{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:26:55Z","timestamp":1776277615470,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030252823","type":"print"},{"value":"9783030252830","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-25283-0_6","type":"book-chapter","created":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T10:02:57Z","timestamp":1563530577000},"page":"109-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Curve25519 for the Cortex-M4 and Beyond"],"prefix":"10.1007","author":[{"given":"Hayato","family":"Fujii","sequence":"first","affiliation":[]},{"given":"Diego F.","family":"Aranha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,20]]},"reference":[{"key":"6_CR1","unstructured":"ARM: Cortex-M4 Devices Generic User Guide (2010). \n                      http:\/\/infocenter.arm.com\/help\/index.jsp?topic=%2Fcom.arm.doc.dui0553a%2FCHDBFFDB.html"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new diffie-hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006). \n                      https:\/\/doi.org\/10.1007\/11745853_14"},{"key":"6_CR3","unstructured":"Bernstein, D.J.: 25519 naming, August 2014. \n                      https:\/\/www.ietf.org\/mail-archive\/web\/cfrg\/current\/msg04996.html"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted edwards curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 389\u2013405. Springer, Heidelberg (2008). \n                      https:\/\/doi.org\/10.1007\/978-3-540-68164-9_26"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","volume":"2","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.: High-speed high-security signatures. J. Crypt. Eng. 2(2), 77\u201389 (2012)","journal-title":"J. Crypt. Eng."},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1090\/conm\/461\/08979","volume":"461","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J., Lange, T.: Analysis and optimization of elliptic-curve single-scalar multiplication. Contemp. Math. Finite Fields Appl. 461, 1\u201320 (2008)","journal-title":"Contemp. Math. Finite Fields Appl."},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-33027-8_19","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein, D.J., Schwabe, P.: NEON crypto. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 320\u2013339. Springer, Heidelberg (2012). \n                      https:\/\/doi.org\/10.1007\/978-3-642-33027-8_19"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997). \n                      https:\/\/doi.org\/10.1007\/3-540-69053-0_4"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-662-48797-6_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"C Costello","year":"2015","unstructured":"Costello, C., Longa, P.: Four\n                      \n                        \n                      \n                      $$\\mathbb{Q}$$\n                    : four-dimensional decompositions on a \n                      \n                        \n                      \n                      $$\\mathbb{Q}$$\n                    -curve over the mersenne prime. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9452, pp. 214\u2013235. Springer, Heidelberg (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-662-48797-6_10"},{"key":"6_CR10","unstructured":"Bernstein, D.J., Lange, T. (eds.) eBACS: ECRYPT Benchmarking of Cryptographic Systems. \n                      https:\/\/bench.cr.yp.to"},{"issue":"2\u20133","key":"6_CR11","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s10623-015-0087-1","volume":"77","author":"M D\u00fcll","year":"2015","unstructured":"D\u00fcll, M., et al.: High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. Des. Codes Crypt. 77(2\u20133), 493\u2013514 (2015)","journal-title":"Des. Codes Crypt."},{"key":"6_CR12","unstructured":"de Groot, W.: A Performance Study of X25519 on Cortex-M3 and M4. Ph.D. thesis, Eindhoven University of Technology, September 2015"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-14423-3_13","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"J Gro\u00dfsch\u00e4dl","year":"2010","unstructured":"Gro\u00dfsch\u00e4dl, J., Oswald, E., Page, D., Tunstall, M.: Side-channel analysis of cryptographic software via early-terminating multiplications. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 176\u2013192. Springer, Heidelberg (2010). \n                      https:\/\/doi.org\/10.1007\/978-3-642-14423-3_13"},{"key":"6_CR14","unstructured":"Haase, B.: Memory bandwidth influence makes cortex m4 benchmarking difficult, September 2017. \n                      https:\/\/ches.2017.rump.cr.yp.to\/fe534b32e52fcacee026786ff44235f0.pdf"},{"key":"6_CR15","first-page":"309","volume":"2012","author":"M Hamburg","year":"2012","unstructured":"Hamburg, M.: Fast and compact elliptic-curve cryptography. IACR Crypt. ePrint Arch. 2012, 309 (2012)","journal-title":"IACR Crypt. ePrint Arch."},{"key":"6_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/b97644","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer-Verlag New York Inc., Secaucus (2003). \n                      https:\/\/doi.org\/10.1007\/b97644"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-23951-9_30","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"M Hutter","year":"2011","unstructured":"Hutter, M., Wenger, E.: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 459\u2013474. Springer, Heidelberg (2011). \n                      https:\/\/doi.org\/10.1007\/978-3-642-23951-9_30"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-25405-5_2","volume-title":"Post-Quantum Cryptography","author":"D Jao","year":"2011","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 19\u201334. Springer, Heidelberg (2011). \n                      https:\/\/doi.org\/10.1007\/978-3-642-25405-5_2"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Josefsson, S., Liusvaara, I.: Edwards-Curve Digital Signature Algorithm (EdDSA). RFC 8032, January 2017. \n                      https:\/\/rfc-editor.org\/rfc\/rfc8032.txt","DOI":"10.17487\/RFC8032"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). \n                      https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"issue":"2","key":"6_CR21","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1023\/A:1022595222606","volume":"28","author":"L Law","year":"2003","unstructured":"Law, L., Menezes, A., Qu, M., Solinas, J.A., Vanstone, S.A.: An efficient protocol for authenticated key agreement. Des. Codes Crypt. 28(2), 119\u2013134 (2003)","journal-title":"Des. Codes Crypt."},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/978-3-319-66787-4_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"Z Liu","year":"2017","unstructured":"Liu, Z., Longa, P., Pereira, G.C.C.F., Reparaz, O., Seo, H.: Four\n                      \n                        \n                      \n                      $$\\mathbb{Q}$$\n                     on embedded devices with strong countermeasures against side-channel attacks. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 665\u2013686. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-66787-4_32"},{"issue":"2","key":"6_CR23","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/s11390-016-1627-5","volume":"31","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Seo, H., Kim, H.: A synthesis of multi-precision multiplication and squaring techniques for 8-bit sensor nodes: state-of-the-art research and future challenges. J. Comput. Sci. Technol. 31(2), 284\u2013299 (2016)","journal-title":"J. Comput. Sci. Technol."},{"issue":"177","key":"6_CR24","doi-asserted-by":"publisher","first-page":"243","DOI":"10.2307\/2007888","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243\u2013264 (1987). \n                      https:\/\/doi.org\/10.2307\/2007888","journal-title":"Math. Comput."},{"key":"6_CR25","first-page":"923","volume":"2016","author":"E Nascimento","year":"2016","unstructured":"Nascimento, E., Chmielewski, L., Oswald, D., Schwabe, P.: Attacking embedded ECC implementations through cmov side channels. IACR Crypt. ePrint Arch. 2016, 923 (2016)","journal-title":"IACR Crypt. ePrint Arch."},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-319-72565-9_9","volume-title":"Selected Areas in Cryptography \u2013 SAC 2017","author":"T Oliveira","year":"2018","unstructured":"Oliveira, T., L\u00f3pez, J., H\u0131\u015f\u0131l, H., Faz-Hern\u00e1ndez, A., Rodr\u00edguez-Henr\u00edquez, F.: How to (Pre-)compute a ladder. In: Adams, C., Camenisch, J. (eds.) SAC 2017. LNCS, vol. 10719, pp. 172\u2013191. Springer, Cham (2018). \n                      https:\/\/doi.org\/10.1007\/978-3-319-72565-9_9"},{"key":"6_CR27","first-page":"518","volume":"2017","author":"J Renes","year":"2017","unstructured":"Renes, J., Smith, B.: qDSA: small and secure digital signatures with curve-based diffie-hellman key pairs. IACR Crypt. ePrint Arch. 2017, 518 (2017)","journal-title":"IACR Crypt. ePrint Arch."},{"key":"6_CR28","unstructured":"Santis, F.D., Sigl, G.: Towards side-channel protected X25519 on ARM cortex-M4 processors. In: SPEED-B. Utrecht, The Netherlands, October 2016. \n                      http:\/\/ccccspeed.win.tue.nl\/"},{"issue":"1","key":"6_CR29","doi-asserted-by":"publisher","first-page":"27","DOI":"10.6109\/jicce.2015.13.1.027","volume":"13","author":"H Seo","year":"2015","unstructured":"Seo, H., Kim, H.: Consecutive operand-caching method for multiprecision multiplication, revisited. J. Inform. Commun. Convergence Eng. 13(1), 27\u201335 (2015)","journal-title":"J. Inform. Commun. Convergence Eng."},{"key":"6_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-319-03515-4_15","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"H Seo","year":"2013","unstructured":"Seo, H., Liu, Z., Choi, J., Kim, H.: Multi-precision squaring for public-key cryptography on embedded microprocessors. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol. 8250, pp. 227\u2013243. Springer, Cham (2013). \n                      https:\/\/doi.org\/10.1007\/978-3-319-03515-4_15"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2017"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-25283-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T10:28:12Z","timestamp":1563532092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-25283-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030252823","9783030252830"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-25283-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LATINCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Information Security in Latin America","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Havana","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cuba","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"latincrypt2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/latincrypt.matcom.uh.cu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"iChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"contains 1 invited paper","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}