{"id":"https://openalex.org/W4389395091","doi":"https://doi.org/10.46586/tches.v2024.i1.264-308","title":"Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme","display_name":"Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4389395091","doi":"https://doi.org/10.46586/tches.v2024.i1.264-308"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2024.i1.264-308","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i1.264-308","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11253/10795","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/11253/10795","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034718952","display_name":"Rei Ueno","orcid":"https://orcid.org/0000-0002-9754-6792"},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Rei Ueno","raw_affiliation_strings":["Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, Miyagi, 980-8577, Japan"],"affiliations":[{"raw_affiliation_string":"Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, Miyagi, 980-8577, Japan","institution_ids":["https://openalex.org/I201537933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069532722","display_name":"Naofumi Homma","orcid":"https://orcid.org/0000-0003-0864-3126"},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Naofumi Homma","raw_affiliation_strings":["Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, Miyagi, 980-8577, Japan"],"affiliations":[{"raw_affiliation_string":"Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, Miyagi, 980-8577, Japan","institution_ids":["https://openalex.org/I201537933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069272240","display_name":"Akiko Inoue","orcid":"https://orcid.org/0000-0002-0173-7245"},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Akiko Inoue","raw_affiliation_strings":["NEC Secure System Platform Laboratories, 1753 Shimonumabe, Nakahara, Kawasaki, Kanagawa 211\u20138666, Japan"],"affiliations":[{"raw_affiliation_string":"NEC Secure System Platform Laboratories, 1753 Shimonumabe, Nakahara, Kawasaki, Kanagawa 211\u20138666, Japan","institution_ids":["https://openalex.org/I118347220"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021671673","display_name":"Kazuhiko Minematsu","orcid":"https://orcid.org/0000-0002-3427-6772"},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuhiko Minematsu","raw_affiliation_strings":["NEC Secure System Platform Laboratories, 1753 Shimonumabe, Nakahara, Kawasaki, Kanagawa 211\u20138666, Japan"],"affiliations":[{"raw_affiliation_string":"NEC Secure System Platform Laboratories, 1753 Shimonumabe, Nakahara, Kawasaki, Kanagawa 211\u20138666, Japan","institution_ids":["https://openalex.org/I118347220"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5034718952"],"corresponding_institution_ids":["https://openalex.org/I201537933"],"apc_list":null,"apc_paid":null,"fwci":1.037,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81924111,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"2024","issue":"1","first_page":"264","last_page":"308"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6972313523292542},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6132270693778992},{"id":"https://openalex.org/keywords/rekeying","display_name":"Rekeying","score":0.6120214462280273},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.5265541076660156},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.5221822261810303},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5108963847160339},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.49868083000183105},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4802434742450714},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45091113448143005},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.41758018732070923},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34900975227355957},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3358297348022461},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.33075106143951416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3082736134529114},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2995104193687439},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2059248685836792},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.19273364543914795},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16705912351608276}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6972313523292542},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6132270693778992},{"id":"https://openalex.org/C127150765","wikidata":"https://www.wikidata.org/wiki/Q7310605","display_name":"Rekeying","level":4,"score":0.6120214462280273},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.5265541076660156},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.5221822261810303},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5108963847160339},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.49868083000183105},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4802434742450714},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45091113448143005},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.41758018732070923},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34900975227355957},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3358297348022461},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.33075106143951416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3082736134529114},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2995104193687439},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2059248685836792},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.19273364543914795},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16705912351608276},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tches.v2024.i1.264-308","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i1.264-308","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11253/10795","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9fb3627577df468fae0b304a2ee81984","is_oa":true,"landing_page_url":"https://doaj.org/article/9fb3627577df468fae0b304a2ee81984","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2024.i1.264-308","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2024.i1.264-308","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/11253/10795","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G193038087","display_name":null,"funder_award_id":"JST CREST","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G2494921797","display_name":null,"funder_award_id":"JPMJCR19K5","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"},{"id":"https://openalex.org/G3282004645","display_name":null,"funder_award_id":"JPMJCR","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"},{"id":"https://openalex.org/G3459562248","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G6454252653","display_name":null,"funder_award_id":"19H21526","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G6718509927","display_name":null,"funder_award_id":"CREST","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"},{"id":"https://openalex.org/F4320338075","display_name":"Core Research for Evolutional Science and Technology","ror":"https://ror.org/00097mb19"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4389395091.pdf"},"referenced_works_count":120,"referenced_works":["https://openalex.org/W4186701","https://openalex.org/W111085860","https://openalex.org/W187869407","https://openalex.org/W748243377","https://openalex.org/W802019357","https://openalex.org/W1461374287","https://openalex.org/W1485959221","https://openalex.org/W1498886746","https://openalex.org/W1500578148","https://openalex.org/W1547189451","https://openalex.org/W1547517307","https://openalex.org/W1562542037","https://openalex.org/W1573157032","https://openalex.org/W1588518948","https://openalex.org/W1602503772","https://openalex.org/W1607006990","https://openalex.org/W1656028867","https://openalex.org/W1689385595","https://openalex.org/W1732902884","https://openalex.org/W1752847028","https://openalex.org/W1753795543","https://openalex.org/W1796231437","https://openalex.org/W1829732909","https://openalex.org/W1839956289","https://openalex.org/W1902160629","https://openalex.org/W1995069079","https://openalex.org/W2015691375","https://openalex.org/W2053318192","https://openalex.org/W2061496435","https://openalex.org/W2062272401","https://openalex.org/W2107818289","https://openalex.org/W2110162979","https://openalex.org/W2114286085","https://openalex.org/W2117362057","https://openalex.org/W2123855359","https://openalex.org/W2127596159","https://openalex.org/W2133701468","https://openalex.org/W2134553300","https://openalex.org/W2138177838","https://openalex.org/W2139747141","https://openalex.org/W2144630005","https://openalex.org/W2149847764","https://openalex.org/W2150892302","https://openalex.org/W2154909745","https://openalex.org/W2167208487","https://openalex.org/W2169985476","https://openalex.org/W2170489924","https://openalex.org/W2204642948","https://openalex.org/W2219812381","https://openalex.org/W2397309740","https://openalex.org/W2401813776","https://openalex.org/W2413819851","https://openalex.org/W2484680112","https://openalex.org/W2495307099","https://openalex.org/W2497610130","https://openalex.org/W2536698892","https://openalex.org/W2548640435","https://openalex.org/W2555917385","https://openalex.org/W2591961801","https://openalex.org/W2594806102","https://openalex.org/W2612613213","https://openalex.org/W2613028984","https://openalex.org/W2732165109","https://openalex.org/W2751043011","https://openalex.org/W2768802245","https://openalex.org/W2794898833","https://openalex.org/W2810943746","https://openalex.org/W2897622948","https://openalex.org/W2915352631","https://openalex.org/W2949591164","https://openalex.org/W2950920433","https://openalex.org/W2954655849","https://openalex.org/W2972951921","https://openalex.org/W2978345276","https://openalex.org/W2978588021","https://openalex.org/W2990441337","https://openalex.org/W2990974888","https://openalex.org/W2991227433","https://openalex.org/W2996022685","https://openalex.org/W2996111659","https://openalex.org/W3003468063","https://openalex.org/W3003996345","https://openalex.org/W3013384204","https://openalex.org/W3013677143","https://openalex.org/W3022759749","https://openalex.org/W3037092799","https://openalex.org/W3081832642","https://openalex.org/W3082591593","https://openalex.org/W3091427978","https://openalex.org/W3134055083","https://openalex.org/W3153001680","https://openalex.org/W3173700271","https://openalex.org/W3175175642","https://openalex.org/W3179013011","https://openalex.org/W3203297539","https://openalex.org/W3204312291","https://openalex.org/W3205447747","https://openalex.org/W3207283289","https://openalex.org/W3209250026","https://openalex.org/W3211558687","https://openalex.org/W3211811879","https://openalex.org/W4230633622","https://openalex.org/W4230984038","https://openalex.org/W4231098049","https://openalex.org/W4231734269","https://openalex.org/W4240249456","https://openalex.org/W4241389749","https://openalex.org/W4242566960","https://openalex.org/W4253338219","https://openalex.org/W4288057788","https://openalex.org/W4294325964","https://openalex.org/W4297820019","https://openalex.org/W4299432846","https://openalex.org/W4313124033","https://openalex.org/W4313558573","https://openalex.org/W4318337976","https://openalex.org/W4323320019","https://openalex.org/W4360594643","https://openalex.org/W4389258776","https://openalex.org/W4389395091"],"related_works":["https://openalex.org/W5280335","https://openalex.org/W4384807855","https://openalex.org/W2164725015","https://openalex.org/W4323926098","https://openalex.org/W182679101","https://openalex.org/W2013165531","https://openalex.org/W2425598453","https://openalex.org/W2022533428","https://openalex.org/W2769734684","https://openalex.org/W2184825947"],"abstract_inverted_index":{"This":[0,116],"paper":[1],"presents":[2],"a":[3,22,34,43,91,107,148,167,180,184,195,202],"provably":[4],"secure,":[5],"higher-order,":[6],"and":[7,74,110,166,177],"leakage-resilient":[8],"(LR)":[9],"rekeying":[10,77],"scheme":[11],"named":[12],"LR":[13,29,59,164],"Rekeying":[14],"with":[15,21,106],"Random":[16],"oracle":[17],"Repetition":[18],"(LR4),":[19],"along":[20],"quantitative":[23,149],"security":[24,203],"evaluation":[25,153,171],"methodology.":[26],"Many":[27],"existing":[28],"primitives":[30],"are":[31],"based":[32,63],"on":[33,64],"concept":[35],"of":[36,99,129,142,191,194],"leveled":[37],"implementation,":[38],"which":[39,138],"still":[40,79],"essentially":[41],"require":[42],"leak-free":[44,136],"sanctuary":[45],"(i.e.,":[46],"differential":[47],"power":[48],"analysis":[49],"(DPA)-resistant":[50],"component(s))":[51],"for":[52,76,155,163],"some":[53],"parts.":[54],"In":[55,84],"addition,":[56],"although":[57],"several":[58],"pseudorandom":[60],"functions":[61],"(PRFs)":[62],"only":[65],"bounded":[66,160],"DPA-resistant":[67,114],"components":[68],"have":[69],"been":[70],"developed,":[71],"their":[72],"validity":[73],"effectiveness":[75,178],"usage":[78],"need":[80],"to":[81,125],"be":[82],"determined.":[83],"contrast,":[85],"LR4":[86,120,156],"is":[87,139],"formally":[88],"proven":[89],"under":[90,205],"leakage":[92,161],"model":[93],"that":[94,119,157,187],"captures":[95],"the":[96,126,140,159,189],"practical":[97,108,206],"goal":[98],"side-channel":[100],"attack":[101],"(SCA)":[102],"protection":[103],"(e.g.,":[104],"masking":[105],"order)":[109],"assumes":[111],"no":[112],"unbounded":[113,135],"sanctuary.":[115],"proof":[117],"suggests":[118],"resists":[121],"exponential":[122],"invocations":[123],"(up":[124],"birthday":[127],"bound":[128],"key":[130],"size)":[131],"without":[132],"using":[133],"any":[134],"component,":[137],"first":[141],"its":[143,175],"kind.":[144],"Moreover,":[145],"we":[146],"present":[147],"SCA":[150,170],"success":[151],"rate":[152],"methodology":[154],"combines":[158],"models":[162],"cryptography":[165],"state-of-the-art":[168],"information-theoretical":[169],"method.":[172],"We":[173],"validate":[174],"soundness":[176],"as":[179],"DPA":[181],"countermeasure":[182],"through":[183],"numerical":[185],"evaluation;":[186],"is,":[188],"number":[190],"secure":[192],"calls":[193],"symmetric":[196],"primitive":[197],"increases":[198],"exponentially":[199],"by":[200],"increasing":[201],"parameter":[204],"conditions.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
