{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:19:51Z","timestamp":1774523991147,"version":"3.50.1"},"reference-count":98,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T00:00:00Z","timestamp":1774483200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T00:00:00Z","timestamp":1774483200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05133-0","type":"journal-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T10:44:24Z","timestamp":1774521864000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep-learning-based continuous attacks on QKD protocols"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6436-9765","authenticated-orcid":false,"given":"Th\u00e9o","family":"Lejeune","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1699-0195","authenticated-orcid":false,"given":"Fran\u00e7ois","family":"Damanet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,26]]},"reference":[{"issue":"2","key":"5133_CR1","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1109\/COMST.2018.2882385","volume":"21","author":"P Botsinis","year":"2019","unstructured":"Botsinis, P., Alanis, D., Babar, Z., Nguyen, H.V., Chandra, D., Ng, S.X., Hanzo, L.: Quantum search algorithms for wireless communications. IEEE Commu. Surv. I Tutor. 21(2), 1209\u20131242 (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2882385","journal-title":"IEEE Commu. Surv. I Tutor."},{"key":"5133_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/su142315901","author":"OD Okey","year":"2022","unstructured":"Okey, O.D., Maidin, S.S., Lopes Rosa, R., Toor, W.T., Carrillo Melgarejo, D., Wuttisittikulkij, L., Saadi, M., Zegarra Rodr\u00edguez, D.: Quantum key distribution protocol selector based on machine learning for next-generation networks. Sustainability (2022). https:\/\/doi.org\/10.3390\/su142315901","journal-title":"Sustainability"},{"issue":"2","key":"5133_CR3","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978). https:\/\/doi.org\/10.1145\/359340.359342","journal-title":"Commun. ACM"},{"issue":"5","key":"5133_CR4","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/s0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997). https:\/\/doi.org\/10.1137\/s0097539795293172","journal-title":"SIAM J. Comput."},{"key":"5133_CR5","unstructured":"Renner, R.: Security of quantum key distribution. PhD thesis, ETH Zurich (2006). arxiv:org\/abs\/quant-ph\/0512258"},{"key":"5133_CR6","doi-asserted-by":"publisher","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theoretical Computer Science 560, 7\u201311 (2014) https:\/\/doi.org\/10.1016\/j.tcs.2014.05.025 . Theoretical Aspects of Quantum Cryptography \u2013 celebrating 30 years of BB84","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"5133_CR7","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992). https:\/\/doi.org\/10.1103\/PhysRevLett.68.3121","journal-title":"Phys. Rev. Lett."},{"key":"5133_CR8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.037902","volume":"89","author":"K Inoue","year":"2002","unstructured":"Inoue, K., Waks, E., Yamamoto, Y.: Differential phase shift quantum key distribution. Phys. Rev. Lett. 89, 037902 (2002). https:\/\/doi.org\/10.1103\/PhysRevLett.89.037902","journal-title":"Phys. Rev. Lett."},{"key":"5133_CR9","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.91.057901","author":"W-Y Hwang","year":"2003","unstructured":"Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. (2003). https:\/\/doi.org\/10.1103\/physrevlett.91.057901","journal-title":"Phys. Rev. Lett."},{"key":"5133_CR10","unstructured":"Miyadera, T., Imai, H.: Information-Disturbance theorem and Uncertainty Relation (2007). arxiv: org\/abs\/0707.4559"},{"key":"5133_CR11","doi-asserted-by":"publisher","first-page":"2038","DOI":"10.1103\/PhysRevA.53.2038","volume":"53","author":"CA Fuchs","year":"1996","unstructured":"Fuchs, C.A., Peres, A.: Quantum-state disturbance versus information gain: uncertainty relations for quantum information. Phys. Rev. A 53, 2038\u20132045 (1996). https:\/\/doi.org\/10.1103\/PhysRevA.53.2038","journal-title":"Phys. Rev. A"},{"key":"5133_CR12","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330\u20131333 (2000). https:\/\/doi.org\/10.1103\/PhysRevLett.85.1330","journal-title":"Phys. Rev. Lett."},{"key":"5133_CR13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.022320","volume":"73","author":"N Gisin","year":"2006","unstructured":"Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006). https:\/\/doi.org\/10.1103\/PhysRevA.73.022320","journal-title":"Phys. Rev. A"},{"issue":"13","key":"5133_CR14","doi-asserted-by":"publisher","first-page":"2023","DOI":"10.1080\/09500340108240904","volume":"48","author":"VM Artem Vakhitov","year":"2001","unstructured":"Artem Vakhitov, V.M., Hjelme, D.R.: Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography. J. Mod. Opt. 48(13), 2023\u20132038 (2001). https:\/\/doi.org\/10.1080\/09500340108240904","journal-title":"J. Mod. Opt."},{"issue":"26","key":"5133_CR15","doi-asserted-by":"publisher","first-page":"27938","DOI":"10.1364\/OE.18.027938","volume":"18","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Thermal blinding of gated detectors in quantum cryptography. Opt. Express 18(26), 27938\u201327954 (2010). https:\/\/doi.org\/10.1364\/OE.18.027938","journal-title":"Opt. Express"},{"key":"5133_CR16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.74.022313","volume":"74","author":"V Makarov","year":"2006","unstructured":"Makarov, V., Anisimov, A., Skaar, J.: Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 74, 022313 (2006). https:\/\/doi.org\/10.1103\/PhysRevA.74.022313","journal-title":"Phys. Rev. A"},{"key":"5133_CR17","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.78.042333","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y., Fung, C.-H.F., Qi, B., Chen, C., Lo, H.-K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A (2008). https:\/\/doi.org\/10.1103\/physreva.78.042333","journal-title":"Phys. Rev. A"},{"issue":"7","key":"5133_CR18","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/13\/7\/073024","volume":"13","author":"H Weier","year":"2011","unstructured":"Weier, H., Krauss, H., Rau, M., F\u00fcrst, M., Nauerth, S., Weinfurter, H.: Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors. New J. Phys. 13(7), 073024 (2011). https:\/\/doi.org\/10.1088\/1367-2630\/13\/7\/073024","journal-title":"New J. Phys."},{"key":"5133_CR19","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.92.025002","volume":"92","author":"F Xu","year":"2020","unstructured":"Xu, F., Ma, X., Zhang, Q., Lo, H.-K., Pan, J.-W.: Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020). https:\/\/doi.org\/10.1103\/RevModPhys.92.025002","journal-title":"Rev. Mod. Phys."},{"issue":"1","key":"5133_CR20","doi-asserted-by":"publisher","first-page":"1978","DOI":"10.1038\/s41598-017-01884-0","volume":"7","author":"AR Dixon","year":"2017","unstructured":"Dixon, A.R., Dynes, J.F., Lucamarini, M., Fr\u00f6hlich, B., Sharpe, A.W., Plews, A., Tam, W., Yuan, Z.L., Tanizawa, Y., Sato, H., Kawamura, S., Fujiwara, M., Sasaki, M., Shields, A.J.: Quantum key distribution with hacking countermeasures and long term field trial. Sci. Rep. 7(1), 1978 (2017)","journal-title":"Sci. Rep."},{"key":"5133_CR21","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-023-40920-8","author":"T Metger","year":"2023","unstructured":"Metger, T., Renner, R.: Security of quantum key distribution from generalised entropy accumulation. Nat. Commun. (2023). https:\/\/doi.org\/10.1038\/s41467-023-40920-8","journal-title":"Nat. Commun."},{"key":"5133_CR22","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-87574-4","author":"R Kumar","year":"2021","unstructured":"Kumar, R., Mazzoncini, F., Qin, H., All\u00e9aume, R.: Experimental vulnerability analysis of qkd based on attack ratings. Sci. Rep. (2021). https:\/\/doi.org\/10.1038\/s41598-021-87574-4","journal-title":"Sci. Rep."},{"key":"5133_CR23","unstructured":"M, S.R., B, C.M.: Comprehensive analysis of BB84, a quantum key distribution protocol (2023)"},{"key":"5133_CR24","doi-asserted-by":"publisher","DOI":"10.3390\/s22166284","author":"A Adu-Kyere","year":"2022","unstructured":"Adu-Kyere, A., Nigussie, E., Isoaho, J.: Quantum key distribution: modeling and simulation through bb84 protocol using python3. Sensors (2022). https:\/\/doi.org\/10.3390\/s22166284","journal-title":"Sensors"},{"key":"5133_CR25","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301\u20131350 (2009). https:\/\/doi.org\/10.1103\/RevModPhys.81.1301","journal-title":"Rev. Mod. Phys."},{"key":"5133_CR26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.053842","volume":"99","author":"A Kozubov","year":"2019","unstructured":"Kozubov, A., Gaidash, A., Miroshnichenko, G.: Quantum model of decoherence in the polarization domain for the fiber channel. Phys. Rev. A 99, 053842 (2019). https:\/\/doi.org\/10.1103\/PhysRevA.99.053842","journal-title":"Phys. Rev. A"},{"issue":"5","key":"5133_CR27","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1134\/S0030400X12050116","volume":"112","author":"GP Miroshnichenko","year":"2012","unstructured":"Miroshnichenko, G.P.: Hamiltonian of photons in a single-mode optical fiber for quantum communications protocols. Opt. Spectrosc. 112(5), 777\u2013786 (2012). https:\/\/doi.org\/10.1134\/S0030400X12050116","journal-title":"Opt. Spectrosc."},{"issue":"3","key":"5133_CR28","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1134\/S0030400X12030137","volume":"112","author":"GP Miroshnichenko","year":"2012","unstructured":"Miroshnichenko, G.P., Sotnikova, A.A.: Optimization of optical fiber parameters to reduce errors of quantum key distribution using entangled polarization states of biphotons. Opt. Spectrosc. 112(3), 327\u2013334 (2012). https:\/\/doi.org\/10.1134\/S0030400X12030137","journal-title":"Opt. Spectrosc."},{"issue":"5410","key":"5133_CR29","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999). https:\/\/doi.org\/10.1126\/science.283.5410.2050","journal-title":"Science"},{"key":"5133_CR30","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441\u2013444 (2000). https:\/\/doi.org\/10.1103\/PhysRevLett.85.441","journal-title":"Phys. Rev. Lett."},{"issue":"2053","key":"5133_CR31","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1098\/rspa.2004.1372","volume":"461","author":"I Devetak","year":"2005","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proce. Royal Soc. Math. Phys. Eng. Sci. 461(2053), 207\u2013235 (2005). https:\/\/doi.org\/10.1098\/rspa.2004.1372","journal-title":"Proce. Royal Soc. Math. Phys. Eng. Sci."},{"issue":"4","key":"5133_CR32","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/4\/045018","volume":"11","author":"M Koashi","year":"2009","unstructured":"Koashi, M.: Simple security proof of quantum key distribution based on complementarity. New J. Phys. 11(4), 045018 (2009). https:\/\/doi.org\/10.1088\/1367-2630\/11\/4\/045018","journal-title":"New J. Phys."},{"key":"5133_CR33","doi-asserted-by":"publisher","first-page":"136994","DOI":"10.1109\/ACCESS.2021.3117405","volume":"9","author":"HA Al-Mohammed","year":"2021","unstructured":"Al-Mohammed, H.A., Al-Ali, A., Yaacoub, E., Qidwai, U., Abualsaud, K., Rzewuski, S., Flizikowski, A.: Machine learning techniques for detecting attackers during quantum key distribution in iot networks with application to railway scenarios. IEEE Access 9, 136994\u2013137004 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3117405","journal-title":"IEEE Access"},{"key":"5133_CR34","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAB.386394","author":"Z He","year":"2020","unstructured":"He, Z., Wang, Y., Huang, D.: Wavelength attack recognition based on machine learning optical spectrum analysis for the practical continuous-variable quantum key distribution system. J. Opt. Soc. Am. B (2020). https:\/\/doi.org\/10.1364\/JOSAB.386394","journal-title":"J. Opt. Soc. Am. B"},{"key":"5133_CR35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.101.062320","author":"Y Mao","year":"2020","unstructured":"Mao, Y., Wang, Y., Huang, W., Qin, H., Huang, D., Guo, Y.: Hidden-markov-model-based calibration-attack recognition for continuous-variable quantum key distribution. Phys. Rev. A (2020). https:\/\/doi.org\/10.1103\/PhysRevA.101.062320","journal-title":"Phys. Rev. A"},{"issue":"8","key":"5133_CR36","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aba8d4","volume":"22","author":"Y Mao","year":"2020","unstructured":"Mao, Y., Huang, W., Zhong, H., Wang, Y., Qin, H., Guo, Y., Huang, D.: Detecting quantum attacks: a machine learning based defense strategy for practical continuous-variable quantum key distribution. New J. Phys. 22(8), 083073 (2020). https:\/\/doi.org\/10.1088\/1367-2630\/aba8d4","journal-title":"New J. Phys."},{"key":"5133_CR37","doi-asserted-by":"publisher","unstructured":"Tunc, H.S.D., Wang, Y., Bassoli, R., Fitzek, F.H.P.: Machine learning based attack detection for quantum key distribution. In: 2023 IEEE 9th World Forum on Internet of Things (WF-IoT), 1\u20136 (2023). https:\/\/doi.org\/10.1109\/WF-IoT58464.2023.10539417","DOI":"10.1109\/WF-IoT58464.2023.10539417"},{"key":"5133_CR38","doi-asserted-by":"publisher","DOI":"10.1109\/JPHOT.2022.3167760","author":"H Zhang","year":"2022","unstructured":"Zhang, H., Luo, Y., Zhang, L., Ruan, X., Huang, D.: Neural network-powered nonlinear compensation framework for high-speed continuous variable quantum key distribution. IEEE Photonics J. (2022). https:\/\/doi.org\/10.1109\/JPHOT.2022.3167760","journal-title":"IEEE Photonics J."},{"key":"5133_CR39","doi-asserted-by":"crossref","unstructured":"Long, N.K., Malaney, R., Grant, K.J.: Phase correction using deep learning for satellite-to-ground CV-QKD (2023). arxiv: org\/abs\/2305.18737","DOI":"10.1117\/12.3018524"},{"issue":"6","key":"5133_CR40","doi-asserted-by":"publisher","DOI":"10.1117\/1.OE.57.6.066109","volume":"57","author":"J Li","year":"2018","unstructured":"Li, J., Guo, Y., Wang, X., Xie, C., Zhang, L., Huang, D.: Discrete-modulated continuous-variable quantum key distribution with a machine-learning-based detector. Opt. Eng. 57(6), 066109 (2018). https:\/\/doi.org\/10.1117\/1.OE.57.6.066109","journal-title":"Opt. Eng."},{"key":"5133_CR41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.97.022316","volume":"97","author":"W Liu","year":"2018","unstructured":"Liu, W., Huang, P., Peng, J., Fan, J., Zeng, G.: Integrating machine learning to achieve an automatic parameter prediction for practical continuous-variable quantum key distribution. Phys. Rev. A 97, 022316 (2018). https:\/\/doi.org\/10.1103\/PhysRevA.97.022316","journal-title":"Phys. Rev. A"},{"key":"5133_CR42","doi-asserted-by":"publisher","DOI":"10.3390\/e21090908","author":"Y Su","year":"2019","unstructured":"Su, Y., Guo, Y., Huang, D.: Parameter optimization based bpnn of atmosphere continuous-variable quantum key distribution. Entropy (2019). https:\/\/doi.org\/10.3390\/e21090908","journal-title":"Entropy"},{"key":"5133_CR43","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.100.012316","volume":"100","author":"W Huang","year":"2019","unstructured":"Huang, W., Mao, Y., Xie, C., Huang, D.: Quantum hacking of free-space continuous-variable quantum key distribution by using a machine-learning technique. Phys. Rev. A 100, 012316 (2019). https:\/\/doi.org\/10.1103\/PhysRevA.100.012316","journal-title":"Phys. Rev. A"},{"issue":"2","key":"5133_CR44","doi-asserted-by":"publisher","first-page":"176","DOI":"10.3390\/e23020176","volume":"23","author":"Y Zheng","year":"2021","unstructured":"Zheng, Y., Shi, H., Pan, W., Wang, Q., Mao, J.: Quantum hacking on an integrated continuous-variable quantum key distribution system via power analysis. Entropy (Basel) 23(2), 176 (2021). https:\/\/doi.org\/10.3390\/e23020176","journal-title":"Entropy (Basel)"},{"key":"5133_CR45","unstructured":"Decker, T., Gallezot, M., Kerstan, S.F., Paesano, A., Ginter, A., Wormsbecher, W.: QKD as a quantum machine learning task (2024). arxiv: org\/abs\/2410.01904"},{"key":"5133_CR46","doi-asserted-by":"publisher","DOI":"10.1103\/physrevapplied.20.054040","author":"A Baliuka","year":"2023","unstructured":"Baliuka, A., St\u00f6cker, M., Auer, M., Freiwang, P., Weinfurter, H., Knips, L.: Deep-learning-based radio-frequency side-channel attack on quantum key distribution. Phys. Rev. Appl. (2023). https:\/\/doi.org\/10.1103\/physrevapplied.20.054040","journal-title":"Phys. Rev. Appl."},{"issue":"5","key":"5133_CR47","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1038\/s41567-018-0048-5","volume":"14","author":"G Torlai","year":"2018","unstructured":"Torlai, G., Mazzola, G., Carrasquilla, J., Troyer, M., Melko, R., Carleo, G.: Neural-network quantum state tomography. Nat. Phys. 14(5), 447\u2013450 (2018). https:\/\/doi.org\/10.1038\/s41567-018-0048-5. (Published online 2018\/05\/01)","journal-title":"Nat. Phys."},{"issue":"1","key":"5133_CR48","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1038\/s41534-021-00436-9","volume":"7","author":"Y Quek","year":"2021","unstructured":"Quek, Y., Fort, S., Ng, H.K.: Adaptive quantum state tomography with neural networks. Npj Quant. Info. 7(1), 105 (2021). https:\/\/doi.org\/10.1038\/s41534-021-00436-9","journal-title":"Npj Quant. Info."},{"key":"5133_CR49","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.121.150503","volume":"121","author":"J Gray","year":"2018","unstructured":"Gray, J., Banchi, L., Bayat, A., Bose, S.: Machine-learning-assisted many-body entanglement measurement. Phys. Rev. Lett. 121, 150503 (2018). https:\/\/doi.org\/10.1103\/PhysRevLett.121.150503","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"5133_CR50","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1038\/s42254-022-00552-1","volume":"5","author":"V Gebhart","year":"2023","unstructured":"Gebhart, V., Santagati, R., Gentile, A.A., Gauger, E.M., Craig, D., Ares, N., Banchi, L., Marquardt, F., Pezz\u00e8, L., Bonato, C.: Learning quantum systems. Nat. Rev. Phys. 5(3), 141\u2013156 (2023). https:\/\/doi.org\/10.1038\/s42254-022-00552-1","journal-title":"Nat. Rev. Phys."},{"key":"5133_CR51","doi-asserted-by":"publisher","unstructured":"Wiseman, H.M., Milburn, G.J.: Quantum measurement and control. Cambridge University Press, (2009). https:\/\/doi.org\/10.1017\/CBO9780511813948","DOI":"10.1017\/CBO9780511813948"},{"issue":"8","key":"5133_CR52","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997). https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput."},{"key":"5133_CR53","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.62.012302","author":"D Bru\u00df","year":"2000","unstructured":"Bru\u00df, D., Cinchetti, M., Mauro D\u2019Ariano, G., Macchiavello, C.: Phase-covariant quantum cloning. Phys. Rev. A (2000). https:\/\/doi.org\/10.1103\/physreva.62.012302","journal-title":"Phys. Rev. A"},{"key":"5133_CR54","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1103\/PhysRevA.56.1163","volume":"56","author":"CA Fuchs","year":"1997","unstructured":"Fuchs, C.A., Gisin, N., Griffiths, R.B., Niu, C.-S., Peres, A.: Optimal eavesdropping in quantum cryptography. i. information bound and optimal strategy. Phys. Rev. A 56, 1163\u20131172 (1997). https:\/\/doi.org\/10.1103\/PhysRevA.56.1163","journal-title":"Phys. Rev. A"},{"key":"5133_CR55","doi-asserted-by":"publisher","unstructured":"Mermin, N.D.: Quantum computer science: an introduction. Cambridge University Press, (2007). https:\/\/doi.org\/10.1017\/CBO9780511813870","DOI":"10.1017\/CBO9780511813870"},{"key":"5133_CR56","doi-asserted-by":"publisher","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum computation and quantum information: 10th Anniversary Edition. Cambridge University Press, (2010). https:\/\/doi.org\/10.1017\/CBO9780511976667","DOI":"10.1017\/CBO9780511976667"},{"key":"5133_CR57","unstructured":"Elkouss, D., Martinez-Mateo, J., Martin, V.: Information reconciliation for quantum key distribution (2011). https:\/\/arxiv.org\/abs\/1007.1616"},{"issue":"1","key":"5133_CR58","doi-asserted-by":"publisher","first-page":"19788","DOI":"10.1038\/srep19788","volume":"6","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Xu, P., Yang, R., Zhou, Y.-H., Shi, W.-M.: Quantum hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 6(1), 19788 (2016). https:\/\/doi.org\/10.1038\/srep19788","journal-title":"Sci. Rep."},{"issue":"4","key":"5133_CR59","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/s11128-022-03462-4","volume":"21","author":"B Yan","year":"2022","unstructured":"Yan, B., Li, Q., Mao, H., Chen, N.: An efficient hybrid hash based privacy amplification algorithm for quantum key distribution. Quant. Inf. Process. 21(4), 130 (2022). https:\/\/doi.org\/10.1007\/s11128-022-03462-4","journal-title":"Quant. Inf. Process."},{"key":"5133_CR60","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1103\/PhysRevA.47.642","volume":"47","author":"HM Wiseman","year":"1993","unstructured":"Wiseman, H.M., Milburn, G.J.: Quantum theory of field-quadrature measurements. Phys. Rev. A 47, 642\u2013662 (1993). https:\/\/doi.org\/10.1103\/PhysRevA.47.642","journal-title":"Phys. Rev. A"},{"key":"5133_CR61","doi-asserted-by":"publisher","first-page":"2832","DOI":"10.1103\/PhysRevLett.76.2832","volume":"76","author":"GM D\u2019Ariano","year":"1996","unstructured":"D\u2019Ariano, G.M., Yuen, H.P.: Impossibility of measuring the wave function of a single quantum system. Phys. Rev. Lett. 76, 2832\u20132835 (1996). https:\/\/doi.org\/10.1103\/PhysRevLett.76.2832","journal-title":"Phys. Rev. Lett."},{"key":"5133_CR62","doi-asserted-by":"publisher","first-page":"4106","DOI":"10.1103\/PhysRevLett.74.4106","volume":"74","author":"O Alter","year":"1995","unstructured":"Alter, O., Yamamoto, Y.: Inhibition of the measurement of the wave function of a single quantum system in repeated weak quantum nondemolition measurements. Phys. Rev. Lett. 74, 4106\u20134109 (1995). https:\/\/doi.org\/10.1103\/PhysRevLett.74.4106","journal-title":"Phys. Rev. Lett."},{"key":"5133_CR63","doi-asserted-by":"publisher","first-page":"4616","DOI":"10.1103\/PhysRevA.47.4616","volume":"47","author":"Y Aharonov","year":"1993","unstructured":"Aharonov, Y., Anandan, J., Vaidman, L.: Meaning of the wave function. Phys. Rev. A 47, 4616\u20134626 (1993). https:\/\/doi.org\/10.1103\/PhysRevA.47.4616","journal-title":"Phys. Rev. A"},{"key":"5133_CR64","doi-asserted-by":"publisher","first-page":"3424","DOI":"10.1103\/PhysRevLett.68.3424","volume":"68","author":"M Ueda","year":"1992","unstructured":"Ueda, M., Kitagawa, M.: Reversibility in quantum measurement processes. Phys. Rev. Lett. 68, 3424\u20133427 (1992). https:\/\/doi.org\/10.1103\/PhysRevLett.68.3424","journal-title":"Phys. Rev. Lett."},{"key":"5133_CR65","doi-asserted-by":"publisher","first-page":"4577","DOI":"10.1103\/PhysRevA.47.R4577","volume":"47","author":"A Imamoglu","year":"1993","unstructured":"Imamoglu, A.: Logical reversibility in quantum-nondemolition measurements. Phys. Rev. A 47, 4577\u20134580 (1993). https:\/\/doi.org\/10.1103\/PhysRevA.47.R4577","journal-title":"Phys. Rev. A"},{"key":"5133_CR66","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1103\/PhysRevLett.73.913","volume":"73","author":"A Royer","year":"1994","unstructured":"Royer, A.: Reversible quantum measurements on a spin 1\/2 and measuring the state of a single system. Phys. Rev. Lett. 73, 913\u2013917 (1994). https:\/\/doi.org\/10.1103\/PhysRevLett.73.913","journal-title":"Phys. Rev. Lett."},{"key":"5133_CR67","doi-asserted-by":"publisher","unstructured":"Cerf, N., Leuchs, G., Polzik, E.: Quantum information with continuous variables of atoms and light (2007). https:\/\/doi.org\/10.1142\/P489","DOI":"10.1142\/P489"},{"issue":"18","key":"5133_CR68","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.1080\/09500340.2016.1142018","volume":"63","author":"R Schmied","year":"2016","unstructured":"Schmied, R.: Quantum state tomography of a single qubit: comparison of methods. J. Mod. Opt. 63(18), 1744\u20131758 (2016). https:\/\/doi.org\/10.1080\/09500340.2016.1142018","journal-title":"J. Mod. Opt."},{"issue":"9","key":"5133_CR69","doi-asserted-by":"publisher","first-page":"15184","DOI":"10.1364\/oe.456597","volume":"30","author":"JC Chapman","year":"2022","unstructured":"Chapman, J.C., Lukens, J.M., Qi, B., Pooser, R.C., Peters, N.A.: Bayesian homodyne and heterodyne tomography. Opt. Express 30(9), 15184 (2022). https:\/\/doi.org\/10.1364\/oe.456597","journal-title":"Opt. Express"},{"key":"5133_CR70","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2022.128339","volume":"449","author":"N Mosco","year":"2022","unstructured":"Mosco, N., Maccone, L.: High-dimensional methods for quantum homodyne tomography. Phys. Lett. A 449, 128339 (2022). https:\/\/doi.org\/10.1016\/j.physleta.2022.128339","journal-title":"Phys. Lett. A"},{"key":"5133_CR71","doi-asserted-by":"publisher","unstructured":"Altepeter, J.B., Jeffrey, E.R., Kwiat, P.G.: Photonic state tomography. Advances In Atomic, Molecular, and Optical Physics, 52, 105\u2013159. Academic Press (2005). https:\/\/doi.org\/10.1016\/S1049-250X(05)52003-2 . https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1049250X05520032","DOI":"10.1016\/S1049-250X(05)52003-2"},{"key":"5133_CR72","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep learning. MIT Press, (2016). http:\/\/www.deeplearningbook.org"},{"issue":"3","key":"5133_CR73","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948). https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x","journal-title":"Bell Syst. Tech. J."},{"key":"5133_CR74","unstructured":"Fuchs, C.A.: Information gain vs. state disturbance in quantum theory (1996). arxiv: org\/abs\/quant-ph\/9611010"},{"key":"5133_CR75","doi-asserted-by":"crossref","unstructured":"Pigott, B., Campolongo, E., Routray, H., Khan, A.: Eavesdropping on the BB84 protocol using phase-covariant cloning: experimental results (2024). arxiv: org\/abs\/2409.16284","DOI":"10.1142\/S0219749925500285"},{"key":"5133_CR76","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.110.173601","volume":"110","author":"K Bartkiewicz","year":"2013","unstructured":"Bartkiewicz, K., Lemr, K., \u010cernoch, A., Soubusta, J., Miranowicz, A.: Experimental eavesdropping based on optimal quantum cloning. Phys. Rev. Lett. 110, 173601 (2013). https:\/\/doi.org\/10.1103\/PhysRevLett.110.173601","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"5133_CR77","doi-asserted-by":"publisher","first-page":"6072","DOI":"10.3390\/e17096072","volume":"17","author":"E Diamanti","year":"2015","unstructured":"Diamanti, E., Leverrier, A.: Distributing secret keys with quantum continuous variables: principle, security and implementations. Entropy 17(9), 6072\u20136092 (2015). https:\/\/doi.org\/10.3390\/e17096072","journal-title":"Entropy"},{"key":"5133_CR78","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145\u2013195 (2002). https:\/\/doi.org\/10.1103\/RevModPhys.74.145","journal-title":"Rev. Mod. Phys."},{"issue":"1","key":"5133_CR79","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1103\/revmodphys.81.299","volume":"81","author":"AI Lvovsky","year":"2009","unstructured":"Lvovsky, A.I., Raymer, M.G.: Continuous-variable optical quantum-state tomography. Rev. Mod. Phys. 81(1), 299\u2013332 (2009). https:\/\/doi.org\/10.1103\/revmodphys.81.299","journal-title":"Rev. Mod. Phys."},{"key":"5133_CR80","doi-asserted-by":"publisher","unstructured":"Bertolotti, M., Sibilia, C., Guzman, A.: Evanescent waves in optical waveguides, 69\u2013110. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61261-4_3","DOI":"10.1007\/978-3-319-61261-4_3"},{"issue":"12","key":"5133_CR81","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1038\/nphoton.2009.231","volume":"3","author":"AI Lvovsky","year":"2009","unstructured":"Lvovsky, A.I., Sanders, B.C., Tittel, W.: Optical quantum memory. Nat. Photonics 3(12), 706\u2013714 (2009). https:\/\/doi.org\/10.1038\/nphoton.2009.231","journal-title":"Nat. Photonics"},{"key":"5133_CR82","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005). https:\/\/doi.org\/10.1103\/PhysRevLett.94.230504","journal-title":"Phys. Rev. Lett."},{"issue":"1063\/5","key":"5133_CR83","first-page":"0179566","volume":"10","author":"Y Zhang","year":"2024","unstructured":"Zhang, Y., Bian, Y., Li, Z., Yu, S., Guo, H.: Continuous-variable quantum key distribution system: past, present, and future. Appl. Phys. Rev. 10(1063\/5), 0179566 (2024)","journal-title":"Appl. Phys. Rev."},{"issue":"1","key":"5133_CR84","doi-asserted-by":"publisher","first-page":"4740","DOI":"10.1038\/s41467-022-32161-y","volume":"13","author":"N Jain","year":"2022","unstructured":"Jain, N., Chin, H.-M., Mani, H., Lupo, C., Nikolic, D.S., Kordts, A., Pirandola, S., Pedersen, T.B., Kolb, M., \u00d6mer, B., Pacher, C., Gehring, T., Andersen, U.L.: Practical continuous-variable quantum key distribution with composable security. Nat. Commun. 13(1), 4740 (2022). https:\/\/doi.org\/10.1038\/s41467-022-32161-y","journal-title":"Nat. Commun."},{"key":"5133_CR85","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991). https:\/\/doi.org\/10.1103\/PhysRevLett.67.661","journal-title":"Phys. Rev. Lett."},{"key":"5133_CR86","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992). https:\/\/doi.org\/10.1103\/PhysRevLett.68.3121","journal-title":"Phys. Rev. Lett."},{"key":"5133_CR87","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.98.230501","volume":"98","author":"A Ac\u00edn","year":"2007","unstructured":"Ac\u00edn, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., Scarani, V.: Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007). https:\/\/doi.org\/10.1103\/PhysRevLett.98.230501","journal-title":"Phys. Rev. Lett."},{"issue":"7920","key":"5133_CR88","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1038\/s41586-022-04891-y","volume":"607","author":"W Zhang","year":"2022","unstructured":"Zhang, W., Leent, T., Redeker, K., Garthoff, R., Schwonnek, R., Fertig, F., Eppelt, S., Rosenfeld, W., Scarani, V., Lim, C.C.-W., Weinfurter, H.: A device-independent quantum key distribution system for distant users. Nature 607(7920), 687\u2013691 (2022). https:\/\/doi.org\/10.1038\/s41586-022-04891-y","journal-title":"Nature"},{"issue":"7670","key":"5133_CR89","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1038\/nature23655","volume":"549","author":"S-K Liao","year":"2017","unstructured":"Liao, S.-K., Cai, W.-Q., Liu, W.-Y., Zhang, L., Li, Y., Ren, J.-G., Yin, J., Shen, Q., Cao, Y., Li, Z.-P., Li, F.-Z., Chen, X.-W., Sun, L.-H., Jia, J.-J., Wu, J.-C., Jiang, X.-J., Wang, J.-F., Huang, Y.-M., Wang, Q., Zhou, Y.-L., Deng, L., Xi, T., Ma, L., Hu, T., Zhang, Q., Chen, Y.-A., Liu, N.-L., Wang, X.-B., Zhu, Z.-C., Lu, C.-Y., Shu, R., Peng, C.-Z., Wang, J.-Y., Pan, J.-W.: Satellite-to-ground quantum key distribution. Nature 549(7670), 43\u201347 (2017). https:\/\/doi.org\/10.1038\/nature23655","journal-title":"Nature"},{"key":"5133_CR90","unstructured":"Ecker, S., Pseiner, J., Piris, J., Bohmann, M.: Advances in entanglement-based QKD for space applications (2022). arxiv: org\/abs\/2210.02229"},{"key":"5133_CR91","doi-asserted-by":"publisher","unstructured":"Yin, J., Cao, Y., Li, Y.-H., Liao, S.-K., Zhang, L., Ren, J.-G., Cai, W.-Q., Liu, W.-Y., Li, B., Dai, H., Li, G.-B., Lu, Q.-M., Gong, Y.-H., Xu, Y., Li, S.-L., Li, F.-Z., Yin, Y.-Y., Jiang, Z.-Q., Li, M., Jia, J.-J., Ren, G., He, D., Zhou, Y.-L., Zhang, X.-X., Wang, N., Chang, X., Zhu, Z.-C., Liu, N.-L., Chen, Y.-A., Lu, C.-Y., Shu, R., Peng, C.-Z., Wang, J.-Y., Pan, J.-W.: Satellite-based entanglement distribution over 1200 kilometers. Science 356(6343), 1140\u20131144 (2017) https:\/\/doi.org\/10.1126\/science.aan3211 https:\/\/www.science.org\/doi\/pdf\/10.1126\/science.aan3211","DOI":"10.1126\/science.aan3211"},{"issue":"7841","key":"5133_CR92","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1038\/s41586-020-03093-8","volume":"589","author":"Y-A Chen","year":"2021","unstructured":"...Chen, Y.-A., Zhang, Q., Chen, T.-Y., Cai, W.-Q., Liao, S.-K., Zhang, J., Chen, K., Yin, J., Ren, J.-G., Chen, Z., Han, S.-L., Yu, Q., Liang, K., Zhou, F., Yuan, X., Zhao, M.-S., Wang, T.-Y., Jiang, X., Zhang, L., Liu, W.-Y., Li, Y., Shen, Q., Cao, Y., Lu, C.-Y., Shu, R., Wang, J.-Y., Li, L., Liu, N.-L., Xu, F., Wang, X.-B., Peng, C.-Z., Pan, J.-W.: An integrated space-to-ground quantum communication network over 4600 kilometres. Nature 589(7841), 214\u2013219 (2021). https:\/\/doi.org\/10.1038\/s41586-020-03093-8","journal-title":"Nature"},{"key":"5133_CR93","doi-asserted-by":"publisher","DOI":"10.1103\/PRXQuantum.3.020348","volume":"3","author":"V Link","year":"2022","unstructured":"Link, V., M\u00fcller, K., Lena, R.G., Luoma, K., Damanet, F., Strunz, W.T., Daley, A.J.: Non-markovian quantum dynamics in strongly coupled multimode cavities conditioned on continuous measurement. PRX Quant. 3, 020348 (2022). https:\/\/doi.org\/10.1103\/PRXQuantum.3.020348","journal-title":"PRX Quant."},{"issue":"1","key":"5133_CR94","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1038\/s41467-024-45876-x","volume":"15","author":"M Zahidy","year":"2024","unstructured":"Zahidy, M., Ribezzo, D., Lazzari, C.D., Vagniluca, I., Biagi, N., M\u00fcller, R., Occhipinti, T., Oxenl\u00f8we, L.K., Galili, M., Hayashi, T., Cassioli, D., Mecozzi, A., Antonelli, C., Zavatta, A., Bacco, D.: Practical high-dimensional quantum key distribution protocol over deployed multicore fiber. Nat. Commun. 15(1), 1651 (2024). https:\/\/doi.org\/10.1038\/s41467-024-45876-x","journal-title":"Nat. Commun."},{"issue":"9","key":"5133_CR95","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s11128-019-2368-5","volume":"18","author":"X-Y Yan","year":"2019","unstructured":"Yan, X.-Y., Zhou, N.-R., Gong, L.-H., Wang, Y.-Q., Wen, X.-J.: High-dimensional quantum key distribution based on qudits transmission with quantum fourier transform. Quant. Inf. Process. 18(9), 271 (2019). https:\/\/doi.org\/10.1007\/s11128-019-2368-5","journal-title":"Quant. Inf. Process."},{"key":"5133_CR96","doi-asserted-by":"crossref","unstructured":"Halevi, D., Lubotzky, B., Sulimany, K., Bowes, E.G., Hollingsworth, J.A., Bromberg, Y., Rapaport, R.: High-dimensional quantum key distribution using orbital angular momentum of single photons from a colloidal quantum dot at room temperature (2024). arxiv: org\/abs\/2405.03377","DOI":"10.1364\/OPTICAQ.528214"},{"key":"5133_CR97","doi-asserted-by":"publisher","unstructured":"Entropy, relative entropy, and mutual information, pp. 13\u201355. John Wiley and Sons, Ltd (2005). Chap. 2. https:\/\/doi.org\/10.1002\/047174882X.ch2 . https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/047174882X.ch2","DOI":"10.1002\/047174882X.ch2"},{"key":"5133_CR98","doi-asserted-by":"publisher","unstructured":"Kraskov, A., St\u00f6gbauer, H., Grassberger, P.: Estimating mutual information. Phys. Rev. E https:\/\/doi.org\/10.1103\/PhysRevE.69.066138","DOI":"10.1103\/PhysRevE.69.066138"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05133-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05133-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05133-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T10:44:33Z","timestamp":1774521873000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05133-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,26]]},"references-count":98,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5133"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05133-0","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,26]]},"assertion":[{"value":"2 December 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"114"}}