{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T13:34:24Z","timestamp":1745933664298},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T00:00:00Z","timestamp":1677715200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T00:00:00Z","timestamp":1677715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s12095-022-00622-2","type":"journal-article","created":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T15:02:52Z","timestamp":1677769372000},"page":"731-774","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Mathematical aspects of division property"],"prefix":"10.1007","volume":"15","author":[{"given":"Phil","family":"Hebborn","sequence":"first","affiliation":[]},{"given":"Gregor","family":"Leander","sequence":"additional","affiliation":[]},{"given":"Aleksei","family":"Udovenko","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,2]]},"reference":[{"key":"622_CR1","doi-asserted-by":"publisher","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE\u201994. LNCS, vol. 1008, pp. 196\u2013211. Springer. https:\/\/doi.org\/10.1007\/3-540-60590-8_16 (1995)","DOI":"10.1007\/3-540-60590-8_16"},{"key":"622_CR2","doi-asserted-by":"publisher","unstructured":"Knudsen, L.R., Wagner, D.: Integral cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS , vol. 2365, pp. 112\u2013127. Springer. https:\/\/doi.org\/10.1007\/3-540-45661-9_9 (2002)","DOI":"10.1007\/3-540-45661-9_9"},{"key":"622_CR3","doi-asserted-by":"publisher","unstructured":"Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278\u2013299. Springer. https:\/\/doi.org\/10.1007\/978-3-642-01001-9_16 (2009)","DOI":"10.1007\/978-3-642-01001-9_16"},{"key":"622_CR4","doi-asserted-by":"publisher","unstructured":"Todo, Y.: Structural evaluation by generalized integral property. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015, Part I. LNCS, vol. 9056, pp. 287\u2013314. Springer. https:\/\/doi.org\/10.1007\/978-3-662-46800-5_12 (2015)","DOI":"10.1007\/978-3-662-46800-5_12"},{"key":"622_CR5","doi-asserted-by":"publisher","unstructured":"Todo, Y.: Integral cryptanalysis on full MISTY1. In: Gennaro, R., Robshaw, M.J.B. (eds.) CRYPTO 2015, Part I. LNCS , vol. 9215, pp. 413\u2013432. Springer. https:\/\/doi.org\/10.1007\/978-3-662-47989-6_20 (2015)","DOI":"10.1007\/978-3-662-47989-6_20"},{"issue":"3","key":"622_CR6","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1007\/s00145-016-9240-x","volume":"30","author":"Y Todo","year":"2017","unstructured":"Todo, Y.: Integral cryptanalysis on full MISTY1. J. Cryptol. 30(3), 920\u2013959 (2017). https:\/\/doi.org\/10.1007\/s00145-016-9240-x","journal-title":"J. Cryptol."},{"key":"622_CR7","doi-asserted-by":"publisher","unstructured":"Todo, Y., Morii, M.: Bit-based division property and application to simon family. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 357\u2013377. Springer. https:\/\/doi.org\/10.1007\/978-3-662-52993-5_18 (2016)","DOI":"10.1007\/978-3-662-52993-5_18"},{"key":"622_CR8","doi-asserted-by":"publisher","unstructured":"Hao, Y., Leander, G., Meier, W., Todo, Y., Wang, Q.: Modeling for three-subset division property without unknown subset - improved cube attacks against Trivium and Grain-128AEAD. In: Canteaut, A., Ishai, Y. (eds.) EUROCRYPT 2020, Part I. LNCS, vol. 12105, pp. 466\u2013495. Springer. https:\/\/doi.org\/10.1007\/978-3-030-45721-1_17 (2020)","DOI":"10.1007\/978-3-030-45721-1_17"},{"issue":"3","key":"622_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s00145-021-09383-2","volume":"34","author":"Y Hao","year":"2021","unstructured":"Hao, Y., Leander, G., Meier, W., Todo, Y., Wang, Q.: Modeling for three-subset division property without unknown subset. J. Cryptol. 34(3), 22 (2021). https:\/\/doi.org\/10.1007\/s00145-021-09383-2","journal-title":"J. Cryptol."},{"key":"622_CR10","doi-asserted-by":"publisher","unstructured":"Xiang, Z., Zhang, W., Bao, Z., Lin, D.: Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers. In: Cheon, J.H. , Takagi, T. (eds.) ASIACRYPT 2016, Part I. LNCS, vol. 10031, pp. 648\u2013678. Springer. https:\/\/doi.org\/10.1007\/978-3-662-53887-6_24 (2016)","DOI":"10.1007\/978-3-662-53887-6_24"},{"key":"622_CR11","doi-asserted-by":"publisher","unstructured":"Boura, C., Canteaut, A.: Another view of the division property. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016, Part I. LNCS, vol. 9814, pp. 654\u2013682. Springer. https:\/\/doi.org\/10.1007\/978-3-662-53018-4_24 (2016)","DOI":"10.1007\/978-3-662-53018-4_24"},{"issue":"1","key":"622_CR12","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1109\/TIT.2012.2214203","volume":"59","author":"C Boura","year":"2013","unstructured":"Boura, C., Canteaut, A.: On the influence of the algebraic degree of f\u2212\u20091 on the algebraic degree of G \u2218 F. IEEE Trans. Inf. Theory 59(1), 691\u2013702 (2013)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"622_CR13","doi-asserted-by":"publisher","first-page":"226","DOI":"10.13154\/tosc.v2016.i2.226-247","volume":"2016","author":"A Biryukov","year":"2016","unstructured":"Biryukov, A., Khovratovich, D., Perrin, L.: Multiset-algebraic cryptanalysis of reduced Kuznyechik, Khazad, and secret SPNs. IACR Trans. Symm. Cryptol. 2016(2), 226\u2013247 (2016). https:\/\/doi.org\/10.13154\/tosc.v2016.i2.226-247. https:\/\/tosc.iacr.org\/index.php\/ToSC\/article\/view\/572","journal-title":"IACR Trans. Symm. Cryptol."},{"key":"622_CR14","doi-asserted-by":"publisher","unstructured":"Carlet, C.: Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions. IEEE Transactions on Information Theory, 1\u20131. https:\/\/doi.org\/10.1109\/TIT.2020.3017494 (2020)","DOI":"10.1109\/TIT.2020.3017494"},{"issue":"1","key":"622_CR15","doi-asserted-by":"publisher","first-page":"411","DOI":"10.46586\/tosc.v2021.i1.411-442","volume":"2021","author":"S Chen","year":"2021","unstructured":"Chen, S., Xiang, Z., Zeng, X., Zhang, S.: On the relationships between different methods for degree evaluation. IACR Trans. Symm. Cryptol. 2021(1), 411\u2013442 (2021). https:\/\/doi.org\/10.46586\/tosc.v2021.i1.411-442","journal-title":"IACR Trans. Symm. Cryptol."},{"key":"622_CR16","doi-asserted-by":"publisher","unstructured":"Udovenko, A.: Convexity of division property transitions: Theory, algorithms and compact models. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021, Part I. LNCS, vol. 13090, pp. 332\u2013361. Springer. https:\/\/doi.org\/10.1007\/978-3-030-92062-3_12 (2021)","DOI":"10.1007\/978-3-030-92062-3_12"},{"key":"622_CR17","doi-asserted-by":"publisher","unstructured":"Hu, K., Sun, S., Wang, M., Wang, Q.: An algebraic formulation of the division property: Revisiting degree evaluations, cube attacks, and key-independent sums. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020, Part I. LNCS, vol. 12491, pp. 446\u2013476. Springer. https:\/\/doi.org\/10.1007\/978-3-030-64837-4_15 (2020)","DOI":"10.1007\/978-3-030-64837-4_15"},{"key":"622_CR18","doi-asserted-by":"publisher","unstructured":"Carlet, C.: Boolean functions for cryptography and coding theory, Cambridge University Press. https:\/\/doi.org\/10.1017\/9781108606806 (2021)","DOI":"10.1017\/9781108606806"},{"key":"622_CR19","unstructured":"Jean, J.: TikZ for Cryptographers. https:\/\/www.iacr.org\/authors\/tikz\/"},{"key":"622_CR20","unstructured":"Shannon, C.: A mathematical theory of cryptography (1945)"},{"key":"622_CR21","doi-asserted-by":"publisher","unstructured":"Ferguson, N., Kelsey, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, D.: Improved cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS , vol. 1978, pp. 213\u2013230. Springer. https:\/\/doi.org\/10.1007\/3-540-44706-7_15 (2001)","DOI":"10.1007\/3-540-44706-7_15"},{"issue":"9","key":"622_CR22","doi-asserted-by":"publisher","first-page":"1944","DOI":"10.1587\/transfun.E98.A.1944","volume":"98-A","author":"Y Todo","year":"2015","unstructured":"Todo, Y., Aoki, K.: Fast fourier transform key recovery for integral attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A (9), 1944\u20131952 (2015)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"3","key":"622_CR23","doi-asserted-by":"publisher","first-page":"81","DOI":"10.13154\/tosc.v2019.i3.81-102","volume":"2019","author":"C-D Ye","year":"2019","unstructured":"Ye, C.-D., Tian, T.: Revisit division property based cube attacks: key-recovery or distinguishing attacks?. IACR Trans. Symm. Cryptol. 2019(3), 81\u2013102 (2019). https:\/\/doi.org\/10.13154\/tosc.v2019.i3.81-102","journal-title":"IACR Trans. Symm. Cryptol."},{"key":"622_CR24","doi-asserted-by":"publisher","unstructured":"Hebborn, P., Lambin, B., Leander, G., Todo, Y.: Lower bounds on the degree of block ciphers. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020, Part I. LNCS, vol. 12491, pp. 537\u2013566. Springer. https:\/\/doi.org\/10.1007\/978-3-030-64837-4_18 (2020)","DOI":"10.1007\/978-3-030-64837-4_18"},{"key":"622_CR25","doi-asserted-by":"publisher","unstructured":"Hebborn, P.: Security assessment and design of symmetric ciphers for emerging applications. doctoralthesis, Ruhr-Universit\u00e4t Bochum, Universit\u00e4tsbibliothek. https:\/\/doi.org\/10.13154\/294-8588 (2022)","DOI":"10.13154\/294-8588"},{"issue":"2","key":"622_CR26","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/iet-ifs.2018.5151","volume":"13","author":"W Zhang","year":"2018","unstructured":"Zhang, W., Rijmen, V.: Division cryptanalysis of block ciphers with a binary diffusion layer. IET Inf. Secur. 13(2), 87\u201395 (2018)","journal-title":"IET Inf. Secur."},{"issue":"1","key":"622_CR27","doi-asserted-by":"publisher","first-page":"396","DOI":"10.13154\/tosc.v2020.i1.396-424","volume":"2020","author":"K Hu","year":"2020","unstructured":"Hu, K., Wang, Q., Wang, M.: IACR transactions class documentation. IACR Trans. Symm. Cryptol. 2020(1), 396\u2013424 (2020). https:\/\/doi.org\/10.13154\/tosc.v2020.i1.396-424","journal-title":"IACR Trans. Symm. Cryptol."},{"key":"622_CR28","unstructured":"G\u00f6lo\u011flu, F., Rijmen, V., Wang, Q.: On the division property of S-boxes. Cryptology ePrint Archive, Report 2016\/188.(2016) https:\/\/eprint.iacr.org\/2016\/188"},{"issue":"10","key":"622_CR29","doi-asserted-by":"publisher","first-page":"2207","DOI":"10.1007\/s10623-020-00773-4","volume":"88","author":"B Lambin","year":"2020","unstructured":"Lambin, B., Derbez, P., Fouque, P. -A.: Linearly equivalent S-boxes and the division property. Des. Codes Crypt. 88(10), 2207\u20132231 (2020)","journal-title":"Des. Codes Crypt."},{"issue":"4","key":"622_CR30","doi-asserted-by":"publisher","first-page":"173","DOI":"10.46586\/tosc.v2020.i4.173-194","volume":"2020","author":"P Derbez","year":"2020","unstructured":"Derbez, P., Fouque, P.-A.: Increasing precision of division property . IACR Trans. Symm. Cryptol. 2020(4), 173\u2013194 (2020). https:\/\/doi.org\/10.46586\/tosc.v2020.i4.173-194","journal-title":"IACR Trans. Symm. Cryptol."},{"key":"622_CR31","doi-asserted-by":"publisher","unstructured":"Canteaut, A., Videau, M.: Degree of composition of highly nonlinear functions and applications to higher order differential cryptanalysis. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 518\u2013533. Springer. https:\/\/doi.org\/10.1007\/3-540-46035-7_34 (2002)","DOI":"10.1007\/3-540-46035-7_34"},{"key":"622_CR32","doi-asserted-by":"publisher","unstructured":"Boura, C., Canteaut, A.: De Canni\u00e8re, C.: Higher-order differential properties of Keccak and Luffa. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 252\u2013269. Springer. https:\/\/doi.org\/10.1007\/978-3-642-21702-9_15 (2011)","DOI":"10.1007\/978-3-642-21702-9_15"},{"key":"622_CR33","doi-asserted-by":"publisher","unstructured":"Perrin, L., Udovenko, A.: Algebraic insights into the secret Feistel network. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 378\u2013398. Springer. https:\/\/doi.org\/10.1007\/978-3-662-52993-5_19 (2016)","DOI":"10.1007\/978-3-662-52993-5_19"},{"issue":"10","key":"622_CR34","doi-asserted-by":"publisher","first-page":"6324","DOI":"10.1109\/TIT.2020.2981524","volume":"66","author":"C Carlet","year":"2020","unstructured":"Carlet, C.: Handling vectorial functions by means of their graph indicators. IEEE Trans. Inf. Theory 66(10), 6324\u20136339 (2020). https:\/\/doi.org\/10.1109\/TIT.2020.2981524","journal-title":"IEEE Trans. Inf. Theory"},{"key":"622_CR35","doi-asserted-by":"crossref","unstructured":"Lai, X.: Higher order derivatives and differential cryptanalysis. In: Communications and cryptography. the springer international series in engineering and computer science, Vol. 276, Pp. 227\u2013233. Springer (1994)","DOI":"10.1007\/978-1-4615-2694-0_23"},{"key":"622_CR36","doi-asserted-by":"publisher","unstructured":"Hebborn, P., Lambin, B., Leander, G., Todo, Y.: Strong and tight security guarantees against integral distinguishers. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021, Part I. LNCS, vol. 13090, pp. 362\u2013391. Springer. https:\/\/doi.org\/10.1007\/978-3-030-92062-3_13 (2021)","DOI":"10.1007\/978-3-030-92062-3_13"},{"key":"622_CR37","doi-asserted-by":"publisher","unstructured":"Todo, Y., Morii, M.: Compact representation for division property. In: Foresti, S., Persiano, G. (eds.) CANS 16. LNCS, vol. 10052, pp. 19\u201335. Springer. https:\/\/doi.org\/10.1007\/978-3-319-48965-0_2 (2016)","DOI":"10.1007\/978-3-319-48965-0_2"},{"key":"622_CR38","doi-asserted-by":"publisher","unstructured":"Todo, Y., Isobe, T., Hao, Y., Meier, W.: Cube attacks on non-blackbox polynomials based on division property. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017, Part III. LNCS, vol. 10403, pp. 250\u2013279. Springer. https:\/\/doi.org\/10.1007\/978-3-319-63697-9_9 (2017)","DOI":"10.1007\/978-3-319-63697-9_9"},{"key":"622_CR39","doi-asserted-by":"crossref","unstructured":"Sasaki, Y., Todo, Y.: New algorithm for modeling S-box in MILP Based Differential and division trail search. In: SECITC. Lecture Notes in Computer Science, Vol. 10543, Pp. 150\u2013165. Springer (2017)","DOI":"10.1007\/978-3-319-69284-5_11"},{"key":"622_CR40","doi-asserted-by":"publisher","unstructured":"Wang, S., Hu, B., Guan, J., Zhang, K., Shi, T.: MILP-aided method of searching division property using three subsets and applications. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019, Part III. LNCS, vol. 11923, pp. 398\u2013427. Springer. https:\/\/doi.org\/10.1007\/978-3-030-34618-8_14 (2019)","DOI":"10.1007\/978-3-030-34618-8_14"},{"issue":"1","key":"622_CR41","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1049\/iet-ifs.2018.5283","volume":"14","author":"L Sun","year":"2020","unstructured":"Sun, L., Wang, W., Wang, M.: MILP-Aided bit-based division property for primitives with non-bit-permutation linear layers. IET. Inf. Secur. 14(1), 12\u201320 (2020)","journal-title":"IET. Inf. Secur."},{"key":"622_CR42","doi-asserted-by":"publisher","unstructured":"Delaune, S., Derbez, P., Gontier, A., Prud\u2019homme, C.: A simpler model for recovering superpoly on trivium. In: AlTawy, R., H\u00fclsing, A. (eds.) SAC 2021. LNCS, vol. 13203, pp. 266\u2013285. Springer. https:\/\/doi.org\/10.1007\/978-3-030-99277-4_13 (2022)","DOI":"10.1007\/978-3-030-99277-4_13"},{"key":"622_CR43","doi-asserted-by":"publisher","unstructured":"ElSheikh, M., Youssef, A.M.: On MILP-based automatic search for bit-based division property for ciphers with (large) linear layers. In: Baek, J., Ruj, S. (eds.) ACISP 21. LNCS, vol. 13083, pp. 111\u2013131. Springer. https:\/\/doi.org\/10.1007\/978-3-030-90567-5_6 (2021)","DOI":"10.1007\/978-3-030-90567-5_6"},{"key":"622_CR44","doi-asserted-by":"publisher","unstructured":"Sun, L., Wang, W., Wang, M.: Automatic search of bit-based division property for ARX ciphers and word-based division property. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017, Part I. LNCS, vol. 10624, pp. 128\u2013157. Springer. https:\/\/doi.org\/10.1007\/978-3-319-70694-8_5 (2017)","DOI":"10.1007\/978-3-319-70694-8_5"},{"key":"622_CR45","doi-asserted-by":"publisher","unstructured":"Han, Y., Li, Y., Wang, M.: Automatical method for searching integrals of ARX block cipher with division property using three subsets. In: Naccache, D., Xu, S., Qing, S., Samarati, P., Blanc, G., Lu, R., Zhang, Z., Meddahi, A. (eds.) ICICS 18. LNCS, vol. 11149, pp. 647\u2013663. Springer. https:\/\/doi.org\/10.1007\/978-3-030-01950-1_38 (2018)","DOI":"10.1007\/978-3-030-01950-1_38"},{"key":"622_CR46","doi-asserted-by":"publisher","unstructured":"Eskandari, Z., Kidmose, A. B., K\u00f6lbl, S., Tiessen, T.: Finding integral distinguishers with ease. In: Cid, C., Jacobson Jr:, M.J. (eds.) SAC 2018. LNCS, vol. 11349, pp. 115\u2013138. Springer. https:\/\/doi.org\/10.1007\/978-3-030-10970-7_6 (2019)","DOI":"10.1007\/978-3-030-10970-7_6"},{"key":"622_CR47","doi-asserted-by":"publisher","unstructured":"Hu, K., Wang, M.: Automatic search for a variant of division property using three subsets. In: Matsui, M. (ed.) CT-RSA 2019. LNCS, vol. 11405, pp. 412\u2013432. Springer. https:\/\/doi.org\/10.1007\/978-3-030-12612-4_21 (2019)","DOI":"10.1007\/978-3-030-12612-4_21"},{"key":"622_CR48","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Dunkelman, O.: Automatic search for bit-based division property. In: LATINCRYPT. lecture notes in computer science, Vol. 12912, pp. 254\u2013274. Springer (2021)","DOI":"10.1007\/978-3-030-88238-9_13"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00622-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00622-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00622-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T09:05:11Z","timestamp":1686733511000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00622-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,2]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["622"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00622-2","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,2]]},"assertion":[{"value":"20 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work raises no ethical concerns.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Ethics approval and consent to participate"}},{"value":"All authors give consent for publication of this work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent for Publication"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Competing interests"}},{"value":"This work has no supporting data.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Availability of supporting data"}}]}}