{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:38:45Z","timestamp":1772242725198,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["805031"],"award-info":[{"award-number":["805031"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DE200101577, DP200102364, DP210102670"],"award-info":[{"award-number":["DE200101577, DP200102364, DP210102670"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485380","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"685-699","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code"],"prefix":"10.1145","author":[{"given":"Madura A.","family":"Shelton","sequence":"first","affiliation":[{"name":"University of Adelaide, Adelaide, SA, Australia"}]},{"given":"\u0141ukasz","family":"Chmielewski","sequence":"additional","affiliation":[{"name":"Radboud University and Riscure, Nijmegen, Netherlands"}]},{"given":"Niels","family":"Samwel","sequence":"additional","affiliation":[{"name":"Radboud University, Nijmegen, Netherlands"}]},{"given":"Markus","family":"Wagner","sequence":"additional","affiliation":[{"name":"University of Adelaide, Adelaide, SA, Australia"}]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[{"name":"Radboud University, Nijmegen, Netherlands"}]},{"given":"Yuval","family":"Yarom","sequence":"additional","affiliation":[{"name":"University of Adelaide, Adelaide, SA, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Jean-Philippe Aumasson L. Henzen W. Meier and R. Phan. 2009. SHA-3 proposal BLAKE."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Aydin Aysu Youssef Tobah Mohit Tiwari Andreas Gerstlauer and Michael Orshansky. 2018. Horizontal side-channel vulnerabilities of post-quantum key exchange protocols. In HOST. 81--88.","DOI":"10.1109\/HST.2018.8383894"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Josep Balasch Benedikt Gierlichs Vincent Grosso Oscar Reparaz and Fran\u00e7ois- Xavier Standaert. 2015. On the Cost of Lazy Engineering for Masked Software Implementations. In CARDIS. 64--81.","DOI":"10.1007\/978-3-319-16763-3_5"},{"key":"e_1_3_2_2_4_1","volume-title":"CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. In USENIX Security Symposium. 515--532","author":"Batina Lejla","year":"2019","unstructured":"Lejla Batina, Shivam Bhasin, Dirmanto Jap, and Stjepan Picek. 2019. CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. In USENIX Security Symposium. 515--532."},{"key":"e_1_3_2_2_5_1","volume-title":"a variant of Salsa20","author":"Bernstein Daniel","unstructured":"Daniel Bernstein. 2008. ChaCha, a variant of Salsa20."},{"key":"e_1_3_2_2_6_1","unstructured":"Daniel J Bernstein. 2005. Cache-timing attacks on AES. https:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf ."},{"key":"e_1_3_2_2_7_1","unstructured":"Guido Bertoni Joan Daemen Seth Hoffert Micha\u00ebl Peeters Gilles Van Assche and Ronny Van Keer. [n. d.]. The eXtended Keccak Code Package (XKCP). https:\/\/github.com\/XKCP\/XKCP"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Guido Bertoni Vittorio Zaccaria Luca Breveglieri Matteo Monchiero and Gianluca Palermo. 2005. AES Power Attack Based on Induced Cache Miss and Countermeasure. In ITCC. 586--591.","DOI":"10.1109\/ITCC.2005.62"},{"key":"e_1_3_2_2_9_1","volume-title":"PRESENT: An Ultra-Lightweight Block Cipher. In CHES. 450--466.","author":"Bogdanov Andrey","year":"2007","unstructured":"Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe. 2007. PRESENT: An Ultra-Lightweight Block Cipher. In CHES. 450--466."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Eric Brier Christophe Clavier and Francis Olivier. 2004. Correlation Power Analysis with a Leakage Model. In CHES. 16--29.","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_2_11_1","first-page":"497","article-title":"SoK: Design Tools for Side-Channel-Aware Implementations","volume":"2021","author":"Buhan Ileana","year":"2021","unstructured":"Ileana Buhan, Lejla Batina, Yuval Yarom, and Patrick Schaumont. 2021. SoK: Design Tools for Side-Channel-Aware Implementations. IACR Cryptol. ePrint Arch. 2021 (2021), 497.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.1983.10483115"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Suresh Chari Charanjit S. Jutla Josyula R. Rao and Pankaj Rohatgi. 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks. In CRYPTO. 398--412.","DOI":"10.1007\/3-540-48405-1_26"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Zhimin Chen Syed Haider and Patrick Schaumont. 2009. Side-Channel Leakage in Masked Circuits Caused by Higher-Order Circuit Effects. In ISA. 327--336.","DOI":"10.1007\/978-3-642-02617-1_34"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Zhimin Chen and Yujie Zhou. 2006. Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. In CHES. 242--254.","DOI":"10.1007\/11894063_20"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Thomas De Cnudde Beg\u00fcl Bilgin Oscar Reparaz Ventzislav Nikov and Svetla Nikova. 2015. Higher-Order Threshold Implementation of the AES S-Box. In CARDIS. 259--272.","DOI":"10.1007\/978-3-319-31271-2_16"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Thomas De Cnudde Oscar Reparaz Beg\u00fcl Bilgin Svetla Nikova Ventzislav Nikov and Vincent Rijmen. 2016. Masking AES With d+1 Shares in Hardware. In TIS@CCS. 43.","DOI":"10.1145\/2996366.2996428"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89641-0_5"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2018.i4.1-38"},{"key":"e_1_3_2_2_20_1","first-page":"767","article-title":"Xoodoo cookbook","volume":"2018","author":"Daemen Joan","year":"2018","unstructured":"Joan Daemen, Seth Hoffert, Gilles Van Assche, and Ronny Van Keer. 2018. Xoodoo cookbook. IACR Cryptol. ePrint Arch. 2018 (2018), 767.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_21_1","volume-title":"PINPAS: A Tool for Power Analysis of Smartcards. In IFIP SEC. 453--457.","author":"den Hartog Jerry","year":"2003","unstructured":"Jerry den Hartog, Jan Verschuren, Erik P. de Vink, Jaap de Vos, and W. Wiersma. 2003. PINPAS: A Tool for Power Analysis of Smartcards. In IFIP SEC. 453--457."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"A. Adam Ding Liwei Zhang Fran\u00e7ois Durvaux Fran\u00e7ois-Xavier Standaert and Yunsi Fei. 2017. Towards Sound and Optimal Leakage Detection Procedure. In CARDIS. 105--122.","DOI":"10.1007\/978-3-319-75208-2_7"},{"key":"e_1_3_2_2_23_1","unstructured":"Niels Ferguson Stefan Lucks Bruce Schneier Doug Whiting Mihir Bellare Tadayoshi Kohno Jon Callas and Jesse Walker. 2010. The Skein Hash Function Family. https:\/\/www.schneier.com\/academic\/skein\/"},{"key":"e_1_3_2_2_24_1","volume-title":"Electromagnetic Analysis: Concrete Results. In CHES. 251--261.","author":"Gandolfi Karine","year":"2001","unstructured":"Karine Gandolfi, Christophe Mourtel, and Francis Olivier. 2001. Electromagnetic Analysis: Concrete Results. In CHES. 251--261."},{"key":"e_1_3_2_2_25_1","first-page":"152","article-title":"Share-slicing: Friend or Foe","volume":"2020","author":"Gao Si","year":"2020","unstructured":"Si Gao, Ben Marshall, Dan Page, and Elisabeth Oswald. 2020. Share-slicing: Friend or Foe? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020, 1 (2020), 152--174.","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i2.73-98"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-016-0141-6"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","unstructured":"Daniel Genkin Lev Pachmanov Itamar Pipman Eran Tromer and Yuval Yarom. 2016. ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. In CCS. 1626--1638.","DOI":"10.1145\/2976749.2978353"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Daniel Genkin Adi Shamir and Eran Tromer. 2014. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. In CRYPTO (1). 444--461.","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_2_30_1","volume-title":"Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. , 1294 pages.","author":"Gigerl Barbara","year":"2020","unstructured":"Barbara Gigerl, Vedad Hadzic, Robert Primas, Stefan Mangard, and Roderick Bloem. 2020. Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. , 1294 pages."},{"key":"e_1_3_2_2_31_1","unstructured":"Gilbert Goodwill Benjamin Jun Josh Jaffe and Pankaj Rohatgi. 2011. A Testing Methodology for Side-Channel Resistance Validation. (2011)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Louis Goubin. 2001. A Sound Method for Switching between Boolean and Arithmetic Masking. In CHES. 3--15.","DOI":"10.1007\/3-540-44709-1_2"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-018-0191-z"},{"key":"e_1_3_2_2_34_1","unstructured":"International Organization for Standardization. 2016. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules. International Standard ISO\/IEC 17825:2016(E)."},{"key":"e_1_3_2_2_35_1","volume-title":"Wagner","author":"Ishai Yuval","year":"2003","unstructured":"Yuval Ishai, Amit Sahai, and David A. Wagner. 2003. Private Circuits: Securing Hardware against Probing Attacks. In CRYPTO. 463--481."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Paul C. Kocher. 1996. Timing Attacks on Implementations of Diffie-Hellman RSA DSS and Other Systems. In CRYPTO. 104--113.","DOI":"10.1007\/3-540-68697-5_9"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Paul C. Kocher Joshua Jaffe and Benjamin Jun. 1999. Differential Power Analysis. In CRYPTO. 388--397.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Juliane Kr\u00e4mer Dmitry Nedospasov Alexander Schl\u00f6sser and Jean-Pierre Seifert. 2013. Differential Photonic Emission Analysis. In COSADE. 1--16.","DOI":"10.1007\/978-3-642-40026-1_1"},{"key":"e_1_3_2_2_39_1","volume-title":"Massey","author":"Lai Xuejia","year":"1991","unstructured":"Xuejia Lai and James L. Massey. 1991. A Proposal for a New Block Encryption Standard. In Eurocrypt. 389--404."},{"key":"e_1_3_2_2_40_1","volume-title":"A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography. CoRR abs\/2103.14244","author":"Lou Xiaoxuan","year":"2021","unstructured":"Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, and Yinqian Zhang. 2021. A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography. CoRR abs\/2103.14244 (2021)."},{"key":"e_1_3_2_2_41_1","volume-title":"Gammel","author":"Mangard Stefan","year":"2005","unstructured":"Stefan Mangard, Thomas Popp, and Berndt M. Gammel. 2005. Side-Channel Leakage of Masked CMOS Gates. In CT-RSA. 351--365."},{"key":"e_1_3_2_2_42_1","volume-title":"USENIX Security Symposium. 199--216","author":"McCann David","year":"2017","unstructured":"David McCann, Elisabeth Oswald, and Carolyn Whitnall. 2017. Towards Practical Tools for Side Channel Aware Software Engineering: 'Grey Box' Modelling for Instruction Leakages. In USENIX Security Symposium. 199--216."},{"key":"e_1_3_2_2_43_1","volume-title":"Power Analysis Attacks and Countermeasures for Cryptographic Algorithms. Ph. D. Dissertation","author":"Messerges Thomas S.","unstructured":"Thomas S. Messerges. 2000. Power Analysis Attacks and Countermeasures for Cryptographic Algorithms. Ph. D. Dissertation. University of Illinois at Chicago, USA."},{"key":"e_1_3_2_2_44_1","volume-title":"Sloan","author":"Messerges Thomas S.","year":"1999","unstructured":"Thomas S. Messerges, Ezzy A. Dabbish, and Robert H. Sloan. 1999. Power Analysis Attacks of Modular Exponentiation in Smartcards. In CHES. 144--157."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Amir Moradi and Oliver Mischke. 2013. Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure. In ICICS. 245--258.","DOI":"10.1007\/978-3-319-02726-5_18"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.154"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.180--4"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"Svetla Nikova Christian Rechberger and Vincent Rijmen. 2006. Threshold Implementations Against Side-Channel Attacks and Glitches. In ICICS. 529--545.","DOI":"10.1007\/11935308_38"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Kostas Papagiannopoulos and Nikita Veshchikov. 2017. Mind the Gap: Towards Secure 1st-Order Masking in Software. In COSADE. 282--297.","DOI":"10.1007\/978-3-319-64647-3_17"},{"key":"e_1_3_2_2_50_1","volume-title":"Equivalence and Noninferiority Tests for Quality, Manufacturing and Test Engineers (1 ed.)","author":"Pardo Scott","unstructured":"Scott Pardo. 2013. Equivalence and Noninferiority Tests for Quality, Manufacturing and Test Engineers (1 ed.). CRC Press LLC, Philadelphia, PA."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.15"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"crossref","unstructured":"Jean-Jacques Quisquater and David Samyde. 2001. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In E-smart. 200--210.","DOI":"10.1007\/3-540-45418-7_17"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"crossref","unstructured":"Mathieu Renauld Fran\u00e7ois-Xavier Standaert Nicolas Veyrat-Charvillon Dina Kamel and Denis Flandre. 2011. A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices. In EUROCRYPT. 109--128.","DOI":"10.1007\/978-3-642-20465-4_8"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"crossref","unstructured":"Oscar Reparaz. 2016. Detecting Flawed Masking Schemes with Leakage Detection Tests. In FSE. 204--222.","DOI":"10.1007\/978-3-662-52993-5_11"},{"key":"e_1_3_2_2_55_1","volume-title":"in First Advanced Encryption Standard (AES) Conference. 16","author":"Rivest Ronald L.","unstructured":"Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. 1998. The RC6 Block Cipher. In in First Advanced Encryption Standard (AES) Conference. 16."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"Pascal Sasdrich Ren\u00e9 Bock and Amir Moradi. 2018. Threshold Implementation in Software - Case Study of PRESENT. In COSADE. 227--244.","DOI":"10.1007\/978-3-319-89641-0_13"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"Tobias Schneider and Amir Moradi. 2015. Leakage Assessment Methodology - A Clear Roadmap for Side-Channel Evaluations. In CHES. 495--513.","DOI":"10.1007\/978-3-662-48324-4_25"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01068419"},{"key":"e_1_3_2_2_59_1","volume-title":"Alenka G. Zajic, and Milos Prvulovic.","author":"Sehatbakhsh Nader","year":"2020","unstructured":"Nader Sehatbakhsh, Baki Berkay Yilmaz, Alenka G. Zajic, and Milos Prvulovic. 2020. EMSim: A Microarchitecture-Level Simulation Tool for Modeling Electro- magnetic Side-Channel Signals. In HPCA. 71--85."},{"key":"e_1_3_2_2_60_1","volume-title":"Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite. CoRR abs\/2006.15007","author":"Shahverdi Aria","year":"2020","unstructured":"Aria Shahverdi, Mahammad Shirinov, and Dana Dachman-Soled. 2020. Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite. CoRR abs\/2006.15007 (2020)."},{"key":"e_1_3_2_2_61_1","volume-title":"Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. In NDSS.","author":"Shelton Madura A.","year":"2021","unstructured":"Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, and Yuval Yarom. 2021. Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. In NDSS."},{"key":"e_1_3_2_2_62_1","volume-title":"Robust Website Fingerprinting Through the Cache Occupancy Channel. In USENIX Security Symposium. 639--656","author":"Shusterman Anatoly","year":"2019","unstructured":"Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, and Yuval Yarom. 2019. Robust Website Fingerprinting Through the Cache Occupancy Channel. In USENIX Security Symposium. 639--656."},{"key":"e_1_3_2_2_63_1","volume-title":"The Scientist and Engineer's Guide to Digital Signal Processing","author":"Smith Steven W.","unstructured":"Steven W. Smith. 1997. The Scientist and Engineer's Guide to Digital Signal Processing. California Technical Publishing, USA."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois-Xavier Standaert. 2018. How (Not) to Use Welch's T-Test in Side-Channel Security Evaluations. In CARDIS. 65--79.","DOI":"10.1007\/978-3-030-15462-2_5"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"crossref","unstructured":"Nikita Veshchikov. 2014. SILK: high level of abstraction leakage simulator for side channel analysis. In PPREW@ACSAC. 3:1--3:11.","DOI":"10.1145\/2689702.2689706"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.2307\/2332510"},{"key":"e_1_3_2_2_67_1","volume-title":"USENIX Security Symposium. 2003--2020","author":"Yan Mengjia","year":"2020","unstructured":"Mengjia Yan, Christopher W. Fletcher, and Josep Torrellas. 2020. Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures. In USENIX Security Symposium. 2003--2020."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-014-5276-4"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485380","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:48:17Z","timestamp":1763498897000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":68,"alternative-id":["10.1145\/3460120.3485380","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485380","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}