{"id":"https://openalex.org/W2514893051","doi":"https://doi.org/10.1145/2976749.2978425","title":"Frodo","display_name":"Frodo","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2514893051","doi":"https://doi.org/10.1145/2976749.2978425","mag":"2514893051"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978425","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ir.cwi.nl/pub/25223/p1006-bos.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012762741","display_name":"Joppe W. Bos","orcid":"https://orcid.org/0000-0003-1010-8157"},"institutions":[{"id":"https://openalex.org/I109147379","display_name":"NXP (Netherlands)","ror":"https://ror.org/059be4e97","country_code":"NL","type":"company","lineage":["https://openalex.org/I109147379"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Joppe Bos","raw_affiliation_strings":["NXP Semiconductors, Eindhoven, Netherlands"],"affiliations":[{"raw_affiliation_string":"NXP Semiconductors, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I109147379"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012881701","display_name":"Craig Costello","orcid":"https://orcid.org/0000-0001-5423-7714"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Craig Costello","raw_affiliation_strings":["Microsoft Research, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020997951","display_name":"L\u00e9o Ducas","orcid":"https://orcid.org/0000-0003-2510-4829"},"institutions":[{"id":"https://openalex.org/I1341640284","display_name":"Centrum Wiskunde & Informatica","ror":"https://ror.org/00x7ekv49","country_code":"NL","type":"facility","lineage":["https://openalex.org/I1341640284","https://openalex.org/I2800991832"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Leo Ducas","raw_affiliation_strings":["CWI, Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"CWI, Amsterdam, Netherlands","institution_ids":["https://openalex.org/I1341640284"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068648893","display_name":"Ilya Mironov","orcid":"https://orcid.org/0000-0002-2149-1916"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ilya Mironov","raw_affiliation_strings":["Google, Mountain View, CA, USA"],"affiliations":[{"raw_affiliation_string":"Google, Mountain View, CA, USA","institution_ids":["https://openalex.org/I1291425158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057584611","display_name":"Michael Naehrig","orcid":null},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Naehrig","raw_affiliation_strings":["Microsoft Research, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050096111","display_name":"Valeria Nikolaenko","orcid":"https://orcid.org/0000-0001-9642-6097"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Valeria Nikolaenko","raw_affiliation_strings":["Stanford University, Stanford, CA, USA"],"affiliations":[{"raw_affiliation_string":"Stanford University, Stanford, CA, USA","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038458532","display_name":"Ananth Raghunathan","orcid":null},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ananth Raghunathan","raw_affiliation_strings":["Google, Mountain View, CA, USA"],"affiliations":[{"raw_affiliation_string":"Google, Mountain View, CA, USA","institution_ids":["https://openalex.org/I1291425158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034733246","display_name":"Douglas Stebila","orcid":"https://orcid.org/0000-0001-9443-3170"},"institutions":[{"id":"https://openalex.org/I98251732","display_name":"McMaster University","ror":"https://ror.org/02fa3aq29","country_code":"CA","type":"education","lineage":["https://openalex.org/I98251732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Douglas Stebila","raw_affiliation_strings":["McMaster University, Hamilton, ON, Canada"],"affiliations":[{"raw_affiliation_string":"McMaster University, Hamilton, ON, Canada","institution_ids":["https://openalex.org/I98251732"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5012762741"],"corresponding_institution_ids":["https://openalex.org/I109147379"],"apc_list":null,"apc_paid":null,"fwci":51.5473,"has_fulltext":true,"cited_by_count":294,"citation_normalized_percentile":{"value":0.99827844,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1006","last_page":"1018"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.8127031922340393},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7837687134742737},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.7342936992645264},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5963192582130432},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.522839367389679},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.5158421397209167},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4988899230957031},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4928715229034424},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4892852008342743},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.4774506688117981},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.4768825173377991},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4734441936016083},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4733861982822418},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.41928985714912415},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.27206742763519287},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2605039179325104},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20972973108291626}],"concepts":[{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.8127031922340393},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7837687134742737},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.7342936992645264},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5963192582130432},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.522839367389679},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.5158421397209167},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4988899230957031},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4928715229034424},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4892852008342743},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.4774506688117981},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.4768825173377991},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4734441936016083},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4733861982822418},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.41928985714912415},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27206742763519287},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2605039179325104},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20972973108291626},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2976749.2978425","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:cwi.nl:25223","is_oa":true,"landing_page_url":"https://ir.cwi.nl/pub/25223","pdf_url":"https://ir.cwi.nl/pub/25223/p1006-bos.pdf","source":{"id":"https://openalex.org/S7407055335","display_name":"Centrum Wiskunde & Informatica (CWI), the national research institute for mathematics and computer science in the Netherlands","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:cwi.nl:25223","is_oa":true,"landing_page_url":"https://ir.cwi.nl/pub/25223","pdf_url":"https://ir.cwi.nl/pub/25223/p1006-bos.pdf","source":{"id":"https://openalex.org/S7407055335","display_name":"Centrum Wiskunde & Informatica (CWI), the national research institute for mathematics and computer science in the Netherlands","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G2165548363","display_name":null,"funder_award_id":"Canada","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G8284766523","display_name":null,"funder_award_id":"(NSERC)","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"}],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2514893051.pdf","grobid_xml":"https://content.openalex.org/works/W2514893051.grobid-xml"},"referenced_works_count":68,"referenced_works":["https://openalex.org/W39036742","https://openalex.org/W80562455","https://openalex.org/W118688756","https://openalex.org/W181098788","https://openalex.org/W580467909","https://openalex.org/W1447686308","https://openalex.org/W1508634734","https://openalex.org/W1537360597","https://openalex.org/W1595771334","https://openalex.org/W1607264302","https://openalex.org/W1675339804","https://openalex.org/W1749471906","https://openalex.org/W1760474993","https://openalex.org/W1845765495","https://openalex.org/W1979120705","https://openalex.org/W1983370494","https://openalex.org/W1992282993","https://openalex.org/W1994386233","https://openalex.org/W2007466965","https://openalex.org/W2028358228","https://openalex.org/W2035476608","https://openalex.org/W2038761522","https://openalex.org/W2042923641","https://openalex.org/W2058785578","https://openalex.org/W2061949491","https://openalex.org/W2066500891","https://openalex.org/W2071825329","https://openalex.org/W2080063509","https://openalex.org/W2084652510","https://openalex.org/W2089477764","https://openalex.org/W2089540019","https://openalex.org/W2094556471","https://openalex.org/W2106970188","https://openalex.org/W2107506969","https://openalex.org/W2113333997","https://openalex.org/W2122973102","https://openalex.org/W2129636357","https://openalex.org/W2135205181","https://openalex.org/W2142048307","https://openalex.org/W2147867233","https://openalex.org/W2153041122","https://openalex.org/W2162871433","https://openalex.org/W2261941747","https://openalex.org/W2295744963","https://openalex.org/W2315723423","https://openalex.org/W2398534851","https://openalex.org/W2398538644","https://openalex.org/W2400700555","https://openalex.org/W2467320551","https://openalex.org/W2494078997","https://openalex.org/W2495331295","https://openalex.org/W2514587965","https://openalex.org/W2621530037","https://openalex.org/W2895182117","https://openalex.org/W2962941363","https://openalex.org/W3000475709","https://openalex.org/W3022480174","https://openalex.org/W3023478445","https://openalex.org/W3029867009","https://openalex.org/W3031602617","https://openalex.org/W3111297213","https://openalex.org/W4205765479","https://openalex.org/W4237374172","https://openalex.org/W4285719527","https://openalex.org/W6604823728","https://openalex.org/W6606233919","https://openalex.org/W6724049718","https://openalex.org/W6754783611"],"related_works":["https://openalex.org/W2495300764","https://openalex.org/W2953298321","https://openalex.org/W2186642995","https://openalex.org/W1575556365","https://openalex.org/W1638503251","https://openalex.org/W2102905434","https://openalex.org/W2176772889","https://openalex.org/W2040397432","https://openalex.org/W4377866473","https://openalex.org/W2185700045"],"abstract_inverted_index":{"Lattice-based":[0],"cryptography":[1],"offers":[2,260],"some":[3],"of":[4,31,36,87,94,116,173,207,220,243,255],"the":[5,52,72,84,88,119,162],"most":[6],"attractive":[7],"primitives":[8,107],"believed":[9],"to":[10,13,97,101,161,249],"be":[11,134],"resistant":[12],"quantum":[14,27,111],"computers.":[15],"Following":[16],"increasing":[17],"interest":[18,96],"from":[19],"both":[20],"companies":[21],"and":[22,65,99,137,209,222,229,269],"government":[23],"agencies":[24],"in":[25,46,125,180],"building":[26],"computers,":[28],"a":[29,92,171,205],"number":[30],"works":[32],"have":[33],"proposed":[34],"instantiations":[35],"practical":[37,237],"post-quantum":[38],"key":[39,143],"exchange":[40,144],"protocols":[41],"based":[42,50],"on":[43,51,106],"hard":[44],"problems":[45],"ideal":[47,60],"lattices,":[48],"mainly":[49],"Ring":[53],"Learning":[54],"With":[55],"Errors":[56],"(R-LWE)":[57],"problem.":[58],"While":[59],"lattices":[61,132],"facilitate":[62],"major":[63],"efficiency":[64],"storage":[66],"benefits":[67],"over":[68,193],"their":[69],"non-ideal":[70],"counterparts,":[71],"additional":[73,120,261],"ring":[74,121],"structure":[75,122],"that":[76,108,130,141],"enables":[77],"these":[78,236],"advantages":[79],"also":[80,259],"raises":[81],"concerns":[82],"about":[83],"assumed":[85],"difficulty":[86],"underlying":[89],"problems.":[90],"Thus,":[91],"question":[93],"significant":[95],"cryptographers,":[98],"especially":[100],"those":[102],"currently":[103],"placing":[104],"bets":[105],"will":[109],"withstand":[110],"adversaries,":[112],"is":[113,145,185],"how":[114],"much":[115],"an":[117],"advantage":[118,242],"actually":[123],"gives":[124],"practice.":[126],"Despite":[127],"conventional":[128],"wisdom":[129],"generic":[131],"might":[133],"too":[135],"slow":[136],"unwieldy,":[138],"we":[139],"demonstrate":[140],"LWE-based":[142],"quite":[146],"practical:":[147],"our":[148,239],"constant":[149],"time":[150,156],"implementation":[151],"requires":[152],"around":[153],"1.3ms":[154],"computation":[155],"for":[157,189],"each":[158,181],"party;":[159],"compared":[160],"recent":[163],"NewHope":[164],"R-LWE":[165],"scheme,":[166],"communication":[167,251],"sizes":[168],"increase":[169,201],"by":[170,202,218],"factor":[172,206],"4.7x,":[174],"but":[175],"remain":[176],"under":[177,211],"12":[178],"KiB":[179,228,231],"direction.":[182],"Our":[183],"protocol":[184,240],"competitive":[186],"when":[187,195,224],"used":[188],"serving":[190,225],"web":[191],"pages":[192],"TLS;":[194],"partnered":[196],"with":[197],"ECDSA":[198],"signatures,":[199],"latencies":[200],"less":[203],"than":[204],"1.6x,":[208],"(even":[210],"heavy":[212],"load)":[213],"server":[214],"throughput":[215],"only":[216],"decreases":[217],"factors":[219],"1.5x":[221],"1.2x":[223],"typical":[226],"1":[227],"100":[230],"pages,":[232],"respectively.":[233],"To":[234],"achieve":[235],"results,":[238],"takes":[241],"several":[244],"innovations.":[245],"These":[246],"include":[247],"techniques":[248],"optimize":[250],"bandwidth,":[252],"dynamic":[253],"generation":[254],"public":[256],"parameters":[257],"(which":[258],"security":[262,271],"against":[263],"backdoors),":[264],"carefully":[265],"chosen":[266],"error":[267],"distributions,":[268],"tight":[270],"parameters.":[272]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":36},{"year":2024,"cited_by_count":29},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":29},{"year":2021,"cited_by_count":29},{"year":2020,"cited_by_count":39},{"year":2019,"cited_by_count":48},{"year":2018,"cited_by_count":31},{"year":2017,"cited_by_count":32},{"year":2016,"cited_by_count":5}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2016-09-16T00:00:00"}
