{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T11:48:35Z","timestamp":1774352915745,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T00:00:00Z","timestamp":1772409600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T00:00:00Z","timestamp":1772409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Fujian Province Young and Middle-aged Teacher Education Research Project","award":["JAT231018"],"award-info":[{"award-number":["JAT231018"]}]},{"name":"Open Foundation of State Key Laboratory of Networking and Switching Technology","award":["SKLNST-2024-1-05"],"award-info":[{"award-number":["SKLNST-2024-1-05"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272056"],"award-info":[{"award-number":["62272056"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2022J01186"],"award-info":[{"award-number":["2022J01186"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05098-0","type":"journal-article","created":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T09:47:20Z","timestamp":1772444840000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum key-recovery attacks on FBC algorithm"],"prefix":"10.1007","volume":"25","author":[{"given":"Yan-Ying","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Bin-Bin","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Song","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,2]]},"reference":[{"issue":"8","key":"5098_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-024-4486-x","volume":"68","author":"J Su","year":"2025","unstructured":"Su, J., Fan, J., Wu, S., Li, G., Qin, S., Gao, F.: Topology-driven quantum architecture search framework. Sci. China Inf. Sci. 68(8), 180507 (2025)","journal-title":"Sci. China Inf. Sci."},{"key":"5098_CR2","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TFUZZ.2024.3435792","volume":"33","author":"S Wu","year":"2025","unstructured":"Wu, S., Li, R., Song, Y., Qin, S., Wen, Q., Gao, F.: Quantum-assisted hierarchical fuzzy neural network for image classification. IEEE Trans. Fuzzy Syst. 33, 491\u2013502 (2025)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"5098_CR3","doi-asserted-by":"crossref","unstructured":"Wu, S., Song, Y., Li, R., Qin, S., Wen, Q., Gao, F.: Resource-efficient adaptive variational quantum algorithm for combinatorial optimization problems. Adv. Quantum Technol. 2400484 (2025)","DOI":"10.1002\/qute.202400484"},{"key":"5098_CR4","doi-asserted-by":"crossref","unstructured":"Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: 2010 IEEE International Symposium on Information Theory, pp. 2682\u20132685 (2010)","DOI":"10.1109\/ISIT.2010.5513654"},{"key":"5098_CR5","unstructured":"Kuwakado, H., Morii, M.: Security on the quantum-type Even-Mansour cipher. In: 2012 International Symposium on Information Theory and Its Applications, pp. 312\u2013316 (2012)"},{"key":"5098_CR6","doi-asserted-by":"crossref","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Annual International Cryptology Conference - CRYPTO 2016. Springer, Berlin, Heidelberg, pp. 207\u2013237 (2016)","DOI":"10.1007\/978-3-662-53008-5_8"},{"issue":"6","key":"5098_CR7","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1109\/JBHI.2014.2344095","volume":"19","author":"M Mozaffari-Kermani","year":"2014","unstructured":"Mozaffari-Kermani, M., Sur-Kolay, S., Raghunathan, A., Jha, N.K.: Systematic poisoning attacks on and defenses for machine learning in healthcare. IEEE J. Biomed. Health Inform. 19(6), 1893\u20131905 (2014)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"5098_CR8","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., Mozaffari-Kermani, M.: EdDSA for hardware implementation: highly optimized Ed25519 and Ed448 signatures. Accepted in IEEE Trans. Circuits Syst. I: Regul. Pap. (2020)"},{"key":"5098_CR9","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science. pp. 124\u2013134 (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"2","key":"5098_CR10","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"issue":"2","key":"5098_CR11","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"5098_CR12","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing. pp. 212\u2013219 (1996)","DOI":"10.1145\/237814.237866"},{"key":"5098_CR13","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"DR Simon","year":"1997","unstructured":"Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26, 1474\u20131483 (1997)","journal-title":"SIAM J. Comput."},{"issue":"5","key":"5098_CR14","first-page":"561","volume":"6","author":"Y Luo","year":"2019","unstructured":"Luo, Y., Yan, H., Wang, L., Hu, H., Lai, X.: Study on block cipher structures against Simon\u2019s quantum algorithm. J. Cryptol. Res. 6(5), 561\u2013573 (2019)","journal-title":"J. Cryptol. Res."},{"issue":"6","key":"5098_CR15","first-page":"864","volume":"7","author":"Q You","year":"2020","unstructured":"You, Q., Qian, X., Zhou, X., Yuan, Y., Wu, Z.: Research on quantum cryptanalysis on SMS4-like structure and NBC algorithm. J. Cryptol. Res. 7(6), 864\u2013874 (2020)","journal-title":"J. Cryptol. Res."},{"issue":"3","key":"5098_CR16","first-page":"417","volume":"8","author":"X Qian","year":"2021","unstructured":"Qian, X., You, Q.D., Zhou, X., Zhang, Y., Zhao, X.: Quantum attack on MARS-like Feistel schemes. J. Cryptol. Res. 8(3), 417\u2013431 (2021)","journal-title":"J. Cryptol. Res."},{"issue":"4","key":"5098_CR17","first-page":"633","volume":"9","author":"Y Li","year":"2022","unstructured":"Li, Y., Yi, Z., Wang, Z., Liu, J.: Quantum cryptanalysis of lightweight cipher TWINE-128. J. Cryptol. Res. 9(4), 633\u2013643 (2022)","journal-title":"J. Cryptol. Res."},{"issue":"6","key":"5098_CR18","first-page":"989","volume":"8","author":"Y Li","year":"2021","unstructured":"Li, Y., Lin, H., Yi, Z., Xie, H.: Quantum cryptanalysis of MIBS. J. Cryptol. Res. 8(6), 989\u2013998 (2021)","journal-title":"J. Cryptol. Res."},{"key":"5098_CR19","doi-asserted-by":"crossref","unstructured":"Leander, G., May, A.: Grover meets Simon - quantumly attacking the FX-construction. In: International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2017. Springer, Cham, pp. 161\u2013178 (2017)","DOI":"10.1007\/978-3-319-70697-9_6"},{"key":"5098_CR20","doi-asserted-by":"crossref","unstructured":"Kilian, J., Rogaway, P.: How to protect DES against exhaustive key search. In: Annual International Cryptology Conference - CRYPTO 1996. Springer, Berlin, Heidelberg, pp. 252\u2013267 (1996)","DOI":"10.1007\/3-540-68697-5_20"},{"key":"5098_CR21","doi-asserted-by":"crossref","unstructured":"Onions, P.: On the strength of simply-iterated Feistel ciphers with whitening keys. In: Cryptographers\u2019 Track at the RSA Conference - CT-RSA 2001, Springer, Berlin, Heidelberg, pp. 63\u201369 (2001)","DOI":"10.1007\/3-540-45353-9_6"},{"issue":"10","key":"5098_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9468-y","volume":"61","author":"X Dong","year":"2018","unstructured":"Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10), 102501 (2018)","journal-title":"Sci. China Inf. Sci."},{"key":"5098_CR23","doi-asserted-by":"crossref","unstructured":"Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. In: Cryptographers\u2019 Track at the RSA Conference - CT-RSA 2019, Springer, Cham, pp. 391\u2013411 (2019)","DOI":"10.1007\/978-3-030-12612-4_20"},{"key":"5098_CR24","doi-asserted-by":"crossref","unstructured":"Canale, F., Leander, G., Stennes, L.: Simon\u2019s algorithm and symmetric crypto: generalizations and automatized applications. In: Annual International Cryptology Conference - CRYPTO 2022. Springer, Cham, pp. 779\u2013808 (2022)","DOI":"10.1007\/978-3-031-15982-4_26"},{"issue":"2","key":"5098_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9436-7","volume":"62","author":"X Dong","year":"2019","unstructured":"Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2), 022501 (2019)","journal-title":"Sci. China Inf. Sci."},{"key":"5098_CR26","doi-asserted-by":"crossref","unstructured":"Ni, B., Ito, G., Dong, X., Iwata, T.: Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256. In: International Conference on Cryptology in India - INDOCRYPT 2019, Springer, Cham, pp. 433\u2013455 (2019)","DOI":"10.1007\/978-3-030-35423-7_22"},{"issue":"10","key":"5098_CR27","doi-asserted-by":"publisher","first-page":"2300155","DOI":"10.1002\/qute.202300155","volume":"6","author":"H Sun","year":"2023","unstructured":"Sun, H., Cai, B., Qin, S., Wen, Q., Gao, F.: Quantum attacks on type-1 generalized Feistel schemes. Adv. Quantum Technol. 6(10), 2300155 (2023)","journal-title":"Adv. Quantum Technol."},{"key":"5098_CR28","doi-asserted-by":"crossref","unstructured":"Hod\u017ei\u0107, S., Knudsen, L.R., Kidmose, A.B.: On quantum distinguishers for type-3 generalized Feistel network based on separability. In: International Conference on Post-Quantum Cryptography, Springer, Cham, pp. 461\u2013480 (2020)","DOI":"10.1007\/978-3-030-44223-1_25"},{"issue":"2","key":"5098_CR29","doi-asserted-by":"publisher","first-page":"209","DOI":"10.23919\/cje.2021.00.294","volume":"32","author":"Z Zhang","year":"2023","unstructured":"Zhang, Z., Wu, W., Sui, H., Wang, B.: Quantum attacks on type-3 generalized Feistel scheme and unbalanced Feistel scheme with expanding functions. Chin. J. Electron. 32(2), 209\u2013216 (2023)","journal-title":"Chin. J. Electron."},{"key":"5098_CR30","doi-asserted-by":"crossref","unstructured":"Cui, J., Guo, J., Ding, S.: Applications of Simon\u2019s algorithm in quantum attacks on Feistel variants. Quantum Inf. Process. 20(3) (2021)","DOI":"10.1007\/s11128-021-03027-x"},{"issue":"6","key":"5098_CR31","first-page":"960","volume":"8","author":"B Yu","year":"2021","unstructured":"Yu, B., Sun, B., Liu, G., Luo, Y., Zhang, Z.: Quantum cryptanalysis on some generalized unbalanced Feistel networks. J. Cryptol. Res. 8(6), 960\u2013973 (2021)","journal-title":"J. Cryptol. Res."},{"key":"5098_CR32","doi-asserted-by":"crossref","unstructured":"Zou, K., Dong, X., Zhang, F.: Improved quantum attack on several generalized unbalanced Feistel structures. In: 2022 International Conference on Networks, Communications and Information Technology (CNCIT), pp. 113\u2013121 (2022)","DOI":"10.1109\/CNCIT56797.2022.00026"},{"key":"5098_CR33","doi-asserted-by":"crossref","unstructured":"Bonnetain, X., Leurent, G., Naya-Plasencia, M. and Schrottenloher, A.: Quantum linearization attacks. In: International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2021. Springer, Cham, pp. 422\u2013452 (2021)","DOI":"10.1007\/978-3-030-92062-3_15"},{"issue":"10","key":"5098_CR34","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/s11128-021-03256-0","volume":"20","author":"B Zhou","year":"2021","unstructured":"Zhou, B., Yuan, Z.: Quantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithm. Quantum Inf. Process. 20(10), 330 (2021)","journal-title":"Quantum Inf. Process."},{"key":"5098_CR35","doi-asserted-by":"crossref","unstructured":"Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: On quantum slide attacks. In: International Conference on Selected Areas in Cryptography - SAC 2019, Springer, Cham, pp. 492\u2013519 (2019)","DOI":"10.1007\/978-3-030-38471-5_20"},{"key":"5098_CR36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.106.032417","volume":"106","author":"J Tan","year":"2022","unstructured":"Tan, J., Xiao, L., Qiu, D., Luo, L., Mateus, P.: Distributed quantum algorithm for Simon\u2019s problem. Phys. Rev. A 106, 032417 (2022)","journal-title":"Phys. Rev. A"},{"key":"5098_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2023.129209","volume":"629","author":"X Zhou","year":"2023","unstructured":"Zhou, X., Qiu, D., Luo, L.: Distributed Bernstein-Vazirani algorithm. Physica A 629, 129209 (2023)","journal-title":"Physica A"},{"issue":"2","key":"5098_CR38","doi-asserted-by":"publisher","first-page":"296","DOI":"10.46586\/tosc.v2024.i2.296-321","volume":"2024","author":"Z Xiang","year":"2024","unstructured":"Xiang, Z., Wang, X., Yu, B., Sun, B., Zhang, S., Zeng, X., Shen, X., Li, N.: Links between quantum distinguishers based on Simon\u2019s algorithm and truncated differentials. IACR Trans. Symmetric Cryptol. 2024(2), 296\u2013321 (2024)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"5098_CR39","doi-asserted-by":"crossref","unstructured":"Liu, Q., Wang, H., Wang, J., Li, B., Wang, M.: Quantum periodic distinguisher construction: symbolization method and automated tool. In: International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2025. Springer, Singapore, pp. 224\u2013255 (2025)","DOI":"10.1007\/978-981-95-5125-5_8"},{"issue":"1","key":"5098_CR40","doi-asserted-by":"publisher","first-page":"71","DOI":"10.46586\/tosc.v2016.i1.71-94","volume":"2016","author":"M Kaplan","year":"2016","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum differential and linear cryptanalysis. IACR Trans. Symmetric Cryptol. 2016(1), 71\u201394 (2016)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"5098_CR41","doi-asserted-by":"crossref","unstructured":"Bonnetain, X., Hosoyamada, A., Naya-Plasencia, M., Sasaki, Y., Schrottenloher, A.: Quantum attacks without superposition queries: the offline Simon\u2019s algorithm. In: International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2019. Springer, Cham, pp. 552\u2013583 (2019)","DOI":"10.1007\/978-3-030-34578-5_20"},{"key":"5098_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TQE.2020.3041426","volume":"1","author":"M Rahman","year":"2020","unstructured":"Rahman, M., Paul, G.: Quantum attacks on HCTR and its variants. IEEE Trans. Quantum Eng. 1, 1\u20138 (2020)","journal-title":"IEEE Trans. Quantum Eng."},{"issue":"1","key":"5098_CR43","first-page":"1","volume":"2022","author":"X Bonnetain","year":"2022","unstructured":"Bonnetain, X., Jaques, S.: Quantum Period Finding against Symmetric Primitives in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1), 1\u201327 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"5098_CR44","doi-asserted-by":"crossref","unstructured":"Yu, B., Shi, T., Dong, X., Shen, X., Luo, Y., Sun, B.: Quantum attacks: a view of data complexity on offline Simon\u2019s algorithm. In: International Conference on Information Security and Cryptology - ICISC 2023, Springer, Singapore, pp. 329\u2013342 (2023)","DOI":"10.1007\/978-981-97-0945-8_19"},{"key":"5098_CR45","doi-asserted-by":"crossref","unstructured":"Daiza, T., Yoneyama, K.: Quantum key recovery attacks on 3-round Feistel-2 structure without quantum encryption oracles. In: International Workshop on Security - IWS 2022, Springer, Cham, pp. 128\u2013144 (2022)","DOI":"10.1007\/978-3-031-15255-9_7"},{"key":"5098_CR46","first-page":"3321","volume":"36","author":"Y Xu","year":"2025","unstructured":"Xu, Y., Luo, Y., Dong, X., Yuan, Z.: Low-data quantum key-recovery attack on block cipher structures. J. Softw. 36, 3321\u20133338 (2025)","journal-title":"J. Softw."},{"key":"5098_CR47","doi-asserted-by":"crossref","unstructured":"Basak, J., Bhaumik, R., Chauhan, A.K., Jejurikar, R., Jha, A., Roy, A., Schrottenloher, A., Talnikar, S.: Post-quantum Security of Key-Alternating Feistel Ciphers. In: International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2025, Springer Nature, Singapore, pp. 446\u2013478 (2025)","DOI":"10.1007\/978-981-95-5018-0_15"},{"issue":"2","key":"5098_CR48","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/s11128-025-04671-3","volume":"24","author":"X Feng","year":"2025","unstructured":"Feng, X., Wu, H., Zhang, K., Sun, H.: Quantum claw-finding attacks on 5-round Feistel structure and generalized Feistel schemes. Quantum Inf. Process. 24(2), 52 (2025)","journal-title":"Quantum Inf. Process."},{"key":"5098_CR49","first-page":"768","volume":"6","author":"X Feng","year":"2019","unstructured":"Feng, X., Zeng, X., Zhang, F., Zeng, G., Tang, D., Gan, G., Wang, Y.: On the lightweight block cipher FBC. J. Cryptol. Res. 6, 768\u2013785 (2019)","journal-title":"J. Cryptol. Res."},{"issue":"2","key":"5098_CR50","doi-asserted-by":"publisher","DOI":"10.1002\/que2.36","volume":"2","author":"P Wang","year":"2020","unstructured":"Wang, P., Tian, S., Sun, Z., Xie, N.: Quantum algorithms for hash preimage attacks. Quantum Eng. 2(2), e36 (2020)","journal-title":"Quantum Eng."},{"key":"5098_CR51","doi-asserted-by":"crossref","unstructured":"Wang, R.: Comparing Grover\u2019s quantum search algorithm with classical algorithm on solving satisfiability problem. In: 2021 IEEE Integrated STEM Education Conference (ISEC), pp. 204\u2013204 (2021)","DOI":"10.1109\/ISEC52395.2021.9764017"},{"issue":"6","key":"5098_CR52","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1119\/10.0004835","volume":"89","author":"B Kain","year":"2021","unstructured":"Kain, B.: Searching a quantum database with Grover\u2019s search algorithm. Am. J. Phys. 89(6), 618\u2013626 (2021)","journal-title":"Am. J. Phys."},{"key":"5098_CR53","doi-asserted-by":"crossref","unstructured":"Hosoyamada, A., Sasaki, Y.: Quantum Demiric-Sel\u00e7uk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. In: Security and Cryptography for Networks - SCN 2018, Springer, Cham, pp. 386\u2013403 (2018)","DOI":"10.1007\/978-3-319-98113-0_21"},{"issue":"3","key":"5098_CR54","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1515\/JMC.2007.011","volume":"1","author":"J Daemen","year":"2007","unstructured":"Daemen, J., Rijmen, V.: Probability distributions of correlation and differentials in block ciphers. J. Math. Cryptol. 1(3), 221\u2013242 (2007)","journal-title":"J. Math. Cryptol."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05098-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05098-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05098-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T09:55:21Z","timestamp":1774346121000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05098-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,2]]},"references-count":54,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["5098"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05098-0","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,2]]},"assertion":[{"value":"5 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"93"}}