{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T01:14:35Z","timestamp":1769303675337,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030497842","type":"print"},{"value":"9783030497859","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-49785-9_8","type":"book-chapter","created":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T23:08:13Z","timestamp":1593040093000},"page":"110-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Fast Polynomial Inversion for Post Quantum QC-MDPC Cryptography"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7273-4797","authenticated-orcid":false,"given":"Nir","family":"Drucker","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9145-7609","authenticated-orcid":false,"given":"Shay","family":"Gueron","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7415-1587","authenticated-orcid":false,"given":"Dusan","family":"Kostic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,25]]},"reference":[{"key":"8_CR1","unstructured":"Aguilar Melchor, C., et al.: Hamming Quasi-Cyclic (HQC) (2017). \nhttps:\/\/pqc-hqc.org\/doc\/ hqc-specification_2017-11-30.pdf"},{"key":"8_CR2","unstructured":"Amazon Web Services: s2n (2020). \nhttps:\/\/github.com\/awslabs\/s2n\n\n. Accessed 16 Feb 2020"},{"key":"8_CR3","unstructured":"Aragon, N., et al.: BIKE: Bit Flipping Key Encapsulation (2017). \nhttps:\/\/bikesuite.org\/files\/round2\/spec\/BIKE-Spec-2019.06.30.1.pdf"},{"key":"8_CR4","unstructured":"Baldi, M., Barenghi, A., Chiaraluce, F., Pelosi, G., Santini, P.: LEDAcrypt (2019). \nhttps:\/\/www.ledacrypt.org\/"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., Yang, B.Y.: Fast constant-time GCD computation and modular inversion. IACR Trans. Crypt. Hardw. Embed. Syst. 2019(3), 340\u2013398 (2019). \nhttps:\/\/doi.org\/10.13154\/tches.v2019.i3.340-398","DOI":"10.13154\/tches.v2019.i3.340-398"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-12678-9_14","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"JW Bos","year":"2010","unstructured":"Bos, J.W., Kleinjung, T., Niederhagen, R., Schwabe, P.: ECC2K-130 on cell CPUs. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 225\u2013242. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-12678-9_14"},{"issue":"3","key":"8_CR7","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/TC.2004.1261843","volume":"53","author":"W Chien-Hsing","year":"2004","unstructured":"Chien-Hsing, W., Chien-Ming, W., Shieh, M.-D., Hwang, Y.-T.: High-speed, low-complexity systolic designs of novel iterative division algorithms in $$gf(2^m)$$. IEEE Trans. Comput. 53(3), 375\u2013380 (2004). \nhttps:\/\/doi.org\/10.1109\/TC.2004.1261843","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"8_CR8","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s13389-018-00200-4","volume":"9","author":"N Drucker","year":"2019","unstructured":"Drucker, N., Gueron, S.: A toolbox for software optimization of QC-MDPC code-based cryptosystems. J. Crypt. Eng. 9(4), 341\u2013357 (2019). \nhttps:\/\/doi.org\/10.1007\/s13389-018-00200-4","journal-title":"J. Crypt. Eng."},{"key":"8_CR9","unstructured":"Drucker, N., Gueron, S., Kostic, D.: Additional implementation of BIKE. \nhttps:\/\/bikesuite.org\/additional.html\n\n (2019)"},{"key":"8_CR10","unstructured":"Drucker, N., Gueron, S., Kostic, D.: QC-MDPC decoders with several shades of gray. Technical report. Report 2019\/1423, December 2019. \nhttps:\/\/eprint.iacr.org\/2019\/1423"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Drucker, N., Gueron, S., Krasnov, V.: Fast multiplication of binary polynomials with the forthcoming vectorized VPCLMULQDQ instruction. In: 2018 IEEE 25th Symposium on Computer Arithmetic (ARITH), pp. 115\u2013119, June 2018. \nhttps:\/\/doi.org\/10.1109\/ARITH.2018.8464777","DOI":"10.1109\/ARITH.2018.8464777"},{"key":"8_CR12","unstructured":"Gueron, S.: October 2018. \nhttps:\/\/github.com\/open-quantum-safe\/openssl\/issues\/42#issuecomment-433452096"},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Guimar, A., Borin, E., Aranha, D.F., Guimar\u00e3es, A., Borin, E., Aranha,D.F.: Introducing arithmetic failures to accelerate QC-MDPC code-based cryptography. Code-Based Cryptogr. 2, 44\u201368 (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-25922-8","DOI":"10.1007\/978-3-030-25922-8"},{"issue":"18","key":"8_CR14","doi-asserted-by":"publisher","first-page":"e5089","DOI":"10.1002\/cpe.5089","volume":"31","author":"A Guimar\u00e3es","year":"2019","unstructured":"Guimar\u00e3es, A., Aranha, D.F., Borin, E.: Optimized implementation of QC-MDPC code-based cryptography. Concurr. Comput.: Pract. Exp. 31(18), e5089 (2019). \nhttps:\/\/doi.org\/10.1002\/cpe.5089","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-319-66787-4_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"A H\u00fclsing","year":"2017","unstructured":"H\u00fclsing, A., Rijneveld, J., Schanck, J., Schwabe, P.: High-speed key encapsulation from NTRU. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 232\u2013252. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-66787-4_12"},{"issue":"3","key":"8_CR16","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","volume":"78","author":"T Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: A fast algorithm for computing multiplicative inverses in GF(2$$^{{\\rm m}}$$) using normal bases. Inf. Comput. 78(3), 171\u2013177 (1988). \nhttps:\/\/doi.org\/10.1016\/0890-5401(88)90024-7","journal-title":"Inf. Comput."},{"key":"8_CR17","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Netw. Prog. Rep. 44, 114\u2013116 (1978). \nhttps:\/\/ui.adsabs.harvard.edu\/abs\/1978DSNPR..44..114M"},{"key":"8_CR18","unstructured":"Misoczki, R.: BIKE - bit-flipping key encapsulation (2019). \nhttps:\/\/csrc.nist.gov\/CSRC\/media\/Presentations\/bike-round-2-presentation\/images-media\/bike-misoczki.pdf\n\n. Accessed 18 Feb 2020"},{"key":"8_CR19","unstructured":"Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Prob. Contr. Inform. Theory 15(2), 157\u2013166 (1986). \nhttps:\/\/ci.nii.ac.jp\/naid\/80003180051\/en\/"},{"key":"8_CR20","unstructured":"NIST: Post-Quantum Cryptography (2019). \nhttps:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\n\n. Accessed 20 Aug 2019"},{"key":"8_CR21","unstructured":"Open Quantum Safe Project: liboqs (2020). \nhttps:\/\/github.com\/open-quantum-safe\/liboqs\n\n. Accessed 16 Feb 2020"},{"key":"8_CR22","unstructured":"Pierrick G., Richard Brent, P.Z., Thome, E.: gf2x-1.2, July 2017. \nhttps:\/\/gforge.inria.fr\/projects\/gf2x\/"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/978-3-030-25510-7_22","volume-title":"Post-Quantum Cryptography","author":"N Sendrier","year":"2019","unstructured":"Sendrier, N., Vasseur, V.: On the decoding failure rate of QC-MDPC bit-flipping decoders. In: Ding, J., Steinwandt, R. (eds.) PQCrypto 2019. LNCS, vol. 11505, pp. 404\u2013416. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-25510-7_22"},{"key":"8_CR24","unstructured":"Shoup, V.: Number theory C++ library (NTL) version 11.3.2, November 2018. \nhttp:\/\/www.shoup.net\/ntl"},{"key":"8_CR25","unstructured":"The OpenSSL Project: OpenSSL 1.1.1: The open source toolkit for SSL\/TLS. \nhttps:\/\/github.com\/openssl\/openssl"}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49785-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T23:09:23Z","timestamp":1593040163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49785-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030497842","9783030497859"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49785-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSCML","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyber Security Cryptography and Machine Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Be'er Sheva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cscml2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cs.bgu.ac.il\/~fradmin\/cscml20\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}