{"id":"https://openalex.org/W4385654153","doi":"https://doi.org/10.1007/978-3-031-38548-3_14","title":"Learning with\u00a0Physical Rounding for\u00a0Linear and\u00a0Quadratic Leakage Functions","display_name":"Learning with\u00a0Physical Rounding for\u00a0Linear and\u00a0Quadratic Leakage Functions","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385654153","doi":"https://doi.org/10.1007/978-3-031-38548-3_14"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-38548-3_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-38548-3_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://orbilu.uni.lu/bitstream/10993/60014/1/GLWPR.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042802532","display_name":"Cl\u00e9ment Hoffmann","orcid":"https://orcid.org/0000-0001-9744-1539"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Cl\u00e9ment Hoffmann","raw_affiliation_strings":["Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011712559","display_name":"Pierrick M\u00e9aux","orcid":"https://orcid.org/0000-0001-5733-4341"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Pierrick M\u00e9aux","raw_affiliation_strings":["Luxembourg University, SnT, Esch-sur-Alzette, Luxembourg"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Luxembourg University, SnT, Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039780407","display_name":"Charles Momin","orcid":null},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Charles Momin","raw_affiliation_strings":["Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062744717","display_name":"Yann Rotella","orcid":null},"institutions":[{"id":"https://openalex.org/I277688954","display_name":"Universit\u00e9 Paris-Saclay","ror":"https://ror.org/03xjwb503","country_code":"FR","type":"education","lineage":["https://openalex.org/I277688954"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4387152735","display_name":"Laboratoire de Math\u00e9matiques de Versailles","ror":"https://ror.org/04k5jw363","country_code":null,"type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I195731000","https://openalex.org/I277688954","https://openalex.org/I4387152735"]},{"id":"https://openalex.org/I195731000","display_name":"Universit\u00e9 de Versailles Saint-Quentin-en-Yvelines","ror":"https://ror.org/03mkjjy25","country_code":"FR","type":"education","lineage":["https://openalex.org/I195731000","https://openalex.org/I277688954"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Yann Rotella","raw_affiliation_strings":["Universit\u00e9 Paris-Saclay, UVSQ, CNRS, Laboratoire de math\u00e9matiques de Versailles, 78000, Versailles, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universit\u00e9 Paris-Saclay, UVSQ, CNRS, Laboratoire de math\u00e9matiques de Versailles, 78000, Versailles, France","institution_ids":["https://openalex.org/I277688954","https://openalex.org/I195731000","https://openalex.org/I1294671590","https://openalex.org/I4387152735"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070542865","display_name":"Fran\u00e7ois\u2010Xavier Standaert","orcid":"https://orcid.org/0000-0001-7444-0285"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Fran\u00e7ois-Xavier Standaert","raw_affiliation_strings":["Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091886217","display_name":"Balazs Udvarhelyi","orcid":null},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Balazs Udvarhelyi","raw_affiliation_strings":["Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Crypto Group, ICTEAM Institute, UCLouvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5011712559"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.5946,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.93725028,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"410","last_page":"439"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8037827610969543},{"id":"https://openalex.org/keywords/rounding","display_name":"Rounding","score":0.6287041902542114},{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.4920041263103485},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.47899243235588074},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47667932510375977},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.47520169615745544},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4467565715312958},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.43039819598197937},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33225858211517334},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3263735771179199},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.325250506401062}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8037827610969543},{"id":"https://openalex.org/C136625980","wikidata":"https://www.wikidata.org/wiki/Q663208","display_name":"Rounding","level":2,"score":0.6287041902542114},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.4920041263103485},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.47899243235588074},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47667932510375977},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.47520169615745544},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4467565715312958},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.43039819598197937},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33225858211517334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3263735771179199},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.325250506401062},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-031-38548-3_14","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-031-38548-3_14","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:orbilu.uni.lu:10993/60014","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/60014","pdf_url":"https://orbilu.uni.lu/bitstream/10993/60014/1/GLWPR.pdf","source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lecture Notes in Computer Science, 14083, 410\u2013439 (2023-08-20); Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International      Cryptology Conference, {CRYPTO} 2023, 20-24 august 2023","raw_type":"peer reviewed"},{"id":"pmh:oai:HAL:hal-04268878v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04268878","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Advances in Cryptology \u2013 CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:HAL:hal-04397353v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-04397353","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Advances in Cryptology \u2013 CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings","raw_type":null}],"best_oa_location":{"id":"pmh:oai:orbilu.uni.lu:10993/60014","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/60014","pdf_url":"https://orbilu.uni.lu/bitstream/10993/60014/1/GLWPR.pdf","source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Lecture Notes in Computer Science, 14083, 410\u2013439 (2023-08-20); Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International      Cryptology Conference, {CRYPTO} 2023, 20-24 august 2023","raw_type":"peer reviewed"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1999545802","display_name":null,"funder_award_id":"724725","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G6560582780","display_name":"Cloud Computing via Homomorphic Encryption and Multilinear Maps","funder_award_id":"787390","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321390","display_name":"Fonds De La Recherche Scientifique - FNRS","ror":"https://ror.org/03q83t159"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385654153.pdf"},"referenced_works_count":54,"referenced_works":["https://openalex.org/W49599189","https://openalex.org/W102155185","https://openalex.org/W108606907","https://openalex.org/W130128522","https://openalex.org/W139192289","https://openalex.org/W190530026","https://openalex.org/W1494049356","https://openalex.org/W1499081748","https://openalex.org/W1499766499","https://openalex.org/W1520563459","https://openalex.org/W1529679142","https://openalex.org/W1560022750","https://openalex.org/W1562542037","https://openalex.org/W1575446397","https://openalex.org/W1592625985","https://openalex.org/W1595155753","https://openalex.org/W1752847028","https://openalex.org/W1769884570","https://openalex.org/W1781388255","https://openalex.org/W2031533839","https://openalex.org/W2038345254","https://openalex.org/W2038761522","https://openalex.org/W2061949491","https://openalex.org/W2111809688","https://openalex.org/W2128687423","https://openalex.org/W2139092268","https://openalex.org/W2140823840","https://openalex.org/W2141841663","https://openalex.org/W2150892302","https://openalex.org/W2199279747","https://openalex.org/W2401813776","https://openalex.org/W2466376731","https://openalex.org/W2484680112","https://openalex.org/W2612816951","https://openalex.org/W2613550625","https://openalex.org/W2690568919","https://openalex.org/W2791664942","https://openalex.org/W2866028610","https://openalex.org/W2899793533","https://openalex.org/W2899902177","https://openalex.org/W2914572864","https://openalex.org/W2923280693","https://openalex.org/W2963833429","https://openalex.org/W2979160478","https://openalex.org/W3004433901","https://openalex.org/W3133865019","https://openalex.org/W3164508328","https://openalex.org/W3204480019","https://openalex.org/W3208740725","https://openalex.org/W4205482204","https://openalex.org/W4226363871","https://openalex.org/W4240560709","https://openalex.org/W4317928194","https://openalex.org/W4367663762"],"related_works":["https://openalex.org/W4213239787","https://openalex.org/W2045745654","https://openalex.org/W2114337652","https://openalex.org/W4377131110","https://openalex.org/W4388857216","https://openalex.org/W4294559962","https://openalex.org/W2046590706","https://openalex.org/W4390419005","https://openalex.org/W3095894856","https://openalex.org/W4248992603"],"abstract_inverted_index":{"Fresh":[0],"re-keying":[1,35],"is":[2,12,37,64,118],"a":[3,15,19,90,105,121,147,178,211],"countermeasure":[4],"against":[5,190,250],"side-channel":[6],"analysis":[7],"where":[8,93,115],"an":[9,270],"ephemeral":[10,70],"key":[11,17],"derived":[13],"from":[14],"long-term":[16,77],"using":[18],"public":[20],"random":[21],"value.":[22],"Popular":[23],"instances":[24],"of":[25,44,68,108,175,194,210,228,235,261],"such":[26],"schemes":[27,60],"rely":[28],"on":[29,225],"key-homomorphic":[30],"primitives,":[31],"so":[32],"that":[33,65,141,162,244],"the":[34,42,45,66,69,76,94,109,116,139,173,183,207,226,229,233,239,258],"process":[36],"easy":[38],"to":[39,61,129,157,220],"mask":[40],"and":[41,124,232],"rest":[43],"(e.g.,":[46],"block":[47],"cipher)":[48],"computations":[49],"can":[50,96,101,163],"run":[51],"with":[52,81,166],"cheaper":[53],"countermeasures.":[54],"The":[55,79],"main":[56],"requirement":[57],"for":[58,269],"these":[59,262],"be":[62,102,130,144,164],"secure":[63,145],"leakages":[67,161],"keys":[71],"do":[72],"not":[73,127,197],"allow":[74],"recovering":[75],"key.":[78],"Learning":[80,110],"Physical":[82],"Rounding":[83,112],"(LWPR)":[84],"problem":[85],"formalizes":[86],"this":[87,134,222],"security":[88,205,249],"in":[89,146,177,206],"practically-relevant":[91],"model":[92],"adversary":[95],"observe":[97],"noise-free":[98],"leakages.":[99,254],"It":[100],"viewed":[103],"as":[104],"physical":[106],"version":[107],"With":[111],"(LWR)":[113],"problem,":[114],"rounding":[117],"performed":[119],"by":[120,264],"leakage":[122,214,230],"function":[123,231],"therefore":[125],"does":[126],"have":[128],"computed":[131],"explicitly.":[132],"In":[133],"paper,":[135],"we":[136,186,242],"first":[137],"consolidate":[138],"intuition":[140],"LWPR":[142,176],"cannot":[143],"serial":[148],"implementation":[149,180],"context":[150,209],"without":[151],"additional":[152],"countermeasures":[153],"(like":[154],"shuffling),":[155],"due":[156],"attacks":[158,251],"exploiting":[159,252],"worst-case":[160,253],"mounted":[165],"practical":[167,259],"data":[168],"complexity.":[169],"We":[170,216,255],"then":[171],"extend":[172],"understanding":[174],"parallel":[179],"setting.":[181],"On":[182,238],"one":[184],"hand,":[185,241],"generalize":[187],"its":[188,236],"robustness":[189],"cryptanalysis":[191],"taking":[192],"advantage":[193],"any":[195],"(i.e.,":[196],"only":[198],"worst-case)":[199],"leakage.":[200],"A":[201],"previous":[202],"work":[203],"claimed":[204],"specific":[208],"Hamming":[212],"weight":[213],"function.":[215],"clarify":[217],"necessary":[218],"conditions":[219],"maintain":[221],"guarantee,":[223],"based":[224],"degree":[227],"accuracy":[234],"coefficients.":[237],"other":[240],"show":[243],"parallelism":[245],"inherently":[246],"provides":[247],"good":[248],"finally":[256],"confirm":[257],"relevance":[260],"findings":[263],"validating":[265],"our":[266],"assumptions":[267],"experimentally":[268],"exemplary":[271],"implementation.":[272]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2023-08-09T00:00:00"}
