{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T15:03:29Z","timestamp":1767971009513,"version":"3.49.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T00:00:00Z","timestamp":1652227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T00:00:00Z","timestamp":1652227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s12095-022-00571-w","type":"journal-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T16:08:38Z","timestamp":1652285318000},"page":"1145-1177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Multi-user BBB security of public permutations based MAC"],"prefix":"10.1007","volume":"14","author":[{"given":"Yu Long","family":"Chen","sequence":"first","affiliation":[]},{"given":"Avijit","family":"Dutta","sequence":"additional","affiliation":[]},{"given":"Mridul","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,11]]},"reference":[{"key":"571_CR1","unstructured":"L\u00e1szl\u00f3, B.: The fourier transform and equations over finite abelian groups (lecture notes, version 1.3) (2002)"},{"key":"571_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Bernstein, D.J., Tessaro, S.: Hash-function based prfs: AMAC and its multi-user security. In: Fischlin, M., Coron, J.-S. (eds.) Advances in Cryptology -EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, vol. 9665 of Lecture Notes in Computer Science, pp 566\u2013595. Springer (2016)","DOI":"10.1007\/978-3-662-49890-3_22"},{"key":"571_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting Security proofs and improvements. In: Preneel, B. (ed.) Advances in Cryptology -EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, vol. 1807 of Lecture Notes in Computer Science, pp 259\u2013274. Springer (2000)","DOI":"10.1007\/3-540-45539-6_18"},{"key":"571_CR4","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th Annual Symposium on Foundations of Computer Science, Miami Beach, Florida, USA, FOCS \u201997, October 19-22, 1997, pp 394\u2013403. IEEE Computer Society (1997)"},{"key":"571_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Bj\u00f6rn, T: The multi-user security of authenticated encryption: AES-GCM in TLS 1.3. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I, vol. 9814 of Lecture Notes in Computer Science, pp 247\u2013276. Springer (2016)","DOI":"10.1007\/978-3-662-53018-4_10"},{"key":"571_CR6","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Ko\u0307lbl, S., Lucks, S., Massolino, P.M.C., Mendel, F., Nawaz, K., Schneider, T., Schwabe, P., Standaert, F.-X., Todo, Y., Viguier, B.: Gimli: A cross-platform permutation. In: Proceedings Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, pp 299\u2013320 (2017)","DOI":"10.1007\/978-3-319-66787-4_15"},{"key":"571_CR7","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Keccak. In: Proceedings Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, pp 313\u2013314 (2013)","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"571_CR8","first-page":"1188","volume":"2016","author":"G Bertoni","year":"2016","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Van Keer, R.: Farfalle: parallel permutation-based cryptography. IACR Cryptol. ePrint Arch. 2016, 1188 (2016)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"571_CR9","first-page":"602","volume":"2020","author":"A Bhattarcharjee","year":"2020","unstructured":"Bhattarcharjee, A., Dutta, A., List, E., Nandi, M.: CENCPP - beyond-birthday-secure encryption from public permutations. IACR Cryptol. ePrint Arch. 2020, 602 (2020)","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"3","key":"571_CR10","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S0020-0190(02)00269-7","volume":"84","author":"E Biham","year":"2002","unstructured":"Biham, E.: How to decrypt or even substitute des-encrypted messages in 228 steps. Inf. Process. Lett. 84(3), 117\u2013124 (2002)","journal-title":"Inf. Process. Lett."},{"key":"571_CR11","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Mukhopadhyay, S., Sarkar, P.: Improved time-memory trade-offs with multiple data. In: Preneel, B, Tavares, S.E. (eds.) Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, vol. 3897 of Lecture Notes in Computer Science, pp 110\u2013127. Springer (2005)","DOI":"10.1007\/11693383_8"},{"key":"571_CR12","doi-asserted-by":"crossref","unstructured":"Black, J., Rogaway, P.: A block-cipher mode of operation for parallelizable message authentication. In: Knudsen, L.R. (ed.) Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, vol. 2332 of Lecture Notes in Computer Science, pp 384\u2013397. Springer (2002)","DOI":"10.1007\/3-540-46035-7_25"},{"key":"571_CR13","unstructured":"Bo\u0307ck, H., Zauner, A., Devlin, S., Somorovsky, J., Jovanovic, P.: Nonce-disrespecting adversaries: Practical forgery attacks on GCM in TLS. In: 10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016 (2016)"},{"issue":"10","key":"571_CR14","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TC.2012.196","volume":"62","author":"A Bogdanov","year":"2013","unstructured":"Bogdanov, A., Knezevic, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: SPONGENT: the design space of lightweight cryptographic hashing. IEEE Trans. Comput. 62(10), 2041\u20132053 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"571_CR15","doi-asserted-by":"crossref","unstructured":"Bose, P., Hoang, V.T., Tessaro, S.: Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds. In: 2018 Proceedings, Part I Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, pp 468\u2013499 (2018)","DOI":"10.1007\/978-3-319-78381-9_18"},{"issue":"2","key":"571_CR16","doi-asserted-by":"publisher","first-page":"218","DOI":"10.46586\/tches.v2018.i2.218-241","volume":"2018","author":"A Chakraborti","year":"2018","unstructured":"Chakraborti, A., Datta, N., Nandi, M., Yasuda, K.: Beetle family of lightweight and secure authenticated encryption ciphers. IACR Trans. Cryptogr. Hardw. E. Syst. 2018(2), 218\u2013241 (2018)","journal-title":"IACR Trans. Cryptogr. Hardw. E. Syst."},{"issue":"2","key":"571_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2020.i2.1-39","volume":"2020","author":"A Chakraborti","year":"2020","unstructured":"Chakraborti, A., Nandi, M., Talnikar, S., Yasuda, K.: On the composition of single-keyed tweakable even-mansour for achieving BBB security. IACR Trans. Symmetric Cryptol. 2020(2), 1\u201339 (2020)","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"2","key":"571_CR18","doi-asserted-by":"publisher","first-page":"93","DOI":"10.46586\/tosc.v2020.i2.93-119","volume":"2020","author":"B Chakraborty","year":"2020","unstructured":"Chakraborty, B., Jha, A., Nandi, M.: On the security of sponge-type authenticated encryption modes. IACR Trans. Symmetric Cryptol. 2020 (2), 93\u2013119 (2020)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"571_CR19","unstructured":"Chatterjee, S., Menezes, A., Sarkar, P.: Another look at tightness. In: Miri, A., Vaudenay, S. (eds.) Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers, vol. 7118 of Lecture Notes in Computer Science, pp 293\u2013319. Springer (2011)"},{"key":"571_CR20","doi-asserted-by":"crossref","unstructured":"Long Chen, Y u, Lambooij, E., Mennink, B.: How to build pseudorandom functions from public random permutations. In: Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part I, pp 266\u2013293 (2019)","DOI":"10.1007\/978-3-030-26948-7_10"},{"key":"571_CR21","doi-asserted-by":"crossref","unstructured":"Choi, W., Lee, ByeongHak, Lee, Y., Lee, J.: Improved security analysis for nonce-based enhanced hash-then-mask macs. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I, vol. 12491 of Lecture Notes in Computer Science, pp 697\u2013723. Springer (2020)","DOI":"10.1007\/978-3-030-64837-4_23"},{"key":"571_CR22","doi-asserted-by":"crossref","unstructured":"Cogliati, B., Seurin, S.: EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC. In: CRYPTO 2016, Proceedings, Part I, pp 121\u2013149 (2016)","DOI":"10.1007\/978-3-662-53018-4_5"},{"issue":"12","key":"571_CR23","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1007\/s10623-018-0470-9","volume":"86","author":"B Cogliati","year":"2018","unstructured":"Cogliati, B., Seurin, Y.: Analysis of the single-permutation encrypted davies-meyer construction. Des. Codes Cryptogr. 86(12), 2703\u20132723 (2018)","journal-title":"Des. Codes Cryptogr."},{"key":"571_CR24","doi-asserted-by":"crossref","unstructured":"Daemen, J., Mennink, B., Assche, G.V.: Full-state keyed duplex with built-in multi-user support. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II, vol. 10625 of Lecture Notes in Computer Science, pp 606\u2013637. Springer (2017)","DOI":"10.1007\/978-3-319-70697-9_21"},{"issue":"3","key":"571_CR25","doi-asserted-by":"publisher","first-page":"36","DOI":"10.46586\/tosc.v2018.i3.36-92","volume":"2018","author":"N Datta","year":"2018","unstructured":"Datta, N., Dutta, A., Nandi, M., Paul, G.: Double-block hash-then-sum: A paradigm for constructing bbb secure prf. IACR Trans. Symmetric Cryptol. 2018(3), 36\u201392 (2018)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"571_CR26","doi-asserted-by":"crossref","unstructured":"Datta, N., Dutta, A., Nandi, M., Yasuda, K.: Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC. In: Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I, pp 631\u2013661 (2018)","DOI":"10.1007\/978-3-319-96884-1_21"},{"key":"571_CR27","doi-asserted-by":"crossref","unstructured":"Datta, N., Dutta, A., Nandi, M., Yasuda, K.: Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based mac. Cryptology ePrint Archive Report 2018\/500 (2018)","DOI":"10.1007\/978-3-319-96884-1_21"},{"issue":"4","key":"571_CR28","doi-asserted-by":"publisher","first-page":"705","DOI":"10.3934\/amc.2019042","volume":"13","author":"N Datta","year":"2019","unstructured":"Datta, N., Dutta, A., Nandi, M., Yasuda, K.: sfdwcdm+: A BBB secure nonce based MAC. Adv. Math. Commun. 13(4), 705\u2013732 (2019)","journal-title":"Adv. Math. Commun."},{"issue":"3","key":"571_CR29","doi-asserted-by":"publisher","first-page":"130","DOI":"10.46586\/tosc.v2017.i3.130-150","volume":"2017","author":"A Dutta","year":"2017","unstructured":"Dutta, A., Jha, A., Nandi, M.: Tight security analysis of EHTM MAC. IACR Trans. Symmetric Cryptol. 2017(3), 130\u2013150 (2017)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"571_CR30","doi-asserted-by":"crossref","unstructured":"Dutta, A., Nandi, M.: BBB secure nonce based MAC using public permutations. In: Nitaj, A., Youssef, A.M. (eds.) Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings, vol. 12174 of Lecture Notes in Computer Science, pp 172\u2013191. Springer (2020)","DOI":"10.1007\/978-3-030-51938-4_9"},{"key":"571_CR31","doi-asserted-by":"crossref","unstructured":"Dutta, A., Nandi, M., Talnikar, S.: Beyond birthday bound secure MAC in faulty nonce model. In: Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I, pp 437\u2013466 (2019)","DOI":"10.1007\/978-3-030-17653-2_15"},{"key":"571_CR32","doi-asserted-by":"crossref","unstructured":"Dutta, A., Nandi, M., Talnikar, S.: Permutation based edm: An inverse free bbb secure prf. Cryptology ePrint Archive Report 2021\/679 (2021)","DOI":"10.46586\/tosc.v2021.i2.31-70"},{"issue":"3","key":"571_CR33","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s001459900025","volume":"10","author":"S Even","year":"1997","unstructured":"Even, S., Mansour, Y.: A construction of a cipher from a single pseudorandom permutation. J. Crypt. 10(3), 151\u2013162 (1997)","journal-title":"J. Crypt."},{"key":"571_CR34","doi-asserted-by":"crossref","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings, pp 222\u2013239 (2011)","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"571_CR35","doi-asserted-by":"crossref","unstructured":"Hoang, V.T., Tessaro, S.: Key-alternating ciphers and key-length extension: Exact bounds and multi-user security. In: Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I, pp 3\u201332 (2016)","DOI":"10.1007\/978-3-662-53018-4_1"},{"key":"571_CR36","unstructured":"Hoang, V.T., Tessaro, S.: The multi-user security of double encryption. In: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II, pp 381\u2013411 (2017)"},{"key":"571_CR37","doi-asserted-by":"crossref","unstructured":"Luykx, A., Mennink, B., Paterson, K.G: Analyzing multi-key security degradation. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II, vol. 10625 of Lecture Notes in Computer Science, pp 575\u2013605. Springer (2017)","DOI":"10.1007\/978-3-319-70697-9_20"},{"key":"571_CR38","doi-asserted-by":"crossref","unstructured":"Luykx, A., Preneel, B., Tischhauser, E., Yasuda, K.: AMACmode for lightweight block ciphers. In: Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, pp 43\u201359 (2016)","DOI":"10.1007\/978-3-662-52993-5_3"},{"key":"571_CR39","doi-asserted-by":"crossref","unstructured":"Kazuhiko, M.: How to thwart birthday attacks against macs via small randomness. In: Fast Software Encryption, FSE 2010, pp 230\u2013249 (2010)","DOI":"10.1007\/978-3-642-13858-4_13"},{"key":"571_CR40","doi-asserted-by":"crossref","unstructured":"Minematsu, K., blockcipher, Tetsu Iwata.: Building blockcipher from tweakable Extending FSE 2009 proposal. In: Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011, Proceedings, pp 391\u2013412 (2011)","DOI":"10.1007\/978-3-642-25516-8_24"},{"key":"571_CR41","doi-asserted-by":"crossref","unstructured":"Morgan, A., Pass, R., Shi, E.: On the adaptive security of macs and prfs. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I, vol. 12491 of Lecture Notes in Computer Science, pp 724\u2013753. Springer (2020)","DOI":"10.1007\/978-3-030-64837-4_24"},{"key":"571_CR42","doi-asserted-by":"crossref","unstructured":"Mouha, N., Luykx, A.: Multi-key security: The even-mansour construction revisited. In: Gennaro, R., Robshaw, M. (eds.) Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, vol. 9215 of Lecture Notes in Computer Science, pp 209\u2013223. Springer (2015)","DOI":"10.1007\/978-3-662-47989-6_10"},{"key":"571_CR43","doi-asserted-by":"crossref","unstructured":"Nandi, M.: Mind the composition: Birthday bound attacks on EWCDMD and sokac21. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology -EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part I, vol. 12105 of Lecture Notes in Computer Science, pp 203\u2013220. Springer (2020)","DOI":"10.1007\/978-3-030-45721-1_8"},{"issue":"2","key":"571_CR44","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1515\/JMC.2008.007","volume":"2","author":"M Nandi","year":"2008","unstructured":"Nandi, M., Mandal, A.: Improved security analysis of PMAC. J. Math Cryptol. 2(2), 149\u2013162 (2008)","journal-title":"J. Math Cryptol."},{"key":"571_CR45","unstructured":"Jacques, P.: The \u201ccoefficients h\u201d technique. In: Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers, pp 328\u2013345 (2008)"},{"key":"571_CR46","unstructured":"John, P.: Steinberger. Counting solutions to additive equations in random sets. arXiv:abs\/1309.5582 (2013)"},{"issue":"3","key":"571_CR47","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"N Mark","year":"1981","unstructured":"Mark, N.: Wegman and Larry Carter. New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265\u2013279 (1981)","journal-title":"J. Comput. Syst. Sci."},{"key":"571_CR48","doi-asserted-by":"crossref","unstructured":"Shen, Y., Wang, L., Weng, J.: Revisiting the security of dbhts macs: Beyond-birthday-bound in the multi-user setting. Cryptology ePrint Archive Report 2020\/1523 (2020)","DOI":"10.1007\/978-3-030-84252-9_11"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00571-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00571-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00571-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T12:06:35Z","timestamp":1727179595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00571-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,11]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["571"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00571-w","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,11]]},"assertion":[{"value":"14 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}