{"id":"https://openalex.org/W4323840438","doi":"https://doi.org/10.1093/comjnl/bxad009","title":"Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori","display_name":"Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori","publication_year":2023,"publication_date":"2023-03-09","ids":{"openalex":"https://openalex.org/W4323840438","doi":"https://doi.org/10.1093/comjnl/bxad009"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxad009","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxad009","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100425406","display_name":"Li Zhang","orcid":"https://orcid.org/0000-0001-5705-6548"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Zhang","raw_affiliation_strings":["State Key Laboratory of Cryptology , Beijing 100878 , China","Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190 , China","University of Chinese Academy of Sciences , Beijing 100049 , China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology , Beijing 100878 , China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190 , China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences , Beijing 100049 , China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100433628","display_name":"Yu Zhang","orcid":"https://orcid.org/0000-0002-8208-3537"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190 , China","University of Chinese Academy of Sciences , Beijing 100049 , China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190 , China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences , Beijing 100049 , China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069642079","display_name":"Wenling Wu","orcid":"https://orcid.org/0000-0001-6244-3489"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210089285","display_name":"Ji Hua Laboratory","ror":"https://ror.org/006aydy55","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210089285"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenling Wu","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190 , China","University of Chinese Academy of Sciences , Beijing 100049 , China","Zhongguancun Laboratory , Beijing 100094 , China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190 , China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences , Beijing 100049 , China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Zhongguancun Laboratory , Beijing 100094 , China","institution_ids":["https://openalex.org/I4210089285"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040098780","display_name":"Yongxia Mao","orcid":"https://orcid.org/0000-0003-2328-9305"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongxia Mao","raw_affiliation_strings":["Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190 , China","University of Chinese Academy of Sciences , Beijing 100049 , China"],"affiliations":[{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190 , China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences , Beijing 100049 , China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113381043","display_name":"Yafei Zheng","orcid":"https://orcid.org/0000-0001-7550-0251"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210089285","display_name":"Ji Hua Laboratory","ror":"https://ror.org/006aydy55","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210089285"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yafei Zheng","raw_affiliation_strings":["State Key Laboratory of Cryptology , Beijing 100878 , China","Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190 , China","Zhongguancun Laboratory , Beijing 100094 , China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology , Beijing 100878 , China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Trusted Computing and Information Assurance Laboratory, Institute of Software Chinese Academy of Sciences , Beijing 100190 , China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Zhongguancun Laboratory , Beijing 100094 , China","institution_ids":["https://openalex.org/I4210089285"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100425406"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210128818","https://openalex.org/I4210132990","https://openalex.org/I4210165038"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.3497,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62419959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"67","issue":"2","first_page":"674","last_page":"687"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8631272912025452},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.79137122631073},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.6987169981002808},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.6680377721786499},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.636177659034729},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5503534078598022},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.49371370673179626},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4886317849159241},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4833902418613434},{"id":"https://openalex.org/keywords/higher-order-differential-cryptanalysis","display_name":"Higher-order differential cryptanalysis","score":0.46139997243881226},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.44636791944503784},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.4423219561576843},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.43952885270118713},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4247778058052063},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4222840666770935},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.41692715883255005},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.40229490399360657},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.1322469711303711},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.09875163435935974},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08152961730957031}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8631272912025452},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.79137122631073},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.6987169981002808},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.6680377721786499},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.636177659034729},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5503534078598022},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.49371370673179626},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4886317849159241},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4833902418613434},{"id":"https://openalex.org/C151607707","wikidata":"https://www.wikidata.org/wiki/Q11673206","display_name":"Higher-order differential cryptanalysis","level":5,"score":0.46139997243881226},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.44636791944503784},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.4423219561576843},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.43952885270118713},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4247778058052063},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4222840666770935},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.41692715883255005},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.40229490399360657},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.1322469711303711},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.09875163435935974},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08152961730957031},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxad009","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxad009","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1597968260","https://openalex.org/W1979802565","https://openalex.org/W2055432187","https://openalex.org/W2072296411","https://openalex.org/W2072787545","https://openalex.org/W2403200815","https://openalex.org/W2555913832","https://openalex.org/W2734623998","https://openalex.org/W2755060642","https://openalex.org/W2777135250","https://openalex.org/W2955859497","https://openalex.org/W2972502650","https://openalex.org/W3037868904","https://openalex.org/W6602293837","https://openalex.org/W6603641270","https://openalex.org/W6604936413","https://openalex.org/W6605996631","https://openalex.org/W6631885848","https://openalex.org/W6632174258","https://openalex.org/W6635694052","https://openalex.org/W6641304879","https://openalex.org/W6644966064","https://openalex.org/W6682735225","https://openalex.org/W6697158485","https://openalex.org/W6717808963","https://openalex.org/W6733375584"],"related_works":["https://openalex.org/W2557174342","https://openalex.org/W2996824228","https://openalex.org/W4230315357","https://openalex.org/W57168481","https://openalex.org/W2560473362","https://openalex.org/W1410349837","https://openalex.org/W1539170589","https://openalex.org/W1659081910","https://openalex.org/W2156908834","https://openalex.org/W2071872706"],"abstract_inverted_index":{"Abstract":[0],"Whether":[1],"a":[2,19,57,103],"block":[3,20,35],"cipher":[4,87],"can":[5,125],"resist":[6],"impossible":[7,26,50,80,123,153,195,228],"differential":[8,81],"attack":[9],"is":[10,28],"an":[11,83],"important":[12,29],"basis":[13],"to":[14,47],"evaluate":[15],"the":[16,23,31,39,49,53,67,75,79,89,92,98,111,114,119,172,182,204,207,222,225],"security":[17,32],"of":[18,25,34,38,59,66,78,82,94,113,122,174,181,224,227],"cipher.":[21],"However,":[22],"length":[24,77,121,226],"differentials":[27,124,158,196],"for":[30,145,201],"evaluation":[33],"ciphers.":[36],"Most":[37],"previous":[40],"studies":[41],"are":[42,64,151,193,210],"based":[43],"on":[44,137],"structural":[45,54],"cryptanalysis":[46,55],"find":[48],"differential,":[51],"and":[52,139,148,156,164,185,188,212],"covers":[56],"lot":[58],"specific":[60],"cryptanalytic":[61],"vectors":[62],"which":[63,109],"independent":[65,211],"nonlinear":[68],"S-boxes.":[69,95,175],"In":[70],"this":[71,117,135],"paper,":[72],"we":[73,101,133,142,177],"study":[74,216],"maximum":[76,120],"Advanced":[84],"Encryption":[85],"Standard-like":[86],"in":[88],"setting":[90],"with":[91,159],"details":[93,112,173],"Inspired":[96],"by":[97],"\u2018Divide-and-Conquer\u2019":[99],"technique,":[100],"propose":[102],"new":[104],"technique":[105],"called":[106],"Reduced":[107],"Block,":[108],"combines":[110],"S-box.":[115],"With":[116],"tool,":[118],"be":[126],"proven":[127],"under":[128,203],"reasonable":[129],"assumptions.":[130],"As":[131],"applications,":[132],"use":[134],"tool":[136],"uBlock":[138,183],"Midori.":[140],"Consequently,":[141],"prove":[143],"that":[144,191,206],"uBlock-128,":[146],"uBlock-256":[147],"Midori-64,":[149],"there":[150,192],"no":[152,194],"five-round,":[154],"six-round":[155],"seven-round":[157],"one":[160,165],"active":[161,166],"input":[162],"nibble":[163],"output":[167],"nibble,":[168],"even":[169],"when":[170],"considering":[171],"Furthermore,":[176],"reveal":[178],"some":[179,219],"properties":[180],"S-box":[184],"linear":[186],"layer":[187],"demonstrate":[189],"theoretically":[190],"longer":[197],"than":[198],"four":[199],"rounds":[200],"uBlock-128":[202],"assumption":[205],"round":[208],"keys":[209],"uniformly":[213],"random.":[214],"This":[215],"might":[217],"provide":[218],"insight":[220],"into":[221],"bounds":[223],"differentials.":[229]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
