{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:05Z","timestamp":1772119985119,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031308710","type":"print"},{"value":"9783031308727","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30872-7_18","type":"book-chapter","created":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T09:03:56Z","timestamp":1681808636000},"page":"469-490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Flexible Shared Hardware Accelerator for\u00a0NIST-Recommended Algorithms CRYSTALS-Kyber and\u00a0CRYSTALS-Dilithium with\u00a0SCA Protection"],"prefix":"10.1007","author":[{"given":"Luke","family":"Beckwith","sequence":"first","affiliation":[]},{"given":"Abubakr","family":"Abdulgadir","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997). ISSN 0097\u20135397, 1095\u20137111. https:\/\/doi.org\/10.1137\/S0097539795293172arXiv:quant-ph\/9508027","DOI":"10.1137\/S0097539795293172"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH (preliminary version). Cryptology ePrint Archive 2022\/975","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Beullens, W.: Breaking rainbow takes a weekend on a laptop. Cryptology ePrint Archive 2022\/214","DOI":"10.1007\/978-3-031-15979-4_16"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Moody, D.: Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. Technical Report NIST IR 8413, National Institute of Standards and Technology, Gaithersburg, MD (2022). https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2022\/NIST.IR.8413.pdf","DOI":"10.6028\/NIST.IR.8413"},{"key":"18_CR5","unstructured":"NSA. Cybersecurity Advisory Announcing the Commercial National Security Algorithm Suite 2.0 (2022). https:\/\/media.defense.gov\/2022\/Sep\/07\/2003071834\/-1\/-1\/0\/CSA_CNSA_2.0_ALGORITHMS_.PDF"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Xing, Y., Li, S.: A compact hardware implementation of CCA-secure key exchange mechanism CRYSTALS-KYBER on FPGA. IACR Trans. Cryptograph. Hardware Embed. Syst. (2021). ISSN 2569\u20132925. 10.46586\/tches.v2021.i2.328-356. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8797","DOI":"10.46586\/tches.v2021.i2.328-356"},{"key":"18_CR7","unstructured":"Dang, V., Mohajerani, K., Gaj, K.: High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber. Cryptology ePrint Archive 2021\/1508"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-030-97348-3_12","volume-title":"Smart Card Research and Advanced Applications","author":"G Land","year":"2022","unstructured":"Land, G., Sasdrich, P., G\u00fcneysu, T.: A hard crystal - implementing dilithium on reconfigurable hardware. In: Grosso, V., P\u00f6ppelmann, T. (eds.) CARDIS 2021. LNCS, vol. 13173, pp. 210\u2013230. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-97348-3_12 ISBN 978-3-030-97348-3"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Beckwith, L., Nguyen, D.T., Gaj, K.: High-performance hardware implementation of CRYSTALS-dilithium. In: 2021 International Conference on Field-Programmable Technology (ICFPT) (2021)","DOI":"10.1109\/ICFPT52863.2021.9609917"},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Zhao, C., et al.: A Compact and high-performance hardware architecture for CRYSTALS-Dilithium. IACR Trans. Cryptograph. Hardware Embed. Syst. 2022, 270\u2013295 (2022). ISSN 2569\u20132925. https:\/\/doi.org\/10.46586\/tches.v2022.i1.270-295. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9297","DOI":"10.46586\/tches.v2022.i1.270-295"},{"key":"18_CR11","unstructured":"Mert, A.C., Jacquemin, D., Das, A., Matthews, D., Ghosh, S., Roy, S.S.: A unified cryptoprocessor for lattice-based signature and key-exchange. Cryptology ePrint Archive 2021\/1461"},{"key":"18_CR12","unstructured":"Aikata, A., Mert, A.C., Imran, M., Pagliarini, S., Roy, S.S.: KaLi: a crystal for post-quantum security. Cryptology ePrint Archive 2022\/1086"},{"key":"18_CR13","unstructured":"Avanzi, R., et al.: Kyber - Algorithm specifications and supporting documentation. https:\/\/pq-crystals.org\/kyber\/resources.shtml"},{"key":"18_CR14","unstructured":"Bai, S., et al.: CRYSTALS-Dilithium. https:\/\/pq-crystals.org\/dilithium\/resources.shtml"},{"key":"18_CR15","doi-asserted-by":"publisher","unstructured":"Goos, G., Hartmanis, J., van Leeuwen, J., Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, Michael (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537\u2013554. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1","DOI":"10.1007\/3-540-48405-1"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-030-44534-8_19","volume-title":"Applied Reconfigurable Computing. Architectures, Tools, and Applications","author":"DT Nguyen","year":"2020","unstructured":"Nguyen, D.T., Dang, V.B., Gaj, K.: High-level synthesis in implementing and benchmarking number theoretic transform in lattice-based post-quantum cryptography using software\/hardware codesign. In: Rinc\u00f3n, F., Barba, J., So, H.K.H., Diniz, P., Caba, J. (eds.) ARC 2020. LNCS, vol. 12083, pp. 247\u2013257. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44534-8_19"},{"key":"18_CR17","doi-asserted-by":"publisher","unstructured":"Fritzmann, T., et al.: Masked accelerators and instruction set extensions for post-quantum cryptography. IACR Trans. Cryptograph. Hardware Embed. Syst. 2022, 414\u2013460 (2021). ISSN 2569\u20132925. https:\/\/doi.org\/10.46586\/tches.v2022.i1.414-460. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9303","DOI":"10.46586\/tches.v2022.i1.414-460"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Bos, J.W., Gourjon, M., Renes, J., Schneider, T.: Masking Kyber: First- and Higher-Order Implementations. Cryptology ePrint Archive 2021\/483","DOI":"10.46586\/tches.v2021.i4.173-214"},{"key":"18_CR19","unstructured":"Heinz, D., Kannwischer, M.J., Land, G., Schwabe, P., Sprenkels, D.: First-Order Masked Kyber on ARM Cortex-M4. Cryptology ePrint Archive 2022\/058"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30872-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T14:19:31Z","timestamp":1729261171000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30872-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031308710","9783031308727"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30872-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CT-RSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cryptographers\u2019 Track at the RSA Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Francisco, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ctrsa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ct-rsa-2023.eecs.oregonstate.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}