iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/S12095-022-00587-2
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T11:31:44Z","timestamp":1715340704973},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T00:00:00Z","timestamp":1653004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T00:00:00Z","timestamp":1653004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100006475","name":"Bergens Forskningsstiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006475","id-type":"DOI","asserted-by":"publisher"}]},{"name":"University of Bergen"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2023,1]]},"abstract":"Abstract<\/jats:title>We define the class of triplicate functions as a generalization of 3-to-1 functions over $$\\mathbb {F}_{2^{n}}$$<\/jats:tex-math>\n \n F<\/mml:mi>\n \n 2<\/mml:mn>\n n<\/mml:mi>\n <\/mml:msup>\n <\/mml:msub>\n <\/mml:math><\/jats:alternatives><\/jats:inline-formula> for even values of n<\/jats:italic>. We investigate the properties and behavior of triplicate functions, and of 3-to-1 among triplicate functions, with particular attention to the conditions under which such functions can be APN. We compute the exact number of distinct differential sets of power APN functions and quadratic 3-to-1 functions; we show that, in this sense, quadratic 3-to-1 functions are a generalization of quadratic power APN functions for even dimensions, in the same way that quadratic APN permutations are generalizations of quadratic power APN functions for odd dimensions. We show that quadratic 3-to-1 APN functions cannot be CCZ-equivalent to permutations in the case of doubly-even dimensions. We compute a lower bound on the Hamming distance between any two quadratic 3-to-1 APN functions, and give an upper bound on the number of such functions over $$\\mathbb {F}_{2^{n}}$$<\/jats:tex-math>\n \n F<\/mml:mi>\n \n 2<\/mml:mn>\n n<\/mml:mi>\n <\/mml:msup>\n <\/mml:msub>\n <\/mml:math><\/jats:alternatives><\/jats:inline-formula> for any even n<\/jats:italic>. We survey all known infinite families of APN functions with respect to the presence of 3-to-1 functions among them, and conclude that for even n<\/jats:italic> almost all of the known infinite families contain functions that are quadratic 3-to-1 or are EA-equivalent to quadratic 3-to-1 functions. We also give a simpler univariate representation in the case of singly-even dimensions of the family recently introduced by G\u00f6loglu than the ones currently available in the literature. We conduct a computational search for quadratic 3-to-1 functions in even dimensions n<\/jats:italic> \u2264\u200912. We find six new APN instances for n<\/jats:italic> =\u200910, and the first sporadic APN instance for n<\/jats:italic> =\u200912 since 2006. We provide a list of all known 3-to-1 APN functions for n<\/jats:italic> \u2264\u200912.<\/jats:p>","DOI":"10.1007\/s12095-022-00587-2","type":"journal-article","created":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T01:02:45Z","timestamp":1653008565000},"page":"35-83","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Triplicate functions"],"prefix":"10.1007","volume":"15","author":[{"given":"Lilya","family":"Budaghyan","sequence":"first","affiliation":[]},{"given":"Ivana","family":"Ivkovic","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9695-1454","authenticated-orcid":false,"given":"Nikolay","family":"Kaleyski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,20]]},"reference":[{"key":"587_CR1","unstructured":"Daemen, J., Rijmen, V: AES proposal: Rijndael (1999)"},{"key":"587_CR2","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael, vol. 2. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"issue":"1","key":"587_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3\u201372 (1991)","journal-title":"J. Cryptol."},{"issue":"3","key":"587_CR4","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s10623-014-0022-x","volume":"78","author":"C Carlet","year":"2016","unstructured":"Carlet, C., Gong, G., Tan, Y.: Quadratic zero-difference balanced functions, APN functions and strongly regular graphs. Des. Codes Crypt. 78(3), 629\u2013654 (2016)","journal-title":"Des. Codes Crypt."},{"key":"587_CR5","unstructured":"K\u00f6lsch, L., Kriepke, B., Kyureghyan, G.M.: Image sets of perfectly nonlinear maps. arXiv:2012.00870 (2020)"},{"key":"587_CR6","doi-asserted-by":"crossref","unstructured":"Dinur, I., Shamir, A.: Breaking Grain-128 with dynamic cube attacks. In: International Workshop on Fast Software Encryption, pp 167\u2013187. Springer (2011)","DOI":"10.1007\/978-3-642-21702-9_10"},{"key":"587_CR7","doi-asserted-by":"crossref","unstructured":"Knudsen, L.R.: Truncated and higher order differentials. In: International Workshop on Fast Software Encryption, pp 196\u2013211. Springer (1994)","DOI":"10.1007\/3-540-60590-8_16"},{"key":"587_CR8","unstructured":"Salagean, A.: Discrete antiderivatives for functions over fpn (2019)"},{"key":"587_CR9","unstructured":"Weng, G., Tan, Y., Gong, G.: On quadratic almost perfect nonlinear functions and their related algebraic object. In: Workshop on Coding and Cryptography, pp 57\u201368. Citeseer (2013)"},{"key":"587_CR10","unstructured":"Yu, Y., Wang, M., Li, Y.: A matrix approach for constructing quadratic APN functions Cryptology ePrint report 2013\/007 (2013)"},{"issue":"2","key":"587_CR11","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s10623-014-9955-3","volume":"73","author":"Y Yu","year":"2014","unstructured":"Yu, Y., Wang, M., Li, Y.: A matrix approach for constructing quadratic APN functions. Des. Codes Crypt. 73(2), 587\u2013600 (2014)","journal-title":"Des. Codes Crypt."},{"issue":"9","key":"587_CR12","doi-asserted-by":"publisher","first-page":"5742","DOI":"10.1109\/TIT.2020.2983684","volume":"66","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Carlet, C., Helleseth, T., Kaleyski, N.: On the distance between APN functions. IEEE Trans. Inf. Theory 66(9), 5742\u20135753 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"587_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume":"765","author":"K Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially uniform mappings for cryptography. Lect. Notes Comput. Sci 765, 55\u201364 (1994)","journal-title":"Lect. Notes Comput. Sci"},{"key":"587_CR14","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s10623-008-9194-6","volume":"49","author":"M Brinkmann","year":"2008","unstructured":"Brinkmann, M., Leander, G.: On the classification of APN functions up to dimension five. Des. Codes Crypt. 49, 273\u2013288 (2008)","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"587_CR15","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3934\/amc.2009.3.59","volume":"3","author":"Y Edel","year":"2009","unstructured":"Edel, Y., Pott, A.: A new almost perfect nonlinear function which is not quadratic. Adv. Math. Commun. 3(1), 59\u201381 (2009)","journal-title":"Adv. Math. Commun."},{"key":"587_CR16","doi-asserted-by":"crossref","unstructured":"Kyureghyan, G.M.M.: Crooked maps in $$\\mathbb {F}_{2^{n}}$$. Finite Fields Appl. 13(3), 713\u2013726 (2007)","DOI":"10.1016\/j.ffa.2006.03.003"},{"key":"587_CR17","doi-asserted-by":"crossref","unstructured":"Canteaut, A., Couvreur, A., Perrin, L.: Recovering or testing extended-affine equivalence. arXiv:2103.00078 (2021)","DOI":"10.1109\/TIT.2022.3166692"},{"key":"587_CR18","doi-asserted-by":"crossref","unstructured":"Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: Workshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT 94, vol. 950, pp 356\u2013365 (1994)","DOI":"10.1007\/BFb0053450"},{"issue":"2","key":"587_CR19","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/BF01388412","volume":"3","author":"C Carlet","year":"1993","unstructured":"Carlet, C.: Partially-bent functions. Des. Codes Crypt. 3(2), 135\u2013145 (1993)","journal-title":"Des. Codes Crypt."},{"key":"587_CR20","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Zhang, X.-M.: Plateaued functions. In: ICICS \u201999 Proceedings of the Second International Conference on Information and Communication Security (1999)","DOI":"10.1007\/978-3-540-47942-0_24"},{"issue":"2","key":"587_CR21","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1008344232130","volume":"15","author":"C Carlet","year":"1998","unstructured":"Carlet, C., Charpin, P., Zinoviev, V.A.: Codes, bent functions and permutations suitable for DES-like cryptosystems. Des. Codes Crypt. 15(2), 125\u2013156 (1998)","journal-title":"Des. Codes Crypt."},{"issue":"3","key":"587_CR22","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1109\/TIT.2005.864481","volume":"52","author":"L Budaghyan","year":"2006","unstructured":"Budaghyan, L., Carlet, C., Pott, A.: New classes of almost bent and almost perfect nonlinear polynomials. IEEE Trans. Inf. Theory 52(3), 1141\u20131152 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"587_CR23","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s10801-011-0309-1","volume":"35","author":"S Yoshiara","year":"2012","unstructured":"Yoshiara, S.: Equivalences of quadratic APN functions. J. Algebraic Comb. 35(3), 461\u2013475 (2012)","journal-title":"J. Algebraic Comb."},{"key":"587_CR24","first-page":"135","volume":"34","author":"K Browning","year":"2009","unstructured":"Browning, K., Dillon, J., McQuistan, M., Wolfe, A.: APN polynomials and related codes. Spec. Vol. J. Comb. Inf. Syst. Sci. 34, 135\u2013159 (2009)","journal-title":"Spec. Vol. J. Comb. Inf. Syst. Sci."},{"key":"587_CR25","unstructured":"Edel, D., Pott, A.: On the equivalence of nonlinear functions. In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, vol. 23, pp 87\u2013103. IOS Press (2009)"},{"key":"587_CR26","unstructured":"Kaleyski, N.: Deciding EA-equivalence via invariants. In Cryptography and Communications, to appear"},{"key":"587_CR27","doi-asserted-by":"crossref","unstructured":"Kaleyski, N.S.: Invariants for EA-and CCZ-equivalence of APN and AB functions.\u00a0Cryptogr. Commun\u00a013(6), 995\u20131023 (2021)","DOI":"10.1007\/s12095-021-00541-8"},{"key":"587_CR28","unstructured":"Encyclopedia of Boolean functions. https:\/\/boolean.h.uib.no\/mediawiki\/index.php\/Main_Page"},{"key":"587_CR29","doi-asserted-by":"crossref","unstructured":"Calderini, M., Budaghyan, L., Carlet, C.: On known constructions of APN and AB functions and their relation to each other. Rad HAZU, Matemati\u010dke znanosti, 2021. to appear","DOI":"10.21857\/ygjwrcdkgy"},{"issue":"9","key":"587_CR30","doi-asserted-by":"publisher","first-page":"4218","DOI":"10.1109\/TIT.2008.928275","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inf. Theory 54(9), 4218\u20134229 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"587_CR31","doi-asserted-by":"publisher","first-page":"2354","DOI":"10.1109\/TIT.2008.920246","volume":"54","author":"L Budaghyan","year":"2008","unstructured":"Budaghyan, L., Carlet, C.: Classes of quadratic APN trinomials and hexanomials and related structures. IEEE Trans. Inf. Theory 54(5), 2354\u20132357 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"587_CR32","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ffa.2008.10.001","volume":"15","author":"L Budaghyan","year":"2009","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: Constructing new APN functions from known ones. Finite Fields Appl. 15(2), 150\u2013159 (2009)","journal-title":"Finite Fields Appl."},{"key":"587_CR33","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Carlet, C., Leander, G.: On a construction of quadratic APN functions. In: 2009 IEEE Information Theory Workshop, pp 374\u2013378 (2009)","DOI":"10.1109\/ITW.2009.5351383"},{"issue":"1","key":"587_CR34","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s12095-010-0038-7","volume":"3","author":"C Bracken","year":"2011","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: A few more quadratic APN functions. Cryptogr. Commun. 3(1), 43\u201353 (2011)","journal-title":"Cryptogr. Commun."},{"key":"587_CR35","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.aim.2012.10.014","volume":"234","author":"Y Zhou","year":"2013","unstructured":"Zhou, Y., Pott, A.: A new family of semifields with 2 parameters. Adv. Math. 234, 43\u201360 (2013)","journal-title":"Adv. Math."},{"issue":"8","key":"587_CR36","doi-asserted-by":"publisher","first-page":"5299","DOI":"10.1109\/TIT.2020.2974471","volume":"66","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Calderini, M., Carlet, C., Coulter, R.S., Villa, I.: Constructing APN functions through isotopic shifts. IEEE Trans. Inf. Theory 66(8), 5299\u20135309 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"587_CR37","doi-asserted-by":"crossref","unstructured":"Taniguchi, H.: On some quadratic APN functions. Des. Codes Crypt., pp. 1\u201311 (2019)","DOI":"10.1007\/s10623-018-00598-2"},{"issue":"11","key":"587_CR38","doi-asserted-by":"publisher","first-page":"7081","DOI":"10.1109\/TIT.2020.3007513","volume":"66","author":"L Budaghyan","year":"2020","unstructured":"Budaghyan, L., Helleseth, T., Kaleyski, N.: A new family of APN quadrinomials. IEEE Trans. Inf. Theory 66(11), 7081\u20137087 (2020)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"587_CR39","doi-asserted-by":"crossref","unstructured":"Zheng, L., Kan, H., Li, Y., Peng, J., Tang, D.: Constructing new APN functions through relative trace functions. arXiv:2101.11535 (2021)","DOI":"10.1109\/TIT.2022.3186899"},{"key":"587_CR40","doi-asserted-by":"crossref","unstructured":"Carlet, C.: Boolean functions for cryptography and coding theory. Cambridge University Press (2021)","DOI":"10.1017\/9781108606806"},{"issue":"12","key":"587_CR41","doi-asserted-by":"publisher","first-page":"8325","DOI":"10.1109\/TIT.2021.3114958","volume":"67","author":"C Carlet","year":"2021","unstructured":"Carlet, C.: Bounds on the nonlinearity of differentially uniform functions by means of their image set size, and on their distance to affine functions. IEEE Trans. Inf. Theory 67(12), 8325\u20138334 (2021)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"587_CR42","first-page":"705","volume":"2020","author":"I Czerwinski","year":"2020","unstructured":"Czerwinski, I.: On the minimal value set size of APN functions. IACR Cryptol. ePrint Arch. 2020, 705 (2020)","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"11","key":"587_CR43","doi-asserted-by":"publisher","first-page":"6272","DOI":"10.1109\/TIT.2015.2481384","volume":"61","author":"C Carlet","year":"2015","unstructured":"Carlet, C.: Boolean and vectorial plateaued functions and APN functions. IEEE Trans. Inf. Theory 61(11), 6272\u20136289 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"587_CR44","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/BF01388454","volume":"4","author":"SL Ma","year":"1994","unstructured":"Ma, S.L.: A survey of partial difference sets. Des. Codes Crypt. 4 (4), 221\u2013261 (1994)","journal-title":"Des. Codes Crypt."},{"key":"587_CR45","unstructured":"Coulter, R., Kaleyski, N.: Further observations on the distance invariant Boolean functions and their application (BFA 2021) to be presented (2021)"},{"key":"587_CR46","doi-asserted-by":"crossref","unstructured":"Carlet, C., Heuser, A., Picek, S.: Trade-offs for S-boxes Cryptographic properties and side-channel resilience. In: International Conference on Applied Cryptography and Network Security, pp 393\u2013414. Springer (2017)","DOI":"10.1007\/978-3-319-61204-1_20"},{"key":"587_CR47","doi-asserted-by":"crossref","unstructured":"Berger, T.P., Canteaut, A., Charpin, P., Laigle-Chapuy, Y.: On almost perfect nonlinear functions over $$\\mathbb {F}_{2^{n}}$$. IEEE Trans. Inf. Theory 52(9), 4160\u20134170 (2006)","DOI":"10.1109\/TIT.2006.880036"},{"key":"587_CR48","doi-asserted-by":"crossref","unstructured":"G\u00f6lo\u011flu, F., Pavl\u016fring, J.: On CCZ-inequivalence of some families of almost perfect nonlinear functions to permutations. Cryptogr. Commun., pp. 1\u201315 (2021)","DOI":"10.1007\/s12095-021-00476-0"},{"key":"587_CR49","doi-asserted-by":"publisher","first-page":"5","DOI":"10.7146\/math.scand.a-11793","volume":"44","author":"L Carlitz","year":"1979","unstructured":"Carlitz, L.: Explicit evaluation of certain exponential sums. Math. Scand. 44, 5\u201316 (1979)","journal-title":"Math. Scand."},{"issue":"1","key":"587_CR50","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10623-010-9468-7","volume":"59","author":"C Carlet","year":"2011","unstructured":"Carlet, C.: Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions. Des. Codes Crypt. 59(1), 89\u2013109 (2011)","journal-title":"Des. Codes Crypt."},{"issue":"2","key":"587_CR51","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1137\/080717079","volume":"23","author":"C Bracken","year":"2009","unstructured":"Bracken, C., Byrne, E., Markin, N., McGuire, G.: Fourier spectra of binomial APN functions. SIAM J. Discret. Math. 23(2), 596\u2013608 (2009)","journal-title":"SIAM J. Discret. Math."},{"key":"587_CR52","unstructured":"Bracken, C., Zha, Z.: On the Fourier spectra of the infinite families of quadratic apn functions. arXiv:0811.4718 (2008)"},{"issue":"1","key":"587_CR53","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R Gold","year":"1968","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions (corresp.) IEEE Trans. Inf. Theory 14(1), 154\u2013156 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"587_CR54","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1137\/120865756","volume":"27","author":"Y Tan","year":"2013","unstructured":"Tan, Y., Qu, L., Ling, S., Tan, C.H.: On the fourier spectra of new apn functions. SIAM J. Discret. Math. 27(2), 791\u2013801 (2013)","journal-title":"SIAM J. Discret. Math."},{"key":"587_CR55","doi-asserted-by":"crossref","unstructured":"Budaghyan, L., Helleseth, T., Li, N., Sun, B.: Some results on the known classes of quadratic APN functions. In: International Conference on Codes, Cryptology, and Information Security, pp 3\u201316. Springer (2017)","DOI":"10.1007\/978-3-319-55589-8_1"},{"issue":"1","key":"587_CR56","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1109\/TIT.2021.3120698","volume":"68","author":"C Beierle","year":"2021","unstructured":"Beierle, C., Leander, G.: New instances of quadratic apn functions. IEEE Trans. Inf. Theory 68(1), 670\u2013678 (2021)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"587_CR57","doi-asserted-by":"crossref","unstructured":"Yu, Y., Perrin, L.: Constructing more quadratic apn functions with the qam method. Boolean Functions and their Applications, Rosendal, Norway (2021)","DOI":"10.1007\/s12095-022-00598-z"},{"key":"587_CR58","first-page":"33","volume":"518","author":"K Browning","year":"2010","unstructured":"Browning, K., Dillon, J., McQuistan, M., Wolfe, A.: An APN permutation in dimension six. Finite Fields: Theory Appl. 518, 33\u201342 (2010)","journal-title":"Finite Fields: Theory Appl."},{"key":"587_CR59","unstructured":"Perrin, L.: How to take a function apart with SboxU. The 5th International Workshop on Boolean Functions and their Applications (BFA 2020) (2020)"},{"issue":"2","key":"587_CR60","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIT.2005.862128","volume":"52","author":"Y Edel","year":"2006","unstructured":"Edel, Y., Kyureghyan, G., Pott, A.: A new APN function which is not equivalent to a power mapping. IEEE Trans. Inf. Theory 52(2), 744\u2013747 (2006)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00587-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-022-00587-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-022-00587-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T08:20:57Z","timestamp":1674807657000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-022-00587-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,20]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["587"],"URL":"https:\/\/doi.org\/10.1007\/s12095-022-00587-2","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,20]]},"assertion":[{"value":"14 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}