Security and Privacy - ACISP 2021 - 26th Australasian Conference, Virtual Event, December 1\u20133, 2021, Proceedings, vol. 13083 of Lecture Notes in Computer Science, pp. 151\u2013170. Springer, (2021) https:\/\/doi.org\/10.1007\/978-3-030-90567-5_8","DOI":"10.1007\/978-3-030-90567-5_8"},{"issue":"1","key":"5049_CR23","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TCSI.2023.3325559","volume":"71","author":"J Feng","year":"2024","unstructured":"Feng, J., Wei, Y., Zhang, F., Pasalic, E., Zhou, Y.: Novel optimized implementations of lightweight cryptographic S-boxes via SAT solvers. IEEE Trans. Circuits Syst. I Regul. Pap. 71(1), 334\u2013347 (2024). https:\/\/doi.org\/10.1109\/TCSI.2023.3325559","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"5049_CR24","doi-asserted-by":"publisher","unstructured":"Lu, Z., Mesnager, S., Cui, T., Fan, Y., Wang, M.: An STP-based model toward designing S-boxes with good cryptographic properties. Des. Codes Cryptogr.90, 1179\u20131202 (2022) https:\/\/doi.org\/10.1007\/s10623-022-01034-2","DOI":"10.1007\/s10623-022-01034-2"},{"key":"5049_CR25","doi-asserted-by":"publisher","unstructured":"Park, S., Sung, S.H., Lee, S., Lim, J.: Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES. In: Johansson, T. (ed.) Fast Software Encryption - FSE 2003 - 10th International Workshop, LUND, Sweden, February 24-26, 2003, Revised Papers, vol. 2887 of Lecture Notes in Computer Science, pp. 247\u2013260. Springer, (2003) https:\/\/doi.org\/10.1007\/978-3-540-39887-5_19","DOI":"10.1007\/978-3-540-39887-5_19"},{"issue":"6","key":"5049_CR26","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1109\/TCAD.2003.811448","volume":"22","author":"VV Shende","year":"2003","unstructured":"Shende, V.V., Prasad, A.K., Markov, I.L., Hayes, J.P.: Synthesis of reversible logic circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 22(6), 710\u2013722 (2003). https:\/\/doi.org\/10.1109\/TCAD.2003.811448","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"5049_CR27","doi-asserted-by":"publisher","unstructured":"E\u00e9n, N., S\u00f6rensson, N.: An Extensible SAT-solver. In: Giunchiglia, E., Tacchella, A. (eds.) Theory and Applications of Satisfiability Testing - SAT 2003 - 6th International Conference, Santa Margherita Ligure, Italy, May 5-8, 2003, Selected Revised Papers, vol. 2919 of Lecture Notes in Computer Science, pp. 502\u2013518. Springer, (2004) https:\/\/doi.org\/10.1007\/978-3-540-24605-3_37","DOI":"10.1007\/978-3-540-24605-3_37"},{"key":"5049_CR28","doi-asserted-by":"publisher","unstructured":"Soos, M., Nohl, K., Castelluccia, C.: Extending SAT Solvers to cryptographic problems. In: Kullmann, O. (eds.) Theory and Applications of Satisfiability Testing - SAT 2009 - 12th International Conference, Swansea, UK, June 30 - July 3, 2009, Proceedings, vol. of 5584 of Lecture Notes in Computer Science, pp. 244\u2013257. Springer, (2009) https:\/\/doi.org\/10.1007\/978-3-642-02777-2_24","DOI":"10.1007\/978-3-642-02777-2_24"},{"key":"5049_CR29","unstructured":"Biere, A.: CADICAL at the SAT race 2019. In: Heule Marijn, J.H., Matti, J., Martin, S. (eds.) Proceedings of SAT RACE 2019: Solver and Benchmark Descriptions, B-2019-1 of Department of Computer Science Series of Publications, pp. 14\u201315. University of Helsinki, (2019)"},{"key":"5049_CR30","doi-asserted-by":"publisher","unstructured":"Ganesh, V., Dill, D.L.: A decision procedure for bit-vectors and arrays. In: Damm, W., Hermanns, H. (eds.) Computer Aided Verification - CAV 2007 - 19th International Conference, Berlin, Germany, July 3-7, 2007, Proceedings, vol. 4590 of Lecture Notes in Computer Science, pp. 519\u2013531. Springer, (2007) https:\/\/doi.org\/10.1007\/978-3-540-73368-3_52","DOI":"10.1007\/978-3-540-73368-3_52"},{"key":"5049_CR31","doi-asserted-by":"publisher","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) Advances in Cryptology - EUROCRYPT \u201993 - Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23\u201327, 1993, Proceedings, vol. 765 of Lecture Notes in Computer Science, pp. 55\u201364. Springer, (1994) https:\/\/doi.org\/10.1007\/3-540-48285-7_6","DOI":"10.1007\/3-540-48285-7_6"},{"key":"5049_CR32","doi-asserted-by":"publisher","unstructured":"Dobbertin, H.: Construction of bent functions and balanced Boolean functions with high nonlinearity. In: Preneel, B. (ed.) Fast Software Encryption - FSE 1994 - Second International Workshop, Leuven, Belgium, December 14-16, 1994, Proceedings, vol. 1008 of Lecture Notes in Computer Science, pp. 61\u201374. Springer, (1995) https:\/\/doi.org\/10.1007\/3-540-60590-8_5","DOI":"10.1007\/3-540-60590-8_5"},{"issue":"2","key":"5049_CR33","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/2431211.2431220","volume":"45","author":"M Saeedi","year":"2013","unstructured":"Saeedi, M., Markov, I.L.: Synthesis and optimization of reversible circuits - a survey. ACM Comput. Surv. 45(2), 21 (2013). https:\/\/doi.org\/10.1145\/2431211.2431220","journal-title":"ACM Comput. Surv."},{"key":"5049_CR34","doi-asserted-by":"publisher","unstructured":"Leander, G., Poschmann, A.: On the classification of 4 bit S-boxes. In: Carlet, C., Sunar, B. (eds.) Arithmetic of Finite Fields - WAIFI 2007 - First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings, vol. 4547 of Lecture Notes in Computer Science, pp. 159\u2013176. Springer, (2007) https:\/\/doi.org\/10.1007\/978-3-540-73074-3_13","DOI":"10.1007\/978-3-540-73074-3_13"},{"key":"5049_CR35","unstructured":"Kavun E.B., Lauridsen, M.M., Leander, G., Rechberger, C., Schwabe, P., Yal\u00e7\u0131n, T.: Pr\u00f8st v1.1. CAESAR submission, http:\/\/competitions.cr.yp.to\/round1\/proestv11.pdf (2014)"},{"key":"5049_CR36","doi-asserted-by":"publisher","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings, vol. 6917 of Lecture Notes in Computer Science, pp. 342\u2013357. Springer, (2011) https:\/\/doi.org\/10.1007\/978-3-642-23951-9_23","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"5049_CR37","doi-asserted-by":"publisher","unstructured":"Beierle, C., Jean, J., K\u00f6lbl, S., Leander, G., Moradi, A., Peyrin, T., Sasaki, Y., Sasdrich, P., Sim, S.M.: The SKINNY family of block ciphers and its low-latency variant MANTIS . In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II, vol. 9815 of Lecture Notes in Computer Science, pp. 123\u2013153. Springer, (2016) https:\/\/doi.org\/10.1007\/978-3-662-53008-5_5","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"5049_CR38","doi-asserted-by":"publisher","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, vol. 4727 of Lecture Notes in Computer Science, pp. 450\u2013466. Springer, (2007) https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"5049_CR39","doi-asserted-by":"publisher","unstructured":"Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., Verbauwhede, I.: RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Science China Information Sciences 58, 1\u201315 (2015) https:\/\/doi.org\/10.1007\/s11432-015-5459-7","DOI":"10.1007\/s11432-015-5459-7"},{"key":"5049_CR40","unstructured":"Zhang, L., Wu, W., Wang, Y., Wu, S., Zhang, J.: LAC: A lightweight authenticated encryption cipher. CAESAR submission, http:\/\/competitions.cr.yp.to\/round1\/lacv1.pdf (2014)"},{"key":"5049_CR41","doi-asserted-by":"publisher","unstructured":"Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M., Todo, Y.: GIFT: A small present. In: Fischer, W., Homma, N. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings, vol. 10529 of Lecture Notes in Computer Science, pp. 321\u2013345. Springer, (2017) https:\/\/doi.org\/10.1007\/978-3-319-66787-4_16","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"5049_CR42","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., Schl$$\\ddot{\\rm {a}}$$ffer, M.: Ascon v1.1. CAESAR submission, http:\/\/competitions.cr.yp.to\/round2\/asconv11.pdf (2015)"},{"key":"5049_CR43","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.: The Keccak reference. http:\/\/keccak.noekeon.org\/ (2011)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-05049-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-05049-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-05049-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T10:52:06Z","timestamp":1771843926000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-05049-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,27]]},"references-count":43,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["5049"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-05049-1","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,27]]},"assertion":[{"value":"7 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"39"}}