{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:34:57Z","timestamp":1759638897872,"version":"3.40.5"},"reference-count":79,"publisher":"Society for Industrial & Applied Mathematics (SIAM)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIAM J. Comput."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1137\/20m1312678","type":"journal-article","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T22:07:46Z","timestamp":1646086066000},"page":"STOC19-200-STOC19-268","source":"Crossref","is-referenced-by-count":7,"title":["The Complexity of Necklace Splitting, Consensus-Halving, and Discrete Ham Sandwich"],"prefix":"10.1137","volume":"52","author":[{"given":"Aris","family":"Filos-Ratsikas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5436-7890","authenticated-orcid":true,"given":"Paul W.","family":"Goldberg","sequence":"additional","affiliation":[]}],"member":"351","published-online":{"date-parts":[[2022,2,28]]},"reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.1145\/1455248.1455249"},{"key":"atypb2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2019.09.002"},{"key":"atypb3","doi-asserted-by":"publisher","DOI":"10.1016\/0001-8708(87)90055-7"},{"key":"atypb4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511758881.003"},{"key":"atypb5","first-page":"1421","volume-title":"Proceedings of the International Congress of Mathematicians","author":"Alon N.","year":"1990"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-1986-0861764-9"},{"volume-title":"Proceedings of the 53rd ACM Symposium on Theory of Computing (STOC), 2021","year":"2012","author":"Babichenko Y.","key":"atypb7"},{"volume-title":"Strong Approximate Consensus Halving and the Borsuk-Ulam Theorem, preprint, arXiv:2103.04452","year":"2021","author":"Batziou E.","key":"atypb8"},{"key":"atypb9","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1998.1575"},{"volume-title":"Proceedings of the 32nd Computational Complexity Conference (CCC), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik","year":"2017","author":"Belovs A.","key":"atypb10"},{"volume-title":"Proceedings of the 14th ACM Symposium on Theory of Computing (STOC)","year":"1982","author":"Bhatt S. N.","key":"atypb11"},{"key":"atypb12","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2015.94"},{"key":"atypb13","doi-asserted-by":"publisher","DOI":"10.1112\/blms.12109"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2005.05.033"},{"key":"atypb15","doi-asserted-by":"publisher","DOI":"10.4064\/fm-20-1-177-190"},{"key":"atypb16","doi-asserted-by":"publisher","DOI":"10.1016\/j.apal.2012.01.015"},{"key":"atypb17","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2009.29"},{"key":"atypb18","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.07.052"},{"key":"atypb19","doi-asserted-by":"publisher","DOI":"10.1145\/1516512.1516516"},{"key":"atypb20","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746571"},{"key":"atypb21","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488632"},{"key":"atypb22","doi-asserted-by":"publisher","DOI":"10.1145\/3313276.3316400"},{"key":"atypb23","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.08.007"},{"key":"atypb24","doi-asserted-by":"publisher","DOI":"10.1137\/070699652"},{"key":"atypb25","doi-asserted-by":"publisher","DOI":"10.1145\/3188745.3188968"},{"key":"atypb26","doi-asserted-by":"publisher","DOI":"10.1090\/bull\/1653"},{"key":"atypb27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcta.2005.08.002"},{"key":"atypb28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2020.10.006"},{"key":"atypb29","doi-asserted-by":"publisher","DOI":"10.1145\/3465456.3467625"},{"key":"atypb30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2020.07.006"},{"key":"atypb31","first-page":"24","author":"Deng X.","year":"2017","journal-title":"Electronic Colloquium on Computational Complexity"},{"key":"atypb32","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1120.1116"},{"key":"atypb33","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(86)80020-7"},{"key":"atypb34","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134719"},{"key":"atypb35","doi-asserted-by":"publisher","DOI":"10.1145\/3406325.3451052"},{"key":"atypb36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2020.05.007"},{"key":"atypb37","first-page":"1","volume-title":"Proceedings of the 43rd International Symposium on Mathematical Foundations of Computer Science (MFCS), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik","author":"Filos-Ratsikas A.","year":"2018"},{"key":"atypb38","doi-asserted-by":"publisher","DOI":"10.1145\/3188745.3188880"},{"key":"atypb39","doi-asserted-by":"publisher","DOI":"10.1145\/3391403.3399527"},{"key":"atypb40","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611976465.155"},{"key":"atypb41","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(81)90027-3"},{"key":"atypb42","unstructured":"S. Garg, O. Pandey, and A. Srinivasan,On the Exact Cryptographic Hardness of Finding a Nash Equilibrium., Cryptology ePrint Archive, Report 2015\/1078, 2015."},{"key":"atypb43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_20"},{"key":"atypb44","doi-asserted-by":"publisher","DOI":"10.1137\/0606010"},{"key":"atypb45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2021.05.004"},{"key":"atypb46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2017.12.003"},{"key":"atypb47","first-page":"1","volume-title":"Proceedings of the 35th Computational Complexity Conference (CCC), S. Saraf, ed., LIPIcs 169","author":"G\u00f6\u00f6s M.","year":"2020"},{"key":"atypb48","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-013-0703-7"},{"key":"atypb49","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00152-6"},{"key":"atypb50","doi-asserted-by":"publisher","DOI":"10.1080\/00029890.1983.11971254"},{"key":"atypb51","first-page":"665","volume":"16","author":"Hobby C. R.","year":"1965","journal-title":"Proc. Amer. Math. Soc."},{"volume-title":"Proceedings of the 15th Conference on Web and Internet Economics (WINE)","year":"2019","author":"Hollender A.","key":"atypb52"},{"key":"atypb53","doi-asserted-by":"publisher","DOI":"10.1137\/17M1118014"},{"key":"atypb54","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2015.08.001"},{"key":"atypb55","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(88)90046-3"},{"key":"atypb56","first-page":"24","volume-title":"Proceedings of the Symposium on Computational Geometry","author":"Karthik C.","year":"2017"},{"key":"atypb57","doi-asserted-by":"publisher","DOI":"10.1137\/120874655"},{"key":"atypb58","first-page":"649","volume-title":"Proceedings of the 28th Symposium on Theoretical Aspects of Computer Science (STACS)","author":"Knauer C.","year":"2011"},{"key":"atypb59","first-page":"539","volume-title":"Proceedings of the 24th Symposium on Theory of Computing (STOC), ACM","author":"Lo C. Y.","year":"1992"},{"key":"atypb60","doi-asserted-by":"publisher","DOI":"10.1007\/BF02574017"},{"key":"atypb61","doi-asserted-by":"publisher","DOI":"10.1145\/197405.197408"},{"key":"atypb62","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0039-7"},{"key":"atypb63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76649-0"},{"volume-title":"A note on the complexity of P-matrix LCP and computing an equilibrium","year":"1988","author":"Megiddo N.","key":"atypb64"},{"key":"atypb65","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(91)90200-L"},{"key":"atypb66","doi-asserted-by":"publisher","DOI":"10.1137\/15M1032338"},{"key":"atypb67","doi-asserted-by":"publisher","DOI":"10.1287\/moor.1080.0311"},{"key":"atypb68","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2014.01.008"},{"key":"atypb69","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2012.01.014"},{"key":"atypb70","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2008.06.017"},{"key":"atypb71","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(05)80063-7"},{"key":"atypb72","doi-asserted-by":"publisher","DOI":"10.1007\/s00373-007-0716-1"},{"key":"atypb73","doi-asserted-by":"publisher","DOI":"10.1137\/15M1039274"},{"volume-title":"Proceedings of the 8th Innovations in Theoretical Computer Science Conference (ITCS), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik","year":"2017","author":"Schuldenzucker S.","key":"atypb74"},{"key":"atypb75","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-4896(02)00087-2"},{"key":"atypb76","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00023"},{"key":"atypb77","doi-asserted-by":"publisher","DOI":"10.1215\/S0012-7094-42-00925-6"},{"key":"atypb78","first-page":"286","volume-title":"Proceedings of the 1st Canadian Mathematical Congress","author":"Tucker A. W.","year":"1945"},{"key":"atypb79","first-page":"58","author":"Vazirani V. V.","year":"2011","journal-title":"J. ACM"}],"container-title":["SIAM Journal on Computing"],"original-title":[],"language":"en","deposited":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T19:59:00Z","timestamp":1682711940000},"score":1,"resource":{"primary":{"URL":"https:\/\/epubs.siam.org\/doi\/10.1137\/20M1312678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,28]]},"references-count":79,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4,30]]}},"alternative-id":["10.1137\/20M1312678"],"URL":"https:\/\/doi.org\/10.1137\/20m1312678","relation":{},"ISSN":["0097-5397","1095-7111"],"issn-type":[{"type":"print","value":"0097-5397"},{"type":"electronic","value":"1095-7111"}],"subject":[],"published":{"date-parts":[[2022,2,28]]}}}