{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:43:34Z","timestamp":1726065814447},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030393021"},{"type":"electronic","value":"9783030393038"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39303-8_24","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T04:03:03Z","timestamp":1579838583000},"page":"315-327","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Ring-LWE on 8-Bit AVR Embedded Processor"],"prefix":"10.1007","author":[{"given":"Hwajeong","family":"Seo","sequence":"first","affiliation":[]},{"given":"Hyeokdong","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Yongbeen","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Kyungho","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seungju","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Hyunjun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kyoungbae","family":"Jang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,25]]},"reference":[{"unstructured":"Boorghany, A., Sarmadi, S.B., Jalili, R.: On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards. Cryptology ePrint Archive, Report 2014\/514 (2014). \nhttps:\/\/eprint.iacr.org\/2014\/514.pdf","key":"24_CR1"},{"unstructured":"Alkim, E., et al.: Newhope. Technical Report, Technical report, National Institute of Standards and Technology (2017)","key":"24_CR2"},{"unstructured":"Boorghany, A., Jalili, R.: Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers. Cryptology ePrint Archive, Report 2014\/078 (2014)","key":"24_CR3"},{"doi-asserted-by":"crossref","unstructured":"Bos, J., et al.: CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 353\u2013367. IEEE (2018)","key":"24_CR4","DOI":"10.1109\/EuroSP.2018.00032"},{"doi-asserted-by":"crossref","unstructured":"De Clercq, R., Roy, S.S., Vercauteren, F., Verbauwhede, I.: Efficient software implementation of ring-LWE encryption. In: 18th Design, Automation & Test in Europe Conference & Exhibition-DATE (2015)","key":"24_CR5","DOI":"10.7873\/DATE.2015.0378"},{"issue":"3","key":"24_CR6","first-page":"237","volume":"14","author":"Z Liu","year":"2017","unstructured":"Liu, Z., Huang, X., Hu, Z., Khan, M.K., Seo, H., Zhou, L.: On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Trans. Dependable Secure Comput. 14(3), 237\u2013248 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"unstructured":"Liu, Z., Longa, P., Pereira, G., Reparaz, O., Seo, H.: Fourq on embedded devices with strong countermeasures against side-channel attacks. Technical report, Cryptology ePrint Archive, Report 2017\/434, 28, 29 (2017)","key":"24_CR7"},{"issue":"4","key":"24_CR8","first-page":"117","volume":"16","author":"Z Liu","year":"2017","unstructured":"Liu, Z., et al.: High-performance ideal lattice-based cryptography on 8-bit AVR microcontrollers. ACM Trans. Embedded Comput. Syst. (TECS) 16(4), 117 (2017)","journal-title":"ACM Trans. Embedded Comput. Syst. (TECS)"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-319-02726-5_22","volume-title":"Information and Communications Security","author":"Z Liu","year":"2013","unstructured":"Liu, Z., Seo, H., Gro\u00dfsch\u00e4dl, J., Kim, H.: Efficient implementation of NIST-compliant elliptic curve cryptography for sensor nodes. In: Qing, S., Zhou, J., Liu, D. (eds.) ICICS 2013. LNCS, vol. 8233, pp. 302\u2013317. Springer, Cham (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-319-02726-5_22"},{"issue":"7","key":"24_CR10","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1109\/TIFS.2015.2491261","volume":"11","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Seo, H., Gro\u00dfsch\u00e4dl, J., Kim, H.: Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes. IEEE Trans. Inf. Forensics Secur. 11(7), 1385\u20131397 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Liu, Z., Seo, H., Hu, Z., Hunag, X., Gro\u00dfsch\u00e4dl, J.: Efficient implementation of ECDH key exchange for MSP430-based wireless sensor networks. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 145\u2013153. ACM (2015)","key":"24_CR11","DOI":"10.1145\/2714576.2714608"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/978-3-662-48324-4_33","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"Z Liu","year":"2015","unstructured":"Liu, Z., Seo, H., Sinha Roy, S., Gro\u00dfsch\u00e4dl, J., Kim, H., Verbauwhede, I.: Efficient ring-LWE encryption on 8-Bit AVR processors. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 663\u2013682. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-48324-4_33"},{"issue":"18","key":"24_CR13","doi-asserted-by":"publisher","first-page":"3301","DOI":"10.1002\/sec.1254","volume":"8","author":"Z Liu","year":"2015","unstructured":"Liu, Z., Seo, H., Xu, Q.: Performance evaluation of twisted edwards-form elliptic curve cryptography for wireless sensor nodes. Secur. Commun. Netw. 8(18), 3301\u20133310 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"24_CR14","first-page":"53","volume":"16","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Weng, J., Hu, Z., Seo, H.: Efficient elliptic curve cryptography for embedded devices. ACM Trans. Embedded Comput. Syst. (TECS) 16(2), 53 (2016)","journal-title":"ACM Trans. Embedded Comput. Syst. (TECS)"},{"unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors Over Rings. Cryptology ePrint Archive, Report 2012\/230 (2012)","key":"24_CR15"},{"doi-asserted-by":"crossref","unstructured":"Oder, T., P\u00f6ppelmann, T., G\u00fcneysu, T.: Beyond ECDSA and RSA: lattice-based digital signatures on constrained devices. In: 51st Annual Design Automation Conference-DAC (2014)","key":"24_CR16","DOI":"10.1109\/DAC.2014.6881437"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-319-22174-8_19","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2015","author":"T P\u00f6ppelmann","year":"2015","unstructured":"P\u00f6ppelmann, T., Oder, T., G\u00fcneysu, T.: High-performance ideal lattice-based cryptography on 8-Bit ATxmega microcontrollers. In: Lauter, K., Rodr\u00edguez-Henr\u00edquez, F. (eds.) LATINCRYPT 2015. LNCS, vol. 9230, pp. 346\u2013365. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-22174-8_19"},{"issue":"5","key":"24_CR18","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s00779-017-1044-y","volume":"21","author":"L Qiu","year":"2017","unstructured":"Qiu, L., Liu, Z., Pereira, G.C., Seo, H.: Implementing RSA for sensor nodes in smart cities. Pers. Ubiquit. Comput. 21(5), 807\u2013813 (2017)","journal-title":"Pers. Ubiquit. Comput."},{"doi-asserted-by":"crossref","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: 37th Annual ACM Symposium on Theory of Computing, pp. 84\u201393 (2005)","key":"24_CR19","DOI":"10.1145\/1060590.1060603"},{"unstructured":"Roy, S.S., Reparaz, O., Vercauteren, F., Verbauwhede, I.: Compact and side channel secure discrete gaussian sampling (2014)","key":"24_CR20"},{"key":"24_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-662-44709-3_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"SS Roy","year":"2014","unstructured":"Roy, S.S., Vercauteren, F., Mentens, N., Chen, D.D., Verbauwhede, I.: Compact ring-LWE cryptoprocessor. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 371\u2013391. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44709-3_21"},{"issue":"3","key":"24_CR22","first-page":"160","volume":"15","author":"H Seo","year":"2017","unstructured":"Seo, H., Kim, H.: MoTE-ECC based encryption on MSP430. J. Inf. Commun. Converg. Eng. 15(3), 160\u2013164 (2017)","journal-title":"J. Inf. Commun. Converg. Eng."},{"issue":"18","key":"24_CR23","doi-asserted-by":"publisher","first-page":"5401","DOI":"10.1002\/sec.1706","volume":"9","author":"H Seo","year":"2016","unstructured":"Seo, H., Liu, Z., Gro\u00dfsch\u00e4dl, J., Kim, H.: Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation. Secur. Commun. Netw. 9(18), 5401\u20135411 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"24_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-319-30840-1_11","volume-title":"Information Security and Cryptology - ICISC 2015","author":"H Seo","year":"2016","unstructured":"Seo, H., Liu, Z., Nogami, Y., Park, T., Choi, J., Zhou, L., Kim, H.: Faster ECC over $$\\mathbb{F}_{2^{521}-1}$$ (feat. NEON). In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 169\u2013181. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-30840-1_11"},{"key":"24_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-319-78556-1_10","volume-title":"Information Security and Cryptology \u2013 ICISC 2017","author":"H Seo","year":"2018","unstructured":"Seo, H., Liu, Z., Park, T., Kwon, H., Lee, S., Kim, H.: Secure number theoretic transform and\u00a0speed record for ring-LWE encryption on embedded processors. In: Kim, H., Kim, D.-C. (eds.) ICISC 2017. LNCS, vol. 10779, pp. 175\u2013188. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-78556-1_10"},{"unstructured":"Seo, H.: Faster (feat. ECC PMULL) over F2571. In: A Systems Approach to Cyber Security: Proceedings of the 2nd Singapore Cyber-Security R&D Conference (SG-CRC 2017), vol. 15, p. 97. IOS Press (2017)","key":"24_CR26"},{"unstructured":"Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, 1994 Proceedings, pp. 124\u2013134, November 1994","key":"24_CR27"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39303-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T04:05:18Z","timestamp":1579838718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-39303-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030393021","9783030393038"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39303-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}