{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T03:10:05Z","timestamp":1746414605958,"version":"3.40.4"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,10,10]],"date-time":"2014-10-10T00:00:00Z","timestamp":1412899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s12095-014-0113-6","type":"journal-article","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T06:00:51Z","timestamp":1412834451000},"page":"163-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Masking and leakage-resilient primitives: One, the other(s) or both?"],"prefix":"10.1007","volume":"7","author":[{"given":"Sonia","family":"Bela\u00efd","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Grosso","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,10]]},"reference":[{"key":"113_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Bela\u00efd, S., Fouque, P.-A.: Leakage-resilient symmetric encryption via re-keying. In: Bertoni and Coron [4], pp. 471\u2013488","DOI":"10.1007\/978-3-642-40349-1_27"},{"key":"113_CR2","unstructured":"Bela\u00efd, S., De Santis, F., Heyszl, J., Mangard, S., Medwed, M., Schmidt, J.-M., Standaert, F.-X., Tillich, S.: Towards fresh re-keying with leakage-resilient PRFs: Cipher design principles and analysis. Cryptology ePrint Archive, Report 2013\/305 (2013). http:\/\/eprint.iacr.org\/"},{"key":"113_CR3","unstructured":"Bernstein, D.J.: Implementing \u201cpractical leakage-resilient cryptography\u201d. CHES 2012 Rump Session Talk, Leuven, Belgium (2012)"},{"key":"113_CR4","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Coron, J.-S. (eds.): Cryptographic Hardware And Embedded Systems - CHES 2013 - 15th International Workshop. Santa Barbara, CA, USA, August 20-23, 2013. Proceedings, volume 8086 of Lecture Notes in Computer Science. Springer (2013)","DOI":"10.1007\/978-3-642-40349-1"},{"key":"113_CR5","doi-asserted-by":"crossref","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener [63], pp. 398\u2013412","DOI":"10.1007\/3-540-48405-1_26"},{"key":"113_CR6","doi-asserted-by":"crossref","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski. B.S. Jr., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES, volume 2523 of Lecture Notes in Computer Science, pp 13\u201328. Springer (2002)","DOI":"10.1007\/3-540-36400-5_3"},{"key":"113_CR7","unstructured":"Common Criteria Portal. http:\/\/www.commoncriteriaportal.org\/"},{"key":"113_CR8","doi-asserted-by":"crossref","unstructured":"Coron, J.-S., Prouff, E., Rivain, M.: Side channel cryptanalysis of a higher order masking scheme. In: Paillier and Verbauwhede [38] pp. 28\u201344","DOI":"10.1007\/978-3-540-74735-2_3"},{"key":"113_CR9","unstructured":"Cryptographic Key Length Recommendation. http:\/\/www.keylength.com\/"},{"key":"113_CR10","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Pietrzak, K.: Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks. In: Rabin, T. (ed.) CRYPTO, volume 6223 of Lecture Notes in Computer Science, pp 21\u201340. Springer (2010)","DOI":"10.1007\/978-3-642-14623-7_2"},{"key":"113_CR11","doi-asserted-by":"crossref","unstructured":"Durvaux, F., Renauld, M., Standaert, F.-X., van Oldeneel tot Oldenzeel, L., Veyrat-Charvillon, N.: Efficient removal of random delays from embedded software implementations using hidden markov models. In: Mangard, S. (ed.) CARDIS, volume 7771 of Lecture Notes in Computer Science, pp 123\u2013140. Springer (2012)","DOI":"10.1007\/978-3-642-37288-9_9"},{"key":"113_CR12","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: FOCS, pp 293\u2013302. IEEE Computer Society (2008)","DOI":"10.1109\/FOCS.2008.56"},{"key":"113_CR13","doi-asserted-by":"crossref","unstructured":"Eisenbarth, T., Gong, Z., G\u00fcneysu, T. , Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X., van Oldeneel tot Oldenzeel, L.: Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, pp 172\u2013187. Springer (2012)","DOI":"10.1007\/978-3-642-31410-0_11"},{"key":"113_CR14","unstructured":"Europay Mastercard Visa. http:\/\/www.emvco.com\/"},{"key":"113_CR15","doi-asserted-by":"crossref","unstructured":"Faust, S., Pietrzak, K., Schipper, J.: Practical leakage-resilient symmetric cryptography. In: Prouff and Schaumont [46], pp. 213\u2013232","DOI":"10.1007\/978-3-642-33027-8_13"},{"key":"113_CR16","doi-asserted-by":"crossref","unstructured":"Fei, Y., Luo, Q., Ding, A.A.: A statistical model for dpa with novel algorithmic confusion analysis. In: Prouff and Schaumont [46], pp. 233\u2013250","DOI":"10.1007\/978-3-642-33027-8_14"},{"key":"113_CR17","doi-asserted-by":"crossref","unstructured":"Genelle, L., Prouff, E., Quisquater, M.: Thwarting higher-order side channel analysis with additive and multiplicative maskings. In: Preneel and Takagi [43], pp. 240\u2013255","DOI":"10.1007\/978-3-642-23951-9_16"},{"key":"113_CR18","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions (extended abstract). In: FOCS, pp. 464\u2013479, IEEE Computer Society (1984)","DOI":"10.1109\/SFCS.1984.715949"},{"key":"113_CR19","doi-asserted-by":"crossref","unstructured":"Goubin, L., Patarin, J.: Des and differential power analysis (the \u201dduplication\u201d method). In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES, volume 1717 of Lecture Notes in Computer Science, pp 158\u2013172 . Springer (1999)","DOI":"10.1007\/3-540-48059-5_15"},{"key":"113_CR20","doi-asserted-by":"crossref","unstructured":"Grosso, V., Standaert, F.-X., Faust, S.: Masking vs. multiparty computation: How large is the gap for the AES? In: Bertoni and Coron [4], pp. 400\u2013416","DOI":"10.1007\/978-3-642-40349-1_23"},{"key":"113_CR21","doi-asserted-by":"crossref","unstructured":"Herbst, C., Oswald, E., Stefan Mangard: An AES smart card implementation resistant to power analysis attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS, volume 3989 of Lecture Notes in Computer Science, pp 239\u2013252 (2006)","DOI":"10.1007\/11767480_16"},{"key":"113_CR22","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO, volume 2729 of Lecture Notes in Computer Science, pp 463\u2013481. Springer (2003)","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"113_CR23","doi-asserted-by":"crossref","unstructured":"Johansson, T., Nguyen, P.Q. (eds.): Advances in cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, volume 7881 of Lecture Notes in Computer Science. Springer (2013)","DOI":"10.1007\/978-3-642-38348-9"},{"key":"113_CR24","doi-asserted-by":"crossref","unstructured":"Joux, A. (ed.): Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, volume 5479 of Lecture Notes in Computer Science. Springer (2009)","DOI":"10.1007\/978-3-642-01001-9"},{"key":"113_CR25","unstructured":"Katashita, T., Satoh, A., Kikuchi, K., Nakagawa, H., Aoyagi, M. : Evaluation of DPA characteristics of sasebo for board level simulation. In: Huss, S., Schindler, W. (eds.) Proceedings of COSADE 2010, p. 4, Darmstadt, Germany (2011)"},{"key":"113_CR26","doi-asserted-by":"crossref","unstructured":"Kerckhof, S., Durvaux, F., Hocquet, C., Bol, D., Standaert, F.-X.: Towards green cryptography: A comparison of lightweight ciphers from the energy viewpoint. In: Prouff and Schaumont [46], pp. 390\u2013407","DOI":"10.1007\/978-3-642-33027-8_23"},{"key":"113_CR27","unstructured":"Kocher, P.C.: Leak resistant cryptographic indexed key update. US Patent 6539092"},{"key":"113_CR28","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener [68], pp. 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"key":"113_CR29","doi-asserted-by":"crossref","unstructured":"Mangard, S.: Hardware countermeasures against DPA? A statistical analysis of their effectiveness. In: Okamoto, T. (ed.) CT-RSA, volume 2964 of Lecture Notes in Computer Science, pp 222\u2013235. Springer (2004)","DOI":"10.1007\/978-3-540-24660-2_18"},{"key":"113_CR30","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer (2007)"},{"issue":"2","key":"113_CR31","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S Mangard","year":"2011","unstructured":"Mangard, S., Oswald, E., Standaert, F.-X.: One for all - all for one: unifying standard differential power analysis attacks. IET Inf. Sec. 5(2), 100\u2013110 (2011)","journal-title":"IET Inf. Sec."},{"key":"113_CR32","doi-asserted-by":"crossref","unstructured":"Mangard, S., Popp, T., Gammel, B.M.: Side-channel leakage of masked cmos gates. In: Menezes, A. (ed.) CT-RSA, volume 3376 of Lecture Notes in Computer Science, pp 351\u2013365 . Springer (2005)","DOI":"10.1007\/978-3-540-30574-3_24"},{"key":"113_CR33","doi-asserted-by":"crossref","unstructured":"Mangard, S., Pramstaller, N., Oswald, E.: Successfully attacking masked AES hardware implementations. In: Rao and Sunar [47], pp. 157\u2013171","DOI":"10.1007\/11545262_12"},{"key":"113_CR34","doi-asserted-by":"crossref","unstructured":"Medwed, M., Standaert, F.-X., Joux, A.: Towards super-exponential side-channel security with efficient leakage-resilient PRFs. In: Prouff and Schaumont [46], pp. 193\u2013212","DOI":"10.1007\/978-3-642-33027-8_12"},{"key":"113_CR35","doi-asserted-by":"crossref","unstructured":"Moradi, A., Mischke, O.: Glitch-free implementation of masking in modern FPGAs. In: HOST, pp. 89\u201395. IEEE (2012)","DOI":"10.1109\/HST.2012.6224326"},{"key":"113_CR36","doi-asserted-by":"crossref","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: A very compact and a threshold implementation of AES. In: Paterson [39], pp. 69\u201388","DOI":"10.1007\/978-3-642-20465-4_6"},{"key":"113_CR37","doi-asserted-by":"crossref","unstructured":"Oswald, E., Mangard, S., Pramstaller, N., Rijmen, V.: A side-channel analysis resistant description of the AES S-Box. In: Gilbert, H., Handschuh, H. (eds.) FSE, volume 3557 of Lecture Notes in Computer Science, pp 413\u2013423. Springer (2005)","DOI":"10.1007\/11502760_28"},{"key":"113_CR38","doi-asserted-by":"crossref","unstructured":"Paillier, P., Verbauwhede, I. (eds.): Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop. Vienna, Austria, September 10-13, 2007, Proceedings, volume 4727 of Lecture Notes in Computer Science. Springer (2007)","DOI":"10.1007\/978-3-540-74735-2"},{"key":"113_CR39","doi-asserted-by":"crossref","unstructured":"Paterson, K.G. (ed.): Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Tallinn, Estonia, May 15-19, 2011. Proceedings, volume 6632 of Lecture Notes in Computer Science. Springer (2011)","DOI":"10.1007\/978-3-642-20465-4"},{"key":"113_CR40","doi-asserted-by":"crossref","unstructured":"Peeters, E., Standaert, F.-X., Donckers, N., Quisquater, J.-J.: Improved higher-order side-channel attacks with FPGA experiments. In: Rao and Sunar [47], pp. 309\u2013323","DOI":"10.1007\/11545262_23"},{"key":"113_CR41","doi-asserted-by":"crossref","unstructured":"Pietrzak, K.: A leakage-resilient mode of operation. In: Joux [24], pp. 462\u2013482","DOI":"10.1007\/978-3-642-01001-9_27"},{"key":"113_CR42","doi-asserted-by":"crossref","unstructured":"Popp, T., Kirschbaum, M., Zefferer, T., Mangard, S.: Evaluation of the masked logic style mdpl on a prototype chip. In: Paillier and Verbauwhede [38], pp. 81\u201394","DOI":"10.1007\/978-3-540-74735-2_6"},{"key":"113_CR43","doi-asserted-by":"crossref","unstructured":"Preneel, B., Takagi, T. (eds.): Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings, volume 6917 of Lecture Notes in Computer Science. Springer (2011)","DOI":"10.1007\/978-3-642-23951-9"},{"key":"113_CR44","doi-asserted-by":"crossref","unstructured":"Prouff, E., Rivain, M.: Masking against side-channel attacks: A formal security proof. In: Johansson and Nguyen [23], pp. 142\u2013159","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"113_CR45","doi-asserted-by":"crossref","unstructured":"Prouff, E., Roche, T.: Higher-order glitches free implementation of the AES using secure multi-party computation protocols. In: Preneel and Takagi [43], pp. 63\u201378","DOI":"10.1007\/978-3-642-23951-9_5"},{"key":"113_CR46","doi-asserted-by":"crossref","unstructured":"Prouff, E., Schaumont, P.: Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings, volume 7428 of Lecture Notes in Computer Science. Springer (2012)","DOI":"10.1007\/978-3-642-33027-8"},{"key":"113_CR47","doi-asserted-by":"crossref","unstructured":"Rao, J.R., Berk Sunar (eds.): Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, volume 3659 of Lecture Notes in Computer Science. Springer (2005)","DOI":"10.1007\/11545262"},{"key":"113_CR48","unstructured":"Regazzoni, F., Yi, W., Standaert, F.-X.: FPGA implementations of the AES masked against power analysis attacks. In: Huss, S., Schindler, W. (eds.) Proceedings of COSADE 2011, pp 56-66, Darmstadt, Germany (2011)"},{"key":"113_CR49","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.-X.: Algebraic side-channel attacks. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt, volume 6151 of Lecture Notes in Computer Science, pp 393\u2013410. Springer (2009)","DOI":"10.1007\/978-3-642-16342-5_29"},{"key":"113_CR50","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N.: Algebraic side-channel attacks on the AES: Why time also matters in DPA. In: Clavier, C., Gaj, K. (eds.) CHES, volume 5747 of Lecture Notes in Computer Science, pp 97\u2013111. Springer (2009)","DOI":"10.1007\/978-3-642-04138-9_8"},{"key":"113_CR51","doi-asserted-by":"crossref","unstructured":"Renauld, M., Standaert, F.-X., Veyrat-Charvillon, N., Kamel, D., Flandre, D.: A formal study of power variability issues and side-channel attacks for nanoscale devices. In: Paterson [39], pp. 109\u2013 128","DOI":"10.1007\/978-3-642-20465-4_8"},{"key":"113_CR52","doi-asserted-by":"crossref","unstructured":"Rivain, M.: On the exact success rate of side channel analysis in the gaussian model. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) Selected Areas in Cryptography, volume 5381 of Lecture Notes in Computer Science, pp 165\u2013183. Springer (2008)","DOI":"10.1007\/978-3-642-04159-4_11"},{"key":"113_CR53","doi-asserted-by":"crossref","unstructured":"Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES, volume 6225 of Lecture Notes in Computer Science, pp 413\u2013427 . Springer (2010)","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"113_CR54","doi-asserted-by":"crossref","unstructured":"Roche, T., Prouff, E.: Higher-order glitches free implementation of the AES using secure multi-party computation protocols extended version. Cryptology ePrint Archive Report 2011\/413. http:\/\/eprint.iacr.org\/ (2011)","DOI":"10.1007\/978-3-642-23951-9_5"},{"key":"113_CR55","doi-asserted-by":"crossref","unstructured":"Schramm, K., Paar, C.: Higher order masking of the AES. In: Pointcheval, D. (ed.) CT-RSA, volume 3860 of Lecture Notes in Computer Science, pp 208\u2013225 . Springer (2006)","DOI":"10.1007\/11605805_14"},{"key":"113_CR56","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Malkin, T., Yung, M.: A unified framework for the analysis of side-channel key recovery attacks. In: Joux [24], pp. 443\u2013461","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"113_CR57","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Pereira, O., Yu, Y.: Leakage-resilient symmetric cryptography under empirically verifiable assumptions. In: Canetti, R., Garay, J.A. (eds.) CRYPTO (1), volume 8042 of Lecture Notes in Computer Science, pp 335\u2013352. Springer (2013)","DOI":"10.1007\/978-3-642-40041-4_19"},{"key":"113_CR58","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Pereira, O., Yu, Y., Quisquater, J.-J., Yung, M., Oswald, E.: Leakage resilient cryptography in practice. In: Sadeghi, A.-R., Naccache, D. (eds.) Towards Hardware-Intrinsic Security, Information Security and Cryptography, pp 99\u2013134. Springer (2010)","DOI":"10.1007\/978-3-642-14452-3_5"},{"key":"113_CR59","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The world is not enough: Another look on second-order DPA. In: Abe, M. (ed.) ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, pp 112\u2013129. Springer (2010)","DOI":"10.1007\/978-3-642-17373-8_7"},{"key":"113_CR60","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The world is not enough: Another look on second-order DPA. Cryptology ePrint Archive, Report 2010\/180. http:\/\/eprint.iacr.org\/ (2010)","DOI":"10.1007\/978-3-642-17373-8_7"},{"key":"113_CR61","doi-asserted-by":"crossref","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.-X.: Security evaluations beyond computing power. In: Johansson and Nguyen [23], pp. 126\u2013141","DOI":"10.1007\/978-3-642-38348-9_8"},{"key":"113_CR62","doi-asserted-by":"crossref","unstructured":"Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against side-channel attacks: A comprehensive study with cautionary note. In: Wang, X., Sako, K. (eds.) ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, pp 740\u2013757. Springer (2012)","DOI":"10.1007\/978-3-642-34961-4_44"},{"key":"113_CR63","doi-asserted-by":"crossref","unstructured":"Wiener, M.J. (ed.): Advances in Cryptology - CRYPTO \u201999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, volume 1666 of Lecture Notes in Computer Science. Springer (1999)","DOI":"10.1007\/3-540-48405-1"},{"key":"113_CR64","doi-asserted-by":"crossref","unstructured":"Yu, Y., Standaert, F.-X.: Practical leakage-resilient pseudorandom objects with minimum public randomness. In: Dawson, E. (ed.) CT-RSA, volume 7779 of Lecture Notes in Computer Science, pp 223\u2013238. Springer (2013)","DOI":"10.1007\/978-3-642-36095-4_15"},{"key":"113_CR65","doi-asserted-by":"crossref","unstructured":"Yu, Y., Standaert, F.-X., Pereira, O., Yung, M.: Practical leakage-resilient pseudorandom generators. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM Conference on Computer and Communications Security, pp 141\u2013151 . ACM (2010)","DOI":"10.1145\/1866307.1866324"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0113-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-014-0113-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-014-0113-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T02:38:07Z","timestamp":1746412687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-014-0113-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,10]]},"references-count":65,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["113"],"URL":"https:\/\/doi.org\/10.1007\/s12095-014-0113-6","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2014,10,10]]}}}