{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T22:55:10Z","timestamp":1754261710668,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030410247"},{"type":"electronic","value":"9783030410254"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41025-4_8","type":"book-chapter","created":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T14:03:38Z","timestamp":1582812218000},"page":"109-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7208-2514","authenticated-orcid":false,"given":"Lukas","family":"Malina","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0842-4951","authenticated-orcid":false,"given":"Sara","family":"Ricci","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4366-3950","authenticated-orcid":false,"given":"Petr","family":"Dzurenda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1996-5334","authenticated-orcid":false,"given":"David","family":"Smekal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2831-1073","authenticated-orcid":false,"given":"Jan","family":"Hajny","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8282-7180","authenticated-orcid":false,"given":"Tomas","family":"Gerlich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"key":"8_CR1","unstructured":"NIST - Computer Security Resource Center (CSRC). \nhttps:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/round-2-submissions"},{"issue":"1","key":"8_CR2","first-page":"169","volume":"2019","author":"MR Albrecht","year":"2019","unstructured":"Albrecht, M.R., Hanser, C., Hoeller, A., P\u00f6ppelmann, T., Virdia, F., Wallner, A.: Implementing RLWE-based schemes using an RSA co-processor. IACR Trans. Cryptograph. Hardware Embedded Syst. 2019(1), 169\u2013208 (2019)","journal-title":"IACR Trans. Cryptograph. Hardware Embedded Syst."},{"key":"8_CR3","unstructured":"Alkim, E., Ducas, L., P\u00f6ppelmann, T., Schwabe, P.: Post-quantum key exchange-a new hope. In: USENIX Security Symposium, vol. 2016 (2016)"},{"key":"8_CR4","first-page":"47","volume":"2019","author":"K Basu","year":"2019","unstructured":"Basu, K., Soni, D., Nabeel, M., Karri, R.: NIST post-quantum cryptography-a hardware evaluation study. IACR Cryptol. ePrint Archive 2019, 47 (2019)","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/978-1-4419-5906-5","volume-title":"Encyclopedia of Cryptography and Security","author":"DJ Bernstein","year":"2011","unstructured":"Bernstein, D.J.: Post-quantum cryptography. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 949\u2013950. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-1-4419-5906-5"},{"key":"8_CR6","unstructured":"Bertoni, G., Daemen, J., Hoffert, S., Peeters, M., Van Assche, G., Van Keer, R.: Extended keccak code package. \nhttps:\/\/github.com\/XKCP\/XKCP"},{"key":"8_CR7","first-page":"78","volume":"2014","author":"A Boorghany","year":"2014","unstructured":"Boorghany, A., Jalili, R.: Implementation and comparison of lattice-based identification protocols on smart cards and microcontrollers. IACR Cryptol. ePrint Archive 2014, 78 (2014)","journal-title":"IACR Cryptol. ePrint Archive"},{"issue":"3","key":"8_CR8","first-page":"42","volume":"14","author":"A Boorghany","year":"2015","unstructured":"Boorghany, A., Sarmadi, S.B., Jalili, R.: On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards. ACM Trans. Embedded Comput. Syst. (TECS) 14(3), 42 (2015)","journal-title":"ACM Trans. Embedded Comput. Syst. (TECS)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Bos, J., et al.: Frodo: take off the ring! practical, quantum-secure key exchange from LWE. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1006\u20131018. ACM (2016)","DOI":"10.1145\/2976749.2978425"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Bos, J., et al.: CRYSTALS-kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE (2018)","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-24691-6_24","volume-title":"Information Security and Cryptology - ICISC 2003","author":"J-M Chen","year":"2004","unstructured":"Chen, J.-M., Yang, B.-Y.: A more secure and efficacious TTS signature scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 320\u2013338. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24691-6_24"},{"key":"8_CR12","volume-title":"The Design of Rijndael: AES-the Advanced Encryption Standard","author":"J Daemen","year":"2013","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Berlin (2013)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11496137_12","volume-title":"Applied Cryptography and Network Security","author":"J Ding","year":"2005","unstructured":"Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164\u2013175. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11496137_12"},{"key":"8_CR14","first-page":"5500","volume":"6","author":"S Ebrahimi","year":"2019","unstructured":"Ebrahimi, S., Bayat-Sarmadi, S., Mosanaei-Boorani, H.: Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT. IEEE IoT J. 6, 5500\u20135507 (2019)","journal-title":"IEEE IoT J."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Ferozpuri, A., Gaj, K.: High-speed FPGA implementation of the NIST round 1 rainbow signature scheme. In: 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/RECONFIG.2018.8641734"},{"key":"8_CR16","unstructured":"OpenSSL Foundation: OpenSSL cryptography and SSL\/TLS toolkit. \nhttps:\/\/www.openssl.org\/"},{"key":"8_CR17","unstructured":"Granlund, T.: The GNU multiple precision arithmetic library. \nhttps:\/\/gmplib.org\/"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"Algorithmic Number Theory","author":"J Hoffstein","year":"1998","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267\u2013288. Springer, Heidelberg (1998). \nhttps:\/\/doi.org\/10.1007\/BFb0054868"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Howe, J., Rafferty, C., Khalid, A., O\u2019Neill, M.: Compact and provably secure lattice-based signatures in hardware. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/ISCAS.2017.8050566"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-25405-5_2","volume-title":"Post-Quantum Cryptography","author":"D Jao","year":"2011","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 19\u201334. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-25405-5_2"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/3-540-48910-X_15","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"A Kipnis","year":"1999","unstructured":"Kipnis, A., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206\u2013222. Springer, Heidelberg (1999). \nhttps:\/\/doi.org\/10.1007\/3-540-48910-X_15"},{"issue":"1","key":"8_CR22","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/TCSI.2016.2611561","volume":"64","author":"B Koziel","year":"2016","unstructured":"Koziel, B., Azarderakhsh, R., Kermani, M.M., Jao, D.: Post-quantum cryptography on FPGA based on isogenies on elliptic curves. IEEE Trans. Circuits Syst. I Regul. Pap. 64(1), 86\u201399 (2016)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"8_CR23","first-page":"690","volume":"2017","author":"PC Kuo","year":"2017","unstructured":"Kuo, P.C., et al.: Post-quantum key exchange on FPGAs. IACR Cryptol. ePrint Archive 2017, 690 (2017)","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"8_CR24","unstructured":"Lamport, L.: Constructing digital signatures from a one-way function. Technical report, Technical Report CSL-98, SRI International Palo Alto (1979)"},{"issue":"11","key":"8_CR25","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1038\/nphoton.2012.259","volume":"6","author":"E Mart\u00edn-L\u00f3pez","year":"2012","unstructured":"Mart\u00edn-L\u00f3pez, E., Laing, A., Lawson, T., Alvarez, R., Zhou, X.Q., O\u2019brien, J.L.: Experimental realization of Shor\u2019s quantum factoring algorithm using qubit recycling. Nat. Photonics 6(11), 773 (2012)","journal-title":"Nat. Photonics"},{"key":"8_CR26","first-page":"114","volume":"4244","author":"RJ Mceliece","year":"1978","unstructured":"Mceliece, R.J.: A public-key cryptosystem based on algebraic. Coding Thv 4244, 114\u2013116 (1978)","journal-title":"Coding Thv"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology \u2014 CRYPTO 1989 Proceedings","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, New York (1990). \nhttps:\/\/doi.org\/10.1007\/0-387-34805-0_21"},{"key":"8_CR28","unstructured":"Moses, T.: Quantum computing and cryptography. Entrust Inc., January 2009"},{"key":"8_CR29","unstructured":"Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Software and hardware implementation of lattice-cased cryptography schemes (2017)"},{"issue":"6","key":"8_CR30","doi-asserted-by":"publisher","first-page":"129:1","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Post-quantum lattice-based cryptography implementations: a survey. ACM Comput. Surv. 51(6), 129:1\u2013129:41 (2019). \nhttps:\/\/doi.org\/10.1145\/3292548\n\n. \nhttp:\/\/doi.acm.org.ezproxy.lib.vutbr.cz\/10.1145\/3292548","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"8_CR31","first-page":"159","volume":"15","author":"H Niederreiter","year":"1986","unstructured":"Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Prob. Control Inf. Theory 15(2), 159\u2013166 (1986)","journal-title":"Prob. Control Inf. Theory"},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-030-25283-0_7","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2017","author":"T Oder","year":"2019","unstructured":"Oder, T., G\u00fcneysu, T.: Implementing the newhope-simple key exchange on low-cost FPGAs. In: Lange, T., Dunkelman, O. (eds.) LATINCRYPT 2017. LNCS, vol. 11368, pp. 128\u2013142. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-25283-0_7"},{"key":"8_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/3-540-68339-9_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1996","author":"J Patarin","year":"1996","unstructured":"Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of asymmetric algorithms. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 33\u201348. Springer, Heidelberg (1996). \nhttps:\/\/doi.org\/10.1007\/3-540-68339-9_4"},{"issue":"6","key":"8_CR34","first-page":"305","volume":"59","author":"T P\u00f6ppelmann","year":"2017","unstructured":"P\u00f6ppelmann, T.: Efficient implementation of ideal lattice-based cryptography. IT-Inf. Technol. 59(6), 305\u2013309 (2017)","journal-title":"IT-Inf. Technol."},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Saarinen, M.J.O.: Ring-LWE ciphertext compression and error correction: tools for lightweight post-quantum cryptography. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 15\u201322. ACM (2017)","DOI":"10.1145\/3055245.3055254"},{"key":"8_CR36","unstructured":"Shoup, V.: NTL: a library for doing number theory. \nhttps:\/\/shoup.net\/ntl\/"},{"key":"8_CR37","unstructured":"Soni, D., Basu, K., Nabeel, M., Karri, R.: A hardware evaluation study of NIST post-quantum cryptographic signature schemes (2020)"},{"key":"8_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-12368-9_4","volume-title":"Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices","author":"F Strenzke","year":"2010","unstructured":"Strenzke, F.: A smart card implementation of the McEliece PKC. In: Samarati, P., Tunstall, M., Posegga, J., Markantonakis, K., Sauveron, D. (eds.) WISTP 2010. LNCS, vol. 6033, pp. 47\u201359. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-12368-9_4"},{"key":"8_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-319-79063-3_4","volume-title":"Post-Quantum Cryptography","author":"W Wang","year":"2018","unstructured":"Wang, W., Szefer, J., Niederhagen, R.: FPGA-based niederreiter cryptosystem using binary goppa codes. In: Lange, T., Steinwandt, R. (eds.) PQCrypto 2018. LNCS, vol. 10786, pp. 77\u201398. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-79063-3_4"},{"key":"8_CR40","doi-asserted-by":"crossref","unstructured":"Yuan, Y., Fukushima, K., Kiyomoto, S., Takagi, T.: Memory-constrained implementation of lattice-based encryption scheme on standard Java card. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 47\u201350. IEEE (2017)","DOI":"10.1109\/HST.2017.7951796"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41025-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T00:15:51Z","timestamp":1582848951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41025-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030410247","9783030410254"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41025-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}