{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:27:49Z","timestamp":1772252869954,"version":"3.50.1"},"reference-count":62,"publisher":"MDPI AG","issue":"16","license":[{"start":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T00:00:00Z","timestamp":1597622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["309335\/2017-5"],"award-info":[{"award-number":["309335\/2017-5"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["UIDB\/EEA\/50008\/2020"],"award-info":[{"award-number":["UIDB\/EEA\/50008\/2020"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless sensor networks (WSNs) are the core of the Internet of Things and require cryptographic protection. Cryptographic methods for WSN should be fast and consume low power as these networks rely on battery-powered devices and microcontrollers. NTRU, the fastest and secure public key cryptosystem, uses high degree, N, polynomials and is susceptible to the lattice basis reduction attack (LBRA). Congruential public key cryptosystem (CPKC), proposed by the NTRU authors, works on integers modulo q and is easily attackable by LBRA since it uses small numbers for the sake of the correct decryption. Herein, RCPKC, a random congruential public key cryptosystem working on degree N=0 polynomials modulo q, is proposed, such that the norm of a two-dimensional vector formed by its private key is greater than q. RCPKC works as NTRU, and it is a secure version of insecure CPKC. RCPKC specifies a range from which the random numbers shall be selected, and it provides correct decryption for valid users and incorrect decryption for an attacker using LBRA by Gaussian lattice reduction. RCPKC asymmetric encryption padding (RAEP), similar to its NTRU analog, NAEP, is IND-CCA2 secure. Due to the use of big numbers instead of high degree polynomials, RCPKC is about 27 times faster in encryption and decryption than NTRU. Furthermore, RCPKC is more than three times faster than the most effective known NTRU variant, BQTRU. Compared to NTRU, RCPKC reduces energy consumption at least thirty times, which allows increasing the life-time of unattended WSNs more than thirty times.<\/jats:p>","DOI":"10.3390\/s20164632","type":"journal-article","created":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T21:58:53Z","timestamp":1597701533000},"page":"4632","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["NTRU-Like Random Congruential Public-Key Cryptosystem for Wireless Sensor Networks"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0277-9401","authenticated-orcid":false,"given":"Anas","family":"Ibrahim","sequence":"first","affiliation":[{"name":"Department of Computer Systems Engineering, Palestine Technical University\u2014Kadoorie, Tulkarm 7, Palestine"},{"name":"Department of Computer Engineering, Eastern Mediterranean University, Famagusta 99628, North Cyprus via Mersin 10, Turkey"}]},{"given":"Alexander","family":"Chefranov","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Eastern Mediterranean University, Famagusta 99628, North Cyprus via Mersin 10, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3898-1548","authenticated-orcid":false,"given":"Nagham","family":"Hamad","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Palestine Technical University\u2014Kadoorie, Tulkarm 7, Palestine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9126-376X","authenticated-orcid":false,"given":"Yousef-Awwad","family":"Daraghmi","sequence":"additional","affiliation":[{"name":"Department of Computer Systems Engineering, Palestine Technical University\u2014Kadoorie, Tulkarm 7, Palestine"}]},{"given":"Ahmad","family":"Al-Khasawneh","sequence":"additional","affiliation":[{"name":"Irbid National University, P.O. Box 2600, Irbid 21110, Jordan"},{"name":"Department of Computer Information System, Hashemite University, P.O. Box 150459, Zarqa 13115, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Federal University of Piau\u00ed, Teresina 64049-550, PI, Brazil"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, 6201-001 Covilh\u00e3, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2020,8,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","article-title":"Wireless Sensor Network Survey","volume":"52","author":"Yick","year":"2008","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1016\/j.comnet.2006.10.002","article-title":"A survey on wireless multimedia sensor networks","volume":"51","author":"Akyildiz","year":"2007","journal-title":"Comput. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3557","DOI":"10.1109\/TIE.2009.2039455","article-title":"Opportunities and Challenges of Wireless Sensor Networks in Smart Grid","volume":"57","author":"Gungor","year":"2010","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","article-title":"Data security and privacy in wireless body area networks","volume":"17","author":"Li","year":"2010","journal-title":"IEEE Wirel. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","article-title":"A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks","volume":"321","author":"He","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1109\/SURV.2012.020212.00049","article-title":"A Survey of Energy-Efficient Wireless Communications","volume":"15","author":"Feng","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","first-page":"172","article-title":"NAEP: Provable Security in the Presence of Decryption Failures","volume":"2003","author":"Silverman","year":"2003","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Howgrave-Graham, N., Silverman, J.H., and Whyte, W. (2005). Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3. Cryptographers\u2019 Track at the RSA Conference, Springer.","DOI":"10.1007\/978-3-540-30574-3_10"},{"key":"ref_9","first-page":"73","article-title":"Speed Records for NTRU","volume":"Volume 5985","author":"Pieprzyk","year":"2010","journal-title":"Proceedings of the Topics in Cryptology\u2014CT-RSA 2010, The Cryptographers\u2019 Track at the RSA Conference 2010"},{"key":"ref_10","first-page":"55","article-title":"Ticket based Secure Authentication Scheme using NTRU Cryptosystem in Wireless Sensor Network","volume":"15","author":"Kaur","year":"2017","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","article-title":"NTRU: A Ring-Based Public Key Cryptosystem","volume":"Volume 1423","author":"Buhler","year":"1998","journal-title":"Proceedings of the Algorithmic Number Theory, Third International Symposium, ANTS-III"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"42:1","DOI":"10.1145\/2700078","article-title":"On Constrained Implementation of Lattice-Based Cryptographic Primitives and Schemes on Smart Cards","volume":"14","author":"Boorghany","year":"2015","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Otjacques, B., Hitzelberger, P., Naumann, S., and Wohlgemuth, V. (2018). Smart Monitoring System of Air Quality and Wall Humidity Accompanying an Energy Efficient Renovation Process of Apartment Buildings. From Science to Society, Springer.","DOI":"10.1007\/978-3-319-65687-8"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Kalam, A., Das, S., and Sharma, K. (2018). A Novel Encryption Scheme for Secure SMS Communication. Advances in Electronics, Communication and Computing, Springer.","DOI":"10.1007\/978-981-10-4765-7"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1631\/jzus.2005.A0399","article-title":"A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications","volume":"6","author":"Jun","year":"2005","journal-title":"J. Zhejiang Univ. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/3-540-44709-1_22","article-title":"NTRU in Constrained Devices","volume":"Volume 2162","author":"Naccache","year":"2001","journal-title":"Proceedings of the Cryptographic Hardware and Embedded Systems\u2014CHES 2001, Third International Workshop"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Guillen, O.M., P\u00f6ppelmann, T., Mera, J.M.B., Bongenaar, E.F., Sigl, G., and Sep\u00falveda, J. (2017, January 27\u201331). Towards post-quantum security for IoT endpoints with NTRU. Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, DATE 2017, Lausanne, Switzerland.","DOI":"10.23919\/DATE.2017.7927079"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s13389-013-0061-7","article-title":"Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks","volume":"3","author":"Kamal","year":"2013","journal-title":"J. Cryptogr. Eng."},{"key":"ref_19","unstructured":"(2020, January 29). Sedenion. Available online: https:\/\/en.wikipedia.org\/wiki\/Sedenion."},{"key":"ref_20","first-page":"1","article-title":"BITRU: Binary Version of the NTRU Public Key Cryptosystem via Binary Algebra","volume":"7","author":"Alsaidi","year":"2016","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2345","DOI":"10.1007\/s10623-017-0451-4","article-title":"A non-commutative cryptosystem based on quaternion algebras","volume":"86","author":"Bagheri","year":"2017","journal-title":"Des. Codes Cryptogr."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/3-540-36231-2_6","article-title":"A Variant of NTRU with Non-invertible Polynomials","volume":"Volume 2551","author":"Menezes","year":"2002","journal-title":"Proceedings of the Cryptology\u2014INDOCRYPT 2002, Third International Conference on Cryptology in India"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Coglianese, M., and Goi, B. (2005, January 10\u201312). MaTRU: A New NTRU-Based Cryptosystem. Proceedings of the Cryptology\u2014INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India.","DOI":"10.1007\/11596219_19"},{"key":"ref_24","unstructured":"Gaborit, P., Ohler, J., and Sol\u00e9, P. (2020, August 14). CTRU, a Polynomial Analogue of NTRU. Technical Report, RR-4621, Inria. Available online: https:\/\/hal.inria.fr\/inria-00071964\/document."},{"key":"ref_25","first-page":"33","article-title":"ITRU: NTRU-Based Cryptosystem Using Ring of Integers","volume":"7","author":"Gaithuru","year":"2017","journal-title":"Int. J. Innov. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., and Silverman, J.H. (2014). An Introduction to Mathematical Cryptography, Springer.","DOI":"10.1007\/978-1-4939-1711-2"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s10623-013-9850-3","article-title":"ETRU: NTRU over the Eisenstein integers","volume":"74","author":"Jarvis","year":"2015","journal-title":"Des. Codes Cryptogr."},{"key":"ref_28","first-page":"549","article-title":"ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices","volume":"2015","author":"Karbasi","year":"2015","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Malekian, E., and Zakerolhosseini, A. (2010, January 23\u201324). OTRU: A non-associative and high speed public key cryptosystem. Proceedings of the 2010 15th CSI International Symposium, Computer Architecture and Digital Systems (CADS), Tehran, Iran.","DOI":"10.1109\/CADS.2010.5623536"},{"key":"ref_30","first-page":"29","article-title":"QTRU: Quaternionic version of the NTRU public-key cryptosystems","volume":"3","author":"Malekian","year":"2011","journal-title":"ISC Int. J. Inf. Secur."},{"key":"ref_31","first-page":"1447","article-title":"STRU: A Non Alternative and Multidimensional Public Key Cryptosystem","volume":"13","author":"Thakur","year":"2017","journal-title":"Glob. J. Pure Appl. Math."},{"key":"ref_32","first-page":"22","article-title":"BTRU, A Rational Polynomial Analogue of NTRU Cryptosystem","volume":"145","author":"Thakur","year":"2016","journal-title":"Int. J. Comput. Appl."},{"key":"ref_33","unstructured":"Vats, N. (2009). NNRU, a noncommutative analogue of NTRU. arXiv."},{"key":"ref_34","unstructured":"Yassein, H.R., and Al-Saidi, N.M. (June, January 31). HXDTRU Cryptosystem Based On Hexadecnion Algebra. Proceedings of the 5th International Cryptology and Information Security Conference, Kota Kinabalu, Malaysia."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Yu, Y., Xu, G., and Wang, X. (2017, January 28\u201331). Provably Secure NTRU Instances over Prime Cyclotomic Rings. Proceedings of the Public-Key Cryptography\u2014PKC 2017\u201420th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands.","DOI":"10.1007\/978-3-662-54365-8_17"},{"key":"ref_36","first-page":"4","article-title":"Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices","volume":"2013","author":"Steinfeld","year":"2013","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Gueye, C.T., Persichetti, E., Cayrel, P.L., and Buchmann, J. (2019). BI-NTRU Encryption Schemes: Two New Secure Variants of NTRU. Algebra, Codes and Cryptology, Springer International Publishing.","DOI":"10.1007\/978-3-030-36237-9"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.ins.2018.01.037","article-title":"D-NTRU: More efficient and average-case IND-CPA secure NTRU variant","volume":"438","author":"Wang","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/BF01457454","article-title":"Factoring polynomials with rational coefficients","volume":"261","author":"Lenstra","year":"1982","journal-title":"Math. Ann."},{"key":"ref_40","unstructured":"Hoffstein, J., Silverman, J.H., and Whyte, W. (2020, August 14). Estimated Breaking Times for NTRU Lattices. Technical Report #012, Version 2, NTRU Cryptosystems. Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.10.6336&rep=rep1&type=pdf."},{"key":"ref_41","unstructured":"(2009). IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices. IEEE Std 1363.1-2008, 1\u201381."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ibrahim, A., Chefranov, A., and Hamad, N. (2019, January 9\u201311). NTRU-Like Secure and Effective Congruential Public-Key Cryptosystem Using Big Numbers. Proceedings of the 2019 2nd International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan.","DOI":"10.1109\/ICTCS.2019.8923091"},{"key":"ref_43","unstructured":"Silverman, J.H., and Whyte, W. (2020, August 14). Estimating Decryption Failure Probabilities for NTRUEncrypt. Technical Report #18, Version 1, NTRU Cryptosystems. Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.3.7016&rep=rep1&type=pdf."},{"key":"ref_44","unstructured":"Smith, C. (2002). Environmental Physics, Routledge."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/B978-0-12-385512-1.00003-7","article-title":"A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems","volume":"82","author":"Beloglazov","year":"2011","journal-title":"Adv. Comput."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/TED.2007.911350","article-title":"Design in the Power-Limited Scaling Regime","volume":"55","author":"Nikolic","year":"2008","journal-title":"IEEE Trans. Electron Devices"},{"key":"ref_47","first-page":"364","article-title":"An overview of power dissipation and control techniques in cmos technology","volume":"10","author":"Romli","year":"2015","journal-title":"J. Eng. Sci. Technol."},{"key":"ref_48","unstructured":"Texas Instruments Inc. (2020, August 14). MSP430FR596x, MSP430FR594x Mixed-Signal Microcontrollers, Available online: https:\/\/www.ti.com\/lit\/ds\/symlink\/msp430fr5969.pdf."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Bourbaki, N. (2003). Topological Vector Spaces: Chapters 1\u20135, Springer. [1st ed.]. Elements of Mathematics.","DOI":"10.1007\/978-3-642-61715-7_1"},{"key":"ref_50","unstructured":"(2020, January 29). Maple. Available online: https:\/\/www.maplesoft.com."},{"key":"ref_51","unstructured":"Smeets, I., Lenstra, A., Lenstra, H., Lov\u00e1sz, L., Nguyen, P.Q., and Vall\u00e9e, B. (2010). The LLL Algorithm: Survey and Applications, Springer. [1st ed.]. Information Security and Cryptography."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/978-3-540-74143-5_9","article-title":"A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU","volume":"Volume 4622","author":"Menezes","year":"2007","journal-title":"Proceedings of the Cryptology\u2014CRYPTO 2007, 27th Annual International Cryptology Conference"},{"key":"ref_53","first-page":"3","article-title":"Choosing Parameters for NTRUEncrypt","volume":"Volume 10159","author":"Handschuh","year":"2017","journal-title":"Proceedings of the Topics in Cryptology\u2014CT-RSA 2017\u2014The Cryptographers\u2019 Track at the RSA Conference 2017"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/3-540-44598-6_2","article-title":"A Chosen-Ciphertext Attack against NTRU","volume":"Volume 1880","author":"Bellare","year":"2000","journal-title":"Proceedings of the Cryptology\u2014CRYPTO 2000, 20th Annual International Cryptology Conference"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/978-3-540-45146-4_14","article-title":"The Impact of Decryption Failures on the Security of NTRU Encryption","volume":"Volume 2729","author":"Boneh","year":"2003","journal-title":"Proceedings of the Cryptology\u2014CRYPTO 2003, 23rd Annual International Cryptology Conference"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-3-540-71677-8_7","article-title":"New Chosen-Ciphertext Attacks on NTRU","volume":"Volume 4450","author":"Okamoto","year":"2007","journal-title":"Proceedings of the Public Key Cryptography\u2014PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography"},{"key":"ref_57","unstructured":"Howgrave-Graham, N., Silverman, J.H., and Whyte, W. (2020, August 14). A Meet-in-the-Middle Attack on an NTRU Private Key; Technical Report #004, Version 2; NTRU Cryptosystems: June 2003. Available online: https:\/\/assets.onboardsecurity.com\/static\/downloads\/NTRU\/resources\/NTRUTech004v2.pdf."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Kirchner, P., and Fouque, P. (May, January 30). Revisiting Lattice Attacks on Overstretched NTRU Parameters. Proceedings of the Cryptology\u2014EUROCRYPT 2017\u201436th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France.","DOI":"10.1007\/978-3-319-56620-7_1"},{"key":"ref_59","unstructured":"Whyte, W., and Etzel, M. (2020, January 29). Open Source NTRU Public Key Cryptography Algorithm and Reference Code. Available online: https:\/\/github.com\/{NTRU}OpenSourceProject\/ntru-crypto."},{"key":"ref_60","unstructured":"Victor, S. (2020, January 29). NTL: A Library for Doing Number Theory. Available online: http:\/\/www.shoup.net\/ntl\/."},{"key":"ref_61","unstructured":"Melhem, A.I. (2020, August 05). RCPKC Implementation Using C. Available online: https:\/\/github.com\/anasnet\/RCPKC-Project."},{"key":"ref_62","unstructured":"Moore, D.S., and Kirkland, S. (2007). The Basic Practice of Statistics, WH Freeman."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/16\/4632\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:02:16Z","timestamp":1760176936000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/16\/4632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,17]]},"references-count":62,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2020,8]]}},"alternative-id":["s20164632"],"URL":"https:\/\/doi.org\/10.3390\/s20164632","relation":{"has-preprint":[{"id-type":"doi","id":"10.20944\/preprints202007.0066.v1","asserted-by":"object"}]},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,17]]}}}