{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:16:52Z","timestamp":1758125812374},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030255091"},{"type":"electronic","value":"9783030255107"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-25510-7_4","type":"book-chapter","created":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T07:02:33Z","timestamp":1563001353000},"page":"65-80","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Towards Practical Microcontroller Implementation of the Signature Scheme Falcon"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Oder","sequence":"first","affiliation":[]},{"given":"Julian","family":"Speith","sequence":"additional","affiliation":[]},{"given":"Kira","family":"H\u00f6ltgen","sequence":"additional","affiliation":[]},{"given":"Tim","family":"G\u00fcneysu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,14]]},"reference":[{"key":"4_CR1","unstructured":"pqm4 - post-quantum crypto library for the ARM cortex-M4. \n                      https:\/\/github.com\/mupq\/pqm4\n                      \n                    . Accessed 13 Nov 2018"},{"key":"4_CR2","unstructured":"Albrecht, M.R., Hanser, C., H\u00f6ller, A., P\u00f6ppelmann, T., Virdia, F., Wallner, A.: Learning with errors on RSA co-processors. IACR Cryptology ePrint Archive 2018\/425 (2018). \n                      https:\/\/eprint.iacr.org\/2018\/425"},{"key":"4_CR3","unstructured":"Alkim, E., et al.: FrodoKEM learning with errors key encapsulation. \n                      https:\/\/frodokem.org\/files\/FrodoKEM-specification-20171130.pdf\n                      \n                    . Accessed 13 Nov 2018"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Andrysco, M., N\u00f6tzli, A., Brown, F., Jhala, R., Stefan, D.: Towards verified, constant-time floating point operations. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 15\u201319 October 2018, pp. 1369\u20131382. ACM (2018). \n                      https:\/\/doi.org\/10.1145\/3243734.3243766","DOI":"10.1145\/3243734.3243766"},{"key":"4_CR5","unstructured":"Avanzi, R., et al.: CRYSTALS-kyber. \n                      https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/submissions\/CRYSTALS_Kyber.zip\n                      \n                    . Accessed 30 Nov 2018"},{"key":"4_CR6","unstructured":"Bhattacharya, S., et al.: Round5: compact and fast post-quantum public-key encryption. IACR Cryptology ePrint Archive 2018\/725 (2018). \n                      https:\/\/eprint.iacr.org\/2018\/725"},{"key":"4_CR7","unstructured":"Bindel, N., et al.: Submission to NIST\u2019s post-quantum project: lattice-based digital signature scheme qTESLA. \n                      https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/submissions\/qTESLA.zip\n                      \n                    . Accessed 26 Nov 2018"},{"issue":"5","key":"4_CR8","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/j.comnet.2005.01.010","volume":"48","author":"D Brumley","year":"2005","unstructured":"Brumley, D., Boneh, D.: Remote timing attacks are practical. Comput. Netw. 48(5), 701\u2013716 (2005). \n                      https:\/\/doi.org\/10.1016\/j.comnet.2005.01.010","journal-title":"Comput. Netw."},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-662-43414-7_20","volume-title":"Selected Areas in Cryptography \u2013 SAC 2013","author":"J Buchmann","year":"2014","unstructured":"Buchmann, J., Cabarcas, D., G\u00f6pfert, F., H\u00fclsing, A., Weiden, P.: Discrete ziggurat: a time-memory trade-off for sampling from a Gaussian distribution over the integers. In: Lange, T., Lauter, K., Lison\u011bk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 402\u2013417. Springer, Heidelberg (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-662-43414-7_20"},{"key":"4_CR10","unstructured":"Chen, C., Hoffstein, J., Whyte, W., Zhang, Z.: NIST PQ submission: pqNTRUSign - a modular lattice signature scheme. \n                      https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/submissions\/pqNTRUsign.zip\n                      \n                    . Accessed 26 Nov 2018"},{"key":"4_CR11","unstructured":"D\u2019Anvers, J.P., Karmakar, A., Roy, S.S., Longa, P., Vercauteren, F.: SABER: Mod-LWR based KEM. \n                      https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/submissions\/SABER.zip\n                      \n                    . Accessed 13 Nov 2018"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"238","DOI":"10.13154\/tches.v2018.i1.238-268","volume":"2018","author":"L Ducas","year":"2018","unstructured":"Ducas, L., et al.: CRYSTALS-dilithium: a lattice-based digital signature scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1), 238\u2013268 (2018). \n                      https:\/\/doi.org\/10.13154\/tches.v2018.i1.238-268","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-662-45608-8_2","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"L Ducas","year":"2014","unstructured":"Ducas, L., Lyubashevsky, V., Prest, T.: Efficient identity-based encryption over NTRU lattices. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8874, pp. 22\u201341. Springer, Heidelberg (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-662-45608-8_2"},{"issue":"3","key":"4_CR14","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s00200-014-0218-3","volume":"25","author":"NC Dwarakanath","year":"2014","unstructured":"Dwarakanath, N.C., Galbraith, S.D.: Sampling from discrete Gaussians for lattice-based cryptography on a constrained device. Appl. Algebra Eng. Commun. Comput. 25(3), 159\u2013180 (2014). \n                      https:\/\/doi.org\/10.1007\/s00200-014-0218-3","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"4_CR15","unstructured":"Fouque, P.A., et al.: Falcon: Fast-Fourier lattice-based compact signatures over NTRU. \n                      https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/submissions\/Falcon.zip\n                      \n                    . Accessed 26 Nov 2018"},{"key":"4_CR16","unstructured":"Fouque, P.A., et al.: Falcon: Fast-Fourier lattice-based compact signatures over NTRU. \n                      https:\/\/falcon-sign.info\/\n                      \n                    . Accessed 26 Nov 2018"},{"key":"4_CR17","unstructured":"Garcia-Morchon, O., et al.: Round2: KEM and PKE based on GLWR. \n                      https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/submissions\/Round2.zip\n                      \n                    . Accessed 30 Nov 2018"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"G\u00fcneysu, T., Krausz, M., Oder, T., Speith, J.: Evaluation of lattice-based signature schemes in embedded systems. In: 25th IEEE International Conference on Electronics Circuits and Systems (2018)","DOI":"10.1109\/ICECS.2018.8617969"},{"key":"4_CR19","unstructured":"Howe, J.: PQCzoo. \n                      https:\/\/pqczoo.com\/\n                      \n                    . Accessed 13 Nov 2018"},{"issue":"3","key":"4_CR20","doi-asserted-by":"publisher","first-page":"372","DOI":"10.13154\/tches.v2018.i3.372-393","volume":"2018","author":"J Howe","year":"2018","unstructured":"Howe, J., Oder, T., Krausz, M., G\u00fcneysu, T.: Standard lattice-based key encapsulation on embedded devices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 372\u2013393 (2018). \n                      https:\/\/doi.org\/10.13154\/tches.v2018.i3.372-393","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"4_CR21","unstructured":"Hulsing, A., et al.: SPHINCS+. \n                      https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/submissions\/SPHINCS_Plus.zip\n                      \n                    . Accessed 26 Nov 2018"},{"key":"4_CR22","unstructured":"Kannwischer, M.J., Rijneveld, J., Schwabe, P.: Faster multiplication in \n                      \n                        \n                      \n                      $${\\mathbb{z}}_2{}^{\\text{m}}[x]$$\n                      \n                        \n                          \n                            \n                              z\n                              2\n                            \n                            \n                              \n                              m\n                            \n                            \n                              [\n                              x\n                              ]\n                            \n                          \n                        \n                      \n                     on cortex-M4 to speed up NIST PQC candidates. IACR Cryptology ePrint Archive 2018\/1018 (2018). \n                      https:\/\/eprint.iacr.org\/2018\/1018"},{"issue":"3","key":"4_CR23","doi-asserted-by":"publisher","first-page":"243","DOI":"10.13154\/tches.v2018.i3.243-266","volume":"2018","author":"A Karmakar","year":"2018","unstructured":"Karmakar, A., Mera, J.M.B., Roy, S.S., Verbauwhede, I.: Saber on ARM cca-secure module lattice-based key encapsulation on ARM. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 243\u2013266 (2018). \n                      https:\/\/doi.org\/10.13154\/tches.v2018.i3.243-266","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"11","key":"4_CR24","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/TC.2018.2814587","volume":"67","author":"A Karmakar","year":"2018","unstructured":"Karmakar, A., Roy, S.S., Reparaz, O., Vercauteren, F., Verbauwhede, I.: Constant-time discrete Gaussian sampling. IEEE Trans. Comput. 67(11), 1561\u20131571 (2018). \n                      https:\/\/doi.org\/10.1109\/TC.2018.2814587","journal-title":"IEEE Trans. Comput."},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO 1996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). \n                      https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-319-63715-0_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"D Micciancio","year":"2017","unstructured":"Micciancio, D., Walter, M.: Gaussian sampling over the integers: efficient, generic, constant-time. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10402, pp. 455\u2013485. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-63715-0_16"},{"key":"4_CR27","unstructured":"National Institute of Standards and Technology: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process. \n                      https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/call-for-proposals-final-dec-2016.pdf\n                      \n                    . Accessed 14 Nov 2018"},{"key":"4_CR28","unstructured":"Plantard, T., Sipasseuth, A., Dumondelle, C., Susilo, W.: DRS: diagonal dominant reduction for lattice-based signature. \n                      https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/submissions\/DRS.zip\n                      \n                    . Accessed 26 Nov 2018"},{"key":"4_CR29","unstructured":"Rane, A., Lin, C., Tiwari, M.: Secure, precise, and fast floating-point operations on x86 processors. In: Holz, T., Savage, S. (eds.) 25th USENIX Security Symposium, USENIX Security 2016, Austin, TX, USA, 10\u201312 August 2016, pp. 71\u201386. USENIX Association (2016). \n                      https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/rane"},{"key":"4_CR30","unstructured":"Saarinen, M.J.O.: HILA5. \n                      https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/submissions\/Hila5.zip\n                      \n                    . Accessed 30 Nov 2018"},{"key":"4_CR31","unstructured":"Saarinen, M.J.O., Bhattacharya, S., Garc\u00eda-Morch\u00f3n, \u00d3., Rietman, R., Tolhuizen, L., Zhang, Z.: Shorter messages and faster post-quantum encryption with Round5 on Cortex M. IACR Cryptology ePrint Archive 2018\/723 (2018). \n                      https:\/\/eprint.iacr.org\/2018\/723"},{"issue":"2","key":"4_CR32","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999). \n                      https:\/\/doi.org\/10.1137\/S0036144598347011","journal-title":"SIAM Rev."}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-25510-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T07:03:11Z","timestamp":1563001391000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-25510-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030255091","9783030255107"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-25510-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chongquin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}