{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T06:01:44Z","timestamp":1771135304595,"version":"3.50.1"},"reference-count":69,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T00:00:00Z","timestamp":1770940800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"ISEA Project Phase III"},{"DOI":"10.13039\/501100008628","name":"Ministry of Electronics and Information Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100008628","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Communication is defined as the process of transferring data and exchanging information between interconnected systems. Due to the increasing reliance on digital infrastructures by the military, financial, and healthcare sectors, it is important to ensure the confidential, authentication, and tamper-proof nature of communications. In addition, the increasing need for secure communications in the fields of network security and cryptography have led to the development of numerous systems. The basic requirement of these systems is that under the same key, identical plaintexts do not result in identical ciphertexts. The most significant contribution to this requirement has came from block cipher modes. There are many traditional modes of operation such as the Electronic Code Book (ECB) compromises between simplicity and security. Probabilistic Modes such as the Cipher Block Chaining Mode (CBC) provide a method to randomize data so that the potential for pattern analysis is eliminated, while Deterministic Modes such as ECB enable potential access to the patterns within the plaintexts. Conversely, since the randomization is in the Probabilistic Mode, there is no access to the patterns; however, the sequentiality of the blocks creates dependence and increases the computing overhead. To address these issues, a novel block cipher mode that provides the highest level of security and the most effective method for performing encryption and decryption will be proposed in this paper. It is anticipated that the improved security features and efficient encryption and decryption procedures will significantly improve confidentiality. The methods proposed will utilize compact key structures, parallel processing, a header generation based on multiple random values, and a Key-derived S Box. The experimental results show that SEBCM is more effective than CBC with respect to speed in both encryption and decryption.<\/jats:p>","DOI":"10.3390\/cryptography10010013","type":"journal-article","created":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:09:32Z","timestamp":1770998972000},"page":"13","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Efficient Block Cipher Mode Design for Parallel Processing and Reliable Security"],"prefix":"10.3390","volume":"10","author":[{"given":"Valli Kumari","family":"Vatsavayi","sequence":"first","affiliation":[{"name":"Department of Computer Science and Systems Engineering, Andhra University, Visakhapatnam 530003, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6282-0694","authenticated-orcid":false,"given":"Dinesh Reddy","family":"Bommireddy","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Kakinada 533003, India"},{"name":"Department of Computer Science and Engineering, Vignan\u2019s Institute of information Technology, Visakhapatnam 530049, India"}]}],"member":"1968","published-online":{"date-parts":[[2026,2,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Paul, J., Ueno, A., Dennis, C., Alamanos, E., Curtis, L., Foroudi, P., Kacprzak, A., Kunz, W.H., Liu, J., and Marvi, R. (2024). Digital transformation: A multidisciplinary perspective and future research agenda. Int. J. Consum. Stud., 48.","DOI":"10.1111\/ijcs.13015"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.im.2008.12.007","article-title":"Information security management standards: Problems and solutions","volume":"46","author":"Siponen","year":"2009","journal-title":"Inf. Manag."},{"key":"ref_3","unstructured":"Mao, W. (2004). Modern Cryptography: Theory and Practice, Prentice Hall PTR."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A. (2018). Handbook of Applied Cryptography, CRC Press.","DOI":"10.1201\/9780429466335"},{"key":"ref_5","first-page":"2","article-title":"Comparative Analysis of Block Cipher Modes of Operation","volume":"2017","author":"Bujari","year":"2017","journal-title":"Int. Adv. Res. Eng. Congr."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Dworkin, M. (2001). Recommendation for Block Cipher Modes of Operation Methods and Techniques.","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Malozemoff, A.J., Katz, J., and Green, M.D. (2014, January 19\u201322). Automated analysis and synthesis of block-cipher modes of operation. Proceedings of the 2014 IEEE 27th Computer Security Foundations Symposium, Vienna, Austria.","DOI":"10.1109\/CSF.2014.18"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"VKumari, V., Reddy, B.D., and Raju, K. (2020, January 11\u201312). Cipher Block Parallel Mode. In Proceedings the of 2020 IEEE-HYDCON International Conference on Engineering in the 4th Industrial Revolution, HYDCON 2020, Hyderabad, India.","DOI":"10.1109\/HYDCON48903.2020.9242820"},{"key":"ref_9","unstructured":"Rogaway, P. (2011). Evaluation of Some Blockcipher Modes of Operation, Cryptography Research and Evaluation Committees."},{"key":"ref_10","unstructured":"Martin, K. (2017). Everyday Cryptography: Fundamental Principles and Applications, Oxford University Press."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Singh, S.R., Khan, A.K., and Singh, S.R. (2016, January 14\u201317). Performance evaluation of RSA and Elliptic Curve Cryptography. Proceedings of the 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), Greater Noida, India.","DOI":"10.1109\/IC3I.2016.7917979"},{"key":"ref_12","first-page":"30","article-title":"Parallelization of encryption algorithms using MPI","volume":"8","author":"Durad","year":"2019","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Manavski, S.A. (2007, January 24\u201327). CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. Proceedings of the 2007 IEEE International Conference on Signal Processing and Communications, Dubai, United Arab Emirates.","DOI":"10.1109\/ICSPC.2007.4728256"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1016\/j.icte.2025.01.006","article-title":"Parallel implementation of GCM on GPUs","volume":"11","author":"Lee","year":"2025","journal-title":"ICT Express"},{"key":"ref_15","first-page":"2962","article-title":"Efficient implementation of AES-CTR and AES-ECB on GPUs with applications for high-speed FrodoKEM and exhaustive key search","volume":"69","author":"Lee","year":"2022","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"ref_16","unstructured":"Kohl, J., and Neuman, C. (2005). RFC 4120: The Kerberos Network Authentication Service (V5), RFC."},{"key":"ref_17","unstructured":"(2010). IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices (Standard No. IEEE Std 1619-2010)."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Dworkin, M. (2007). SP 800-38D: Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC.","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"ref_19","unstructured":"McGrew, D.A., and Viega, J. (2026, January 27). The Galois\/Counter Mode of Operation (GCM). Available online: https:\/\/csrc.nist.rip\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/gcm\/gcm-spec.pdf."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Katz, J., and Lindell, Y. (2021). Introduction to Modern Cryptography, CRC Press. [3rd ed.].","DOI":"10.1201\/9781351133036"},{"key":"ref_21","first-page":"85","article-title":"Distinguishing attacks on single-pass modes of operation","volume":"14","author":"Markowitch","year":"2013","journal-title":"West. Eur. Work. Res. Cryptol. WEWoRC"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"G\u00e9rard, B., Grosso, V., Naya-Plasencia, M., and Standaert, F.-X. (2013). Block ciphers that are easier to mask: How far can we go?. Advances in Cryptology\u2014CHES 2013, Springer. Lecture Notes in Computer Science, Volume 8086.","DOI":"10.1007\/978-3-642-40349-1_22"},{"key":"ref_23","first-page":"229","article-title":"Research on Encryption Algorithm and Embedded System Optimization Strategy Based on IoT Security","volume":"14","author":"Liang","year":"2025","journal-title":"J. Mob. Multimed."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","article-title":"Selecting cryptographic key sizes","volume":"14","author":"Lenstra","year":"2001","journal-title":"J. Cryptol."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., and Vikkelsoe, C. (2007). PRESENT: An ultra-lightweight block cipher. Cryptographic Hardware and Embedded Systems\u2014CHES 2007, Springer. Lecture Notes in Computer Science, Volume 4727.","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref_26","first-page":"81","article-title":"Review paper on symmetric and asymmetric cryptographic algorithms","volume":"68","author":"Bhatt","year":"2025","journal-title":"J. Xi\u2019an Shiyou Univ. Nat. Sci. Ed."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.46586\/tosc.v2022.i2.1-42","article-title":"The DRACO Stream Cipher A Power-efficient Small-state Stream Cipher with Full Provable Security against TMDTO Attacks","volume":"2022","author":"Hamann","year":"2022","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Rogaway, P., and Shrimpton, T. (2006). Deterministic Authenticated Encryption: A Provable-Security Treatment of the Key-Wrap Problem. Advances in Cryptology\u2013CRYPTO 2006, Springer. Lecture Notes in Computer Science (LNCS), Volume 4004.","DOI":"10.1007\/11761679_23"},{"key":"ref_29","unstructured":"Whiting, D., Housley, R., and Ferguson, N. (2026, January 27). The CCM Mode for Authentication and Confidentiality. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/rfc3610."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Pietrzak, K., and Puniya, P. (2008). A new mode of operation for block ciphers and length-preserving MACs. Advances in Cryptology\u2013EUROCRYPT 2008, Springer. Lecture Notes in Computer Science, Volume 4965.","DOI":"10.1007\/978-3-540-78967-3_12"},{"key":"ref_31","unstructured":"Ferguson, N., Schneier, B., and Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications, Wiley Publishing."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Boyko, V. (1999). On the security properties of OAEP as an all-or-nothing transform. Advances in Cryptology\u2013CRYPTO 1999, Springer. Lecture Notes in Computer Science, Volume 1666.","DOI":"10.1007\/3-540-48405-1_32"},{"key":"ref_33","unstructured":"Alt\u0131nok, K.F., Peker, A., and Temizel, A. (2020). Bit-level Parallelization of 3DES Encryption on GPU. arXiv."},{"key":"ref_34","unstructured":"Bernstein, D.J., and Lange, T. (2026, January 27). eBACS: ECRYPT Benchmarking of Cryptographic Systems. Available online: http:\/\/bench.cr.yp.to."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1016\/j.micpro.2013.05.005","article-title":"A high-speed unified hardware architecture for 128 and 256-bit security levels of AES and the SHA-3 candidate Gr\u00f8stl","volume":"37","author":"Rogawski","year":"2013","journal-title":"Microprocess. Microsyst."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Sahi, A., Lai, D., and Li, Y. (2018, January 27\u201330). An Efficient Hash Based Parallel Block Cipher Mode of Operation. Proceedings of the 3rd IEEE International Conference on Computer and Communication Systems (ICCCS), Nagoya, Japan.","DOI":"10.1109\/CCOMS.2018.8463342"},{"key":"ref_37","unstructured":"Wu, H. (2026, January 15). ACORN: A Lightweight Authenticated Cipher. DIAC 2014 Technical Report. Available online: https:\/\/2014.diac.cr.yp.to\/slides\/wu-acorn.pdf."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Mouha, N., and Dworkin, M. (2024). Report on the Block Cipher Modes of Operation in the NIST SP 800-38 Series, NIST Interagency Report IR 8459.","DOI":"10.6028\/NIST.IR.8459"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Wooding, M., and Zhang, H. (2012). The security of ciphertext stealing. Fast Software Encryption (FSE 2012), Springer. Lecture Notes in Computer Science, Volume 7549.","DOI":"10.1007\/978-3-642-34047-5_11"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Markowitch, O., and Nakahara, J. (2014, January 3\u20136). Attacks on single-pass confidentiality modes of operation. Proceedings of the Symposium on Information and Computational Systems Security, Belo Horizonte, Brazil.","DOI":"10.5753\/sbseg.2014.20123"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1016\/j.chaos.2007.01.034","article-title":"Parallel image encryption algorithm based on discretized chaotic map","volume":"38","author":"Zhou","year":"2008","journal-title":"Chaos Solitons Fractals"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1142\/S0218127419500597","article-title":"Efficient Chaotic Encryption Scheme with OFB Mode","volume":"29","author":"Noura","year":"2019","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1533","DOI":"10.1016\/j.jksuci.2018.09.015","article-title":"A chaos-based probabilistic block cipher for image encryption","volume":"34","author":"Dhall","year":"2022","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Kimura, H., Isobe, T., and Ohigashi, T. (2019, January 26\u201329). Neural-network-based pseudo-random number generator evaluation tool for stream ciphers. Proceedings of the 2019 Seventh International Symposium on Computing and Networking Workshops (CANDARW), Nagasaki, Japan.","DOI":"10.1109\/CANDARW.2019.00065"},{"key":"ref_45","unstructured":"Dinu, A., Le Corre, Y., Khovratovich, D., Perrin, L., Gro\u00dfsch\u00e4dl, J., and Biryukov, A. (2015, January 20\u201321). FELICS: Fair evaluation of lightweight cryptographic systems. Proceedings of the NIST Lightweight Cryptography Workshop, Gaithersburg, ML, USA."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Gulen, U., Alkhodary, A., and Baktir, S. (2019). Implementing rsa for wireless sensor nodes. Sensors, 19.","DOI":"10.3390\/s19132864"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Frimpong, E., and Michalas, A. (2020). IoT-CryptoDiet: Implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in Contiki-NG. Proceedings of the 5th International Conference on Internet of Things, Big Data and Security (IoTBDS 2020), Science and Technology Publications (SCITEPRESS).","DOI":"10.5220\/0009405401010111"},{"key":"ref_48","unstructured":"Cui, A., and Katz, J. (2026, January 27). SPiX: A Stateless AEAD Mode for IoT Devices\u2014Specification (Round 2 Submission). NIST Lightweight Cryptography Project, Available online: https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/lightweight-cryptography\/documents\/round-2\/spec-doc-rnd2\/spix-spec-round2.pdf."},{"key":"ref_49","first-page":"363","article-title":"Chai-tea, cryptographic hardware implementations of xTEA","volume":"Volume 5365","author":"Kaps","year":"2008","journal-title":"Lecture Notes in Computer Science, Proceedings of the INDOCRYPT 2008, Kharagpur, India, 14\u201317 December 2008"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Rogaway, P. (2004). Nonce-Based Symmetric Encryption. Fast Software Encryption (FSE), Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-540-25937-4_22"},{"key":"ref_51","first-page":"235","article-title":"Nonces Are Noticed: AEAD Revisited","volume":"Volume 11692","author":"Bellare","year":"2019","journal-title":"Lecture Notes in Computer Science, Proceedings of the CRYPTO 2019, Santa Barbara, CA, USA, 18\u201322 August 2019"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Mao, S., Wang, P., Jia, Y., Liu, G., and Liu, B. (2025). Quantum Security of Nonce-Based Encryption. Entropy, 27.","DOI":"10.3390\/e27121194"},{"key":"ref_53","unstructured":"Jozsa, R. (1999). Searching in Grover\u2019s Algorithm. arXiv."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Grover, L.K. (1996, January 22\u201324). A fast quantum mechanical algorithm for database search. Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC), Philadelphia, PA, USA.","DOI":"10.1145\/237814.237866"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","article-title":"Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer","volume":"26","author":"Shor","year":"1997","journal-title":"SIAM J. Comput."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"337","DOI":"10.46586\/tosc.v2021.i1.337-377","article-title":"Provably Quantum-Secure Tweakable Block Ciphers","volume":"2021","author":"Hosoyamada","year":"2021","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"4749","DOI":"10.1109\/TIT.2009.2027487","article-title":"Efficient tweakable enciphering schemes from (block-wise) universal hash functions","volume":"55","author":"Sarkar","year":"2009","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Liskov, M., Rivest, R.L., and Wagner, D. (2002). Tweakable Block Ciphers. Advances in Cryptology\u2013CRYPTO 2002, Springer. Lecture Notes in Computer Science, Volume 2442.","DOI":"10.1007\/3-540-45708-9_3"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1","DOI":"10.46586\/tosc.v2017.i4.1-38","article-title":"Farfalle: A Parallel Permutation-Based PRF","volume":"2017","author":"Bertoni","year":"2017","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"ref_60","first-page":"208","article-title":"Cryptography from Pseudorandom Quantum States","volume":"Volume 13507","author":"Ananth","year":"2022","journal-title":"Lecture Notes in Computer Science, Proceedings of the CRYPTO 2022, Santa Barbara, CA, USA, 13\u201318 August 2022"},{"key":"ref_61","first-page":"226","article-title":"Proving more observational equivalences with ProVerif","volume":"Volume 7796","author":"Cheval","year":"2013","journal-title":"Lecture Notes in Computer Science, Proceedings of the POST 2013, Singapore, 16\u201324 March 2013"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Blanchet, B. (2006, January 21\u201324). A Computationally Sound Mechanized Prover for Security Protocols. Proceedings of the 2006 IEEE Symposium on Security and Privacy, Berkeley, CA, USA.","DOI":"10.1109\/SP.2006.1"},{"key":"ref_63","unstructured":"(2019). Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process (Standard No. NISTIR 8268)."},{"key":"ref_64","unstructured":"Bertoni, G., Daemen, J., Peeters, M., and Assche, G.V. (2015, January 15\u201320). Permutation-Based Encryption, Authentication and Authenticated Encryption. Proceedings of the Dagstuhl Seminar 2015, Wadern, Germany."},{"key":"ref_65","first-page":"534","article-title":"Security flaws induced by cbc padding\u2014Applications to SSL, IPSEC, WTLS","volume":"Volume 2332","author":"Vaudenay","year":"2002","journal-title":"Lecture Notes in Computer Science, Proceedings of the EUROCRYPT 2002, Amsterdam, The Netherlands, 28 April\u20132 May 2002"},{"key":"ref_66","first-page":"560","article-title":"Cryptanalysis of two variants of PCBC mode when used for message integrity","volume":"Volume 3574","author":"Mitchell","year":"2005","journal-title":"Lecture Notes in Computer Science, Proceedings of the ACISP 2005, Brisbane, Australia, 4\u20136 July 2005"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Vanhoef, M., and Piessens, F. (November, January 30). Key reinstallation attacks: Forcing nonce Reuse in WPA2. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3134027"},{"key":"ref_68","unstructured":"Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley. [2nd ed.]."},{"key":"ref_69","first-page":"540","article-title":"A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique","volume":"420","author":"Ahmad","year":"2014","journal-title":"Commun. Comput. Inf. Sci."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/1\/13\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T05:10:35Z","timestamp":1771132235000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/1\/13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,13]]},"references-count":69,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["cryptography10010013"],"URL":"https:\/\/doi.org\/10.3390\/cryptography10010013","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,13]]}}}