{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:59:38Z","timestamp":1771660778899,"version":"3.50.1"},"reference-count":147,"publisher":"Zhejiang University Press","issue":"12","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472357"],"award-info":[{"award-number":["61472357"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571063"],"award-info":[{"award-number":["61571063"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Open Fund of State Key Laboratory of Cryptology"},{"name":"the Major Scientific Research Project of Zhejiang Lab"},{"name":"the Alibaba-Zhejiang University Joint Institute of Frontier Technologies"}],"content-domain":{"domain":["springerlink.com","jzus.zju.edu.cn"],"crossmark-restriction":true},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1631\/fitee.1800576","type":"journal-article","created":{"date-parts":[[2019,1,10]],"date-time":"2019-01-10T00:14:06Z","timestamp":1547079246000},"page":"1475-1499","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition"],"prefix":"10.1631","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6087-8243","authenticated-orcid":false,"given":"Fan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zi-yuan","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Bo-lin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xin-jie","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Shi-ze","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2019,1,10]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-016-1104-y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1504\/ijact.2017.086223"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2741-3_4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom\/bigdatase\/icess.2017.294"},{"key":"ref5","author":"Andreeva","year":"2015","journal-title":"AES-COPA v.2. CAESAR Submission"},{"key":"ref6","article-title":"AES-COPA v.1","author":"Andreeva","year":"2016a","journal-title":"Submission to the CAESAR competition"},{"key":"ref7","article-title":"ELmD v2.1","author":"Andreeva","year":"2016b","journal-title":"CAESAR Third Round Submission"},{"key":"ref8","first-page":"35","article-title":"Crypt-analysis of MORUS","volume-title":"Int Conf on the Theory and Application of Cryptology and Information Security","author":"Ashur","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16295-9_17"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_2"},{"key":"ref11","author":"Aumasson","year":"2015","journal-title":"NORX v3.0. Submission to CAESAR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-52993-5_28"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/hst.2016.7495559"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9026-x"},{"key":"ref16","article-title":"A conventional authenticated-encryption mode","author":"Bellare","year":"2003","journal-title":"Manuscript"},{"key":"ref17","article-title":"The FFX mode of operation for format-preserving encryption","author":"Bellare","year":"2010","journal-title":"NIST Sub-mission"},{"key":"ref18","article-title":"Leakage-resilient and misuse-resistant authenticated encryption","volume-title":"IACR Cryptology ePrint Archive: Report 2016\/996","author":"Berti","year":"2016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"ref20","author":"Bertoni","year":"2015","journal-title":"Keyak v2. CAESAR Submission"},{"key":"ref21","article-title":"Ketje v2","author":"Berton","year":"2016","journal-title":"CAESAR Submission"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-017-0396-7"},{"key":"ref24","article-title":"Analysis of the NORX Core Permutation","volume-title":"IACR Cryptology ePrint Archive: Report 2017\/034","author":"Biryukov","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72565-9_20"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2016.2529618"},{"key":"ref27","first-page":"333","article-title":"Trick or tweak: on the (in)security of OTR\u2019s tweaks","volume-title":"Proc 22nd Int Conf on the Theory and Application of Cryptology and Information Se-curity","author":"Bost","year":"2016"},{"issue":"1","key":"ref28","doi-asserted-by":"crossref","first-page":"114","DOI":"10.46586\/tosc.v2016.i1.114-133","article-title":"Is AEZ v4.1 sufficiently resilient against key-recovery attacks?","author":"Chaigneau","year":"2016","journal-title":"IACR Trans Symmetr Cryptol"},{"key":"ref29","article-title":"Full key-recovery on ACORN in nonce-reuse and decryption-misuse settings","author":"Chaigneau","year":"2015","journal-title":"Posed on the Crypto-Competition Mailing List"},{"issue":"3","key":"ref30","doi-asserted-by":"crossref","first-page":"73","DOI":"10.46586\/tosc.v2017.i3.73-107","article-title":"A security analysis of deoxys and its internal tweakable block ciphers","author":"Cid","year":"2017","journal-title":"IACR Trans Symmetr Cryptol"},{"key":"ref31","article-title":"Hardware Implementation of Offset Codebook Mode3 (OCB3)","volume-title":"California State University, Sacramento, USA","author":"Clift","year":"2014"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64701-2_24"},{"key":"ref33","article-title":"Higher order differential analysis of NORX","volume-title":"IACR Cryptology ePrint Archive: Report 2015\/186","author":"Das","year":"2015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/dsd.2017.80"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.03.003"},{"key":"ref36","first-page":"74","article-title":"Differential fault analysis on Tiaoxin and AEGIS family of ciphers","volume-title":"Proc 4th Int Symp on Security in Computing and Communication","author":"Dey","year":"2016b"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_28"},{"key":"ref38","article-title":"Practical fault attacks on authenticated encryption modes for AES","volume-title":"IACR Cryptology ePrint Archive: Report 2016\/616","author":"Dobraunig","year":"2016a"},{"key":"ref39","first-page":"369","article-title":"Statistical fault attacks on nonce-based authenticated en-cryption schemes","volume-title":"Proc 22nd Int Conf on the Theory and Application of Cryptology and Information Security","author":"Dobraunig","year":"2016b"},{"key":"ref40","author":"Dobraunig","year":"2016c","journal-title":"Ascon v1.2. Submission to the CAESAR Competition"},{"issue":"1","key":"ref41","doi-asserted-by":"crossref","first-page":"80","DOI":"10.46586\/tosc.v2017.i1.80-105","article-title":"ISAP-towards side-channel secure authenticated encryption","author":"Dobraunig","year":"2017","journal-title":"IACR Trans Symmetr Cryptol"},{"issue":"1","key":"ref42","doi-asserted-by":"crossref","first-page":"259","DOI":"10.46586\/tosc.v2017.i1.259-280","article-title":"Cube-like attack on round-reduced initialization of Ketje Sr","author":"Dong","year":"2017","journal-title":"IACR Trans Symmetr Cryptol"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.5220\/0006387302370246"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.5220\/0006411502750284"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5220\/0006387302370246"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-38g"},{"key":"ref47","first-page":"78","article-title":"Implementation of authenticated encryption algorithm offset code book (OCB)","volume-title":"Proc Int Conf on Wireless Networks","author":"Ertaul","year":"2016"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2018.00014"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59870-3_2"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_21"},{"issue":"1","key":"ref51","doi-asserted-by":"crossref","first-page":"29","DOI":"10.46586\/tosc.v2018.i1.29-56","article-title":"State-recovery attacks on modified Ketje Jr","author":"Fuhr","year":"2018","journal-title":"IACR Trans Symmetr Cryptol"},{"key":"ref52","article-title":"Extended cipher block chaining encryption","author":"Gligor","year":"2016","journal-title":"Submission to NIST"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45473-x_8"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/dsd.2015.14"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2016.10.006"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_25"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24660-2_23"},{"key":"ref58","article-title":"Propagating cipher feed-back mode","volume-title":"Proc 2nd NIST Modes of Operation Workshop","author":"Hellstr\u00f6m","year":"2001"},{"key":"ref59","article-title":"AEZ v1: authenticated-encryption by enciphering","author":"Hoang","year":"2014","journal-title":"CAESAR 1st Round"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_2"},{"key":"ref61","article-title":"AEZ v4.2: authenticated encryption by enciphering","author":"Hoang","year":"2016","journal-title":"CAESAR Submission"},{"issue":"1","key":"ref62","doi-asserted-by":"crossref","first-page":"57","DOI":"10.46586\/tosc.v2018.i1.57-73","article-title":"Distinguishing attack on NORX permutation","volume":"2018","author":"Huang","year":"2018","journal-title":"IACR Trans Symmetr Cryptol"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.7838\/jsebs.2015.20.1.089"},{"key":"ref64","article-title":"SILC: simple lightweight CFB","author":"Iwata","year":"2014","journal-title":"Submission to the CAESAR Competition"},{"key":"ref65","author":"Jean","year":"2016","journal-title":"Deoxys v1.41. Submitted to CAESAR"},{"key":"ref66","first-page":"20","article-title":"Some observations on ACORN v1 and Trivia-SC","volume-title":"Lightweight Cryptography Workshop","author":"Josh","year":"2015"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_5"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_32"},{"key":"ref69","article-title":"Integrity aware cipher block chaining","author":"Jutla","year":"2016a","journal-title":"Sub-mission to NIST"},{"key":"ref70","article-title":"Integrity aware parallelizable mode","author":"Jutla","year":"2016b","journal-title":"Submission to NIST"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.5120\/ijais12-450184"},{"key":"ref72","author":"Kohno","year":"2003","journal-title":"Carter Wegman (authentication) with Counter (encryption)"},{"issue":"1","key":"ref73","first-page":"26","article-title":"Optimization of hardware implementations with high-level synthesis of authenticated encryption","volume-title":"Bull Netw Comput Syst Soft","volume":"5","author":"Kotegawa","year":"2016"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/iscas.2017.8050315"},{"key":"ref75","author":"Krovetz","year":"2016","journal-title":"OCB (v1.1)"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/iscas.2018.8351145"},{"key":"ref77","article-title":"SAT-based cryptanalysis of ACORN","volume-title":"IACR Cryptology ePrint Archive: Report 2016\/521","author":"Lafitte","year":"2016"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"175","DOI":"10.46586\/tosc.v2017.i1.175-202","article-title":"Conditional cube attack on round-reduced ASCON","volume":"1","author":"Li","year":"2017","journal-title":"IACR Trans Symmetr Cryptol"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_3"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9073-y"},{"key":"ref81","article-title":"Universal forgery and key recovery attacks: application to FKS, FKD and Keyak","volume-title":"Cryptology ePrint Archive: Report 2017\/691","author":"Liu","year":"2017"},{"key":"ref82","article-title":"Cryptanalysis of lightweight authenticated cipher ACORN","author":"Liu","year":"2014","journal-title":"Posed on the Crypto-Competition Mailing List"},{"key":"ref83","article-title":"On the security of the COPA and marble au-thenticated encryption algorithms against (almost) universal forgery attack","volume-title":"IACR Cryptology ePrint Archive: Report 2015\/079","author":"Lu","year":"2015"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052981"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ictacc.2017.17"},{"key":"ref86","article-title":"The Galois\/counter mode of operation (GCM)","author":"McGrew","year":"2004","journal-title":"Submission to NIST Modes of Operation Process"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8114"},{"key":"ref88","article-title":"Impossible differential cryptanalysis on deoxys-BC-256","volume-title":"Cryptology ePrint Archive, Report 2018\/048","author":"Mehrdad","year":"2018"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_13"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_19"},{"key":"ref91","author":"Meyers","year":"2017","journal-title":"Side channel protected Keyak on ARM cortex-M4"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29172-7_4"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13051-4_18"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_16"},{"key":"ref95","article-title":"AES-OTR v3.1. Japan Submission to CAESAR","author":"Minematsu","year":"2016","journal-title":"NEC Corporation"},{"key":"ref96","author":"Minematsu","year":"2016","journal-title":"CLOC and SILC"},{"key":"ref97","author":"Moise","year":"2011","journal-title":"EAX\u2019 Cipher Mode. NIST"},{"key":"ref98","article-title":"Applications of key recovery cube-attack-like","volume-title":"IACR Cryptology ePrint Archive: Report 2015\/1009","author":"Morawiecki","year":"2015"},{"key":"ref99","article-title":"Revisiting security claims of XLS and COPA","volume-title":"IACR Cryptology ePrint Archive: Report 2015\/444","author":"Nandi","year":"2015"},{"key":"ref100","article-title":"Tiaoxin v2.1","author":"Nikolic","year":"2016","journal-title":"CAESAR Third Round Submission"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813626"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48116-5_13"},{"key":"ref103","author":"Pub","year":"1980","journal-title":"DES Modes of Operation"},{"key":"ref104","author":"Recacha","year":"2016","journal-title":"Input and output chaining. Submission to NIST"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_2"},{"key":"ref107","article-title":"Offset codebook","author":"Rogaway","year":"2016","journal-title":"Submission to NIST"},{"key":"ref108","author":"Rogaway","year":"2007","journal-title":"The SIV mode of operation for deterministic authenticated-encryption (key wrap) and misuse-resistant nonce-based authenticated-encryption"},{"key":"ref109","article-title":"OCB Mode","author":"Rogaway","year":"2001","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref110","article-title":"Intel\u00ae Advanced Encryption Standard Instructions (AES-NI)","author":"Rott","year":"2010","journal-title":"Technical Report, Intel"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_4"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-017-0022-1"},{"key":"ref113","author":"Sadeghi","year":"2014","journal-title":"A forgery attack on AES-OTR"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom\/bigdatase\/icess.2017.337"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3167918.3167940"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2010004"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2741-3_2"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2843043.2843353"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3075564.3079067"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89339-6_6"},{"key":"ref121","article-title":"Cipher-state (CS) mode of operation for AES","author":"Schroeppel","year":"2004","journal-title":"Submission to NIST"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.2991\/aiie-16.2016.98"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2018.8300271"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71501-8_14"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_3"},{"key":"ref126","article-title":"Intrinsic Side-Channel Analysis Resistance and Efficient Masking","volume-title":"Radboud University, Nijmegen, the Netherlands","author":"Stoffelen","year":"2015"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38519-3_14"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-018-0180-2"},{"key":"ref129","article-title":"Under pressure: security of Caesar candidates beyond their guarantees","volume-title":"Cryptology ePrint Archive: Report 2017\/1147","author":"Vaudenay","year":"2017"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_44"},{"key":"ref131","article-title":"Security proof of JAMBU under nonce respecting and nonce misuse cases","volume-title":"Cryptology ePrint Archive: Report 2017\/831","author":"Wang","year":"2017"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7064131"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"ref134","author":"Wetzels","year":"2015","journal-title":"Sponges and engines: an introduction to Keccak and Keyak"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3610"},{"key":"ref136","article-title":"ACORN: a lightweight authenticated cipher (v3)","author":"Wu","year":"2016","journal-title":"Candidate for the CAESAR Competition"},{"key":"ref137","article-title":"JAMBU lightweight authenticated encryption mode and AES-JAMBU","author":"Wu","year":"2014","journal-title":"CAESAR Competition Proposal"},{"key":"ref138","author":"Wu","year":"2016","journal-title":"The authenticated cipher MORUS (v2)"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_10"},{"key":"ref140","article-title":"A Novel Approach for Flexray Protocol with Confidentiality and Authenticity","volume-title":"National University of Singapore, Singapore","author":"Xue","year":"2016"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/reconfig.2017.8279790"},{"issue":"6","key":"ref142","first-page":"536","article-title":"Research on the confusion and diffusion properties of the initialization of MORUS","volume":"2","author":"Zhang","year":"2015","journal-title":"J Cryptol Res"},{"key":"ref143","article-title":"The INT-RUP security of OCB with intermediate (Parity) checksum","volume-title":"IACR Cryptology ePrint Archive: Report 2016\/1059","author":"Zhang","year":"2016"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1601650"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0966-0"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3834685"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy044"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1800576.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1800576\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1800576.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:00:20Z","timestamp":1771657220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1800576"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":147,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1323"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1800576","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"http:\/\/orcid.org\/0000-0001-6087-8243","URL":"http","order":0,"name":"name","label":"Fan ZHANG","group":{"name":"orcid","label":"ORCID"}},{"value":"2018-09-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-17","order":2,"name":"crosschecked","label":"Crosschecked","group":{"name":"publication_history","label":"Publication History"}},{"value":"Review","order":0,"name":"content_type","group":{"name":"content_type","label":"Content Type"}},{"value":"\u00a9 Zhejiang University and Springer-Verlag GmbH Germany, part of Springer Nature 2018","order":0,"name":"copyright","group":{"name":"copyright","label":"Copyright"}}]}}