{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T14:49:59Z","timestamp":1775227799807,"version":"3.50.1"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031376788","type":"print"},{"value":"9783031376795","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37679-5_18","type":"book-chapter","created":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T20:31:15Z","timestamp":1689193875000},"page":"417-441","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Fast Falcon Signature Generation and\u00a0Verification Using ARMv8 NEON Instructions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3739-7991","authenticated-orcid":false,"given":"Duc Tri","family":"Nguyen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5050-8748","authenticated-orcid":false,"given":"Kris","family":"Gaj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1007\/978-3-031-09234-3_42","volume-title":"Applied Cryptography and Network Security, ACNS 2022","author":"A Abdulrahman","year":"2022","unstructured":"Abdulrahman, A., Hwang, V., Kannwischer, M.J., Sprenkels, D.: Faster kyber and dilithium on the Cortex-M4. In: Ateniese, G., Venturi, D. (eds.) Applied Cryptography and Network Security, ACNS 2022. Lecture Notes in Computer Science, vol. 13269, pp. 853\u2013871. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-09234-3_42"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Alagic, G., et al.: Status report on the third round of the NIST post-quantum cryptography standardization process (2022)","DOI":"10.6028\/NIST.IR.8413"},{"issue":"3","key":"18_CR3","doi-asserted-by":"publisher","first-page":"336","DOI":"10.46586\/tches.v2020.i3.336-357","volume":"2020","author":"E Alkim","year":"2020","unstructured":"Alkim, E., Bilgin, Y.A., Cenk, M., G\u00e9rard, F.: Cortex-M4 optimizations for R, MLWE schemes. IACR TCHES 2020(3), 336\u2013357 (2020)","journal-title":"IACR TCHES"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Andrysco, M., N\u00f6tzli, A., Brown, F., Jhala, R., Stefan, D.: Towards verified, constant-time floating point operations. In: ACM CCS 2018, pp. 1369\u20131382 (2018)","DOI":"10.1145\/3243734.3243766"},{"key":"18_CR5","unstructured":"Bai, S., et al.: CRYSTALS-Dilithium: Algorithm Specifications and Supporting Documentation (Version 3.1) (2021)"},{"key":"18_CR6","first-page":"221","volume":"1","author":"H Becker","year":"2022","unstructured":"Becker, H., Hwang, V., Kannwischer, M.J., Yang, B.Y., Yang, S.Y.: Neon NTT: faster dilithium, kyber, and saber on cortex-A72 and apple M1. IACR TCHES 1, 221\u2013244 (2022)","journal-title":"IACR TCHES"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Becker, H., Kannwischer, M.J.: Hybrid scalar\/vector implementations of Keccak and SPHINCS+ on AArch64. Cryptology ePrint Archive, Report 2022\/1243","DOI":"10.1007\/978-3-031-22912-1_12"},{"issue":"1","key":"18_CR8","first-page":"482","volume":"2022","author":"H Becker","year":"2022","unstructured":"Becker, H., Mera, J.M.B., Karmakar, A., Yiu, J., Verbauwhede, I.: Polynomial multiplication on embedded vector architectures. IACR TCHES 2022(1), 482\u2013505 (2022)","journal-title":"IACR TCHES"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1109\/TSP.2021.3060279","volume":"69","author":"A Becoulet","year":"2021","unstructured":"Becoulet, A., Verguet, A.: A depth-first iterative algorithm for the conjugate pair fast Fourier transform. IEEE Trans. Sig. Process. 69, 1537\u20131547 (2021). https:\/\/doi.org\/10.1109\/TSP.2021.3060279","journal-title":"IEEE Trans. Sig. Process."},{"key":"18_CR10","unstructured":"Bennett, H., Ganju, A., Peetathawatchai, P., Stephens-Davidowitz, N.: Just how hard are rotations of $$\\mathbb{{Z}} ^n$$? Algorithms and cryptography with the simplest lattice. Cryptology ePrint Archive, Report 2021\/1548 (2021)"},{"key":"18_CR11","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS+ signature framework. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (2019)"},{"key":"18_CR12","unstructured":"Bindel, N., McCarthy, S., Twardokus, G., Rahbari, H.: Drive (Quantum) safe! - towards post-quantum security for V2V communications. Cryptology ePrint Archive, Paper 2022\/483 (2022)"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"4707","DOI":"10.1109\/TSP.2013.2273199","volume":"61","author":"AM Blake","year":"2013","unstructured":"Blake, A.M., Witten, I.H., Cree, M.J.: The fastest Fourier transform in the south. IEEE Trans. Sig. Proc. 61, 4707\u20134716 (2013)","journal-title":"IEEE Trans. Sig. Proc."},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-030-23696-0_11","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2019","author":"L Botros","year":"2019","unstructured":"Botros, L., Kannwischer, M.J., Schwabe, P.: Memory-efficient high-speed implementation of Kyber on Cortex-M4. In: Buchmann, J., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2019. LNCS, vol. 11627, pp. 209\u2013228. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23696-0_11"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-25405-5_8","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., H\u00fclsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117\u2013129. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5_8"},{"key":"18_CR16","unstructured":"Chen, L., et al.: Report on post-quantum cryptography. Technical Report. NIST IR 8105, National Institute of Standards and Technology (2016)"},{"issue":"2","key":"18_CR17","doi-asserted-by":"publisher","first-page":"159","DOI":"10.46586\/tches.v2021.i2.159-188","volume":"2021","author":"CMM Chung","year":"2021","unstructured":"Chung, C.M.M., Hwang, V., Kannwischer, M.J., Seiler, G., Shih, C.J., Yang, B.Y.: NTT multiplication for NTT-unfriendly rings: new speed records for saber and NTRU on Cortex-M4 and AVX2. IACR Trans. Cryptographic Hardw. Embed. Syst. 2021(2), 159\u2013188 (2021)","journal-title":"IACR Trans. Cryptographic Hardw. Embed. Syst."},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"JW Cooley","year":"1965","unstructured":"Cooley, J.W., Tukey, J.W.: An algorithm for the machine calculation of complex Fourier series. Math. Comput. 19, 297\u2013301 (1965)","journal-title":"Math. Comput."},{"key":"18_CR19","first-page":"208","volume":"800","author":"DA Cooper","year":"2020","unstructured":"Cooper, D.A., et al.: Recommendation for stateful hash-based signature schemes. NIST Spec. Publ. SP 800, 208 (2020)","journal-title":"NIST Spec. Publ. SP"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-42045-0_4","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"\u00d6 Dagdelen","year":"2013","unstructured":"Dagdelen, \u00d6., Fischlin, M., Gagliardoni, T.: The Fiat\u2013Shamir transformation in a quantum world. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8270, pp. 62\u201381. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-42045-0_4"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Ducas, L., Postlethwaite, E.W., Pulles, L.N., van Woerden, W.: Hawk: module LIP makes lattice signatures fast, compact and simple. Cryptology ePrint Archive, Report 2022\/1155 (2022). https:\/\/eprint.iacr.org\/2022\/1155","DOI":"10.1007\/978-3-031-22972-5_3"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-031-07082-2_23","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2022","author":"L Ducas","year":"2022","unstructured":"Ducas, L., van Woerden, W.P.J.: On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT 2022, Part III. Lecture Notes in Computer Science, vol. 13277, pp. 643\u2013673. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07082-2_23"},{"key":"18_CR23","unstructured":"Fouque, P.A., et al.: Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU: Specifications v1.2 (2020)"},{"key":"18_CR24","unstructured":"Frigo, M., Johnson, S.G.: FFTW: fastest Fourier transform in the west. Astrophysics Source Code Library, pp. ascl-1201 (2012)"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Howe, J., Westerbaan, B.: Benchmarking and Analysing the NIST PQC Finalist Lattice-Based Signature Schemes on the ARM Cortex M7. Cryptology ePrint Archive, Paper 2022\/405 (2022)","DOI":"10.1007\/978-3-031-37679-5_19"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Huelsing, A., Butin, D., Gazdag, S.L., Rijneveld, J., Mohaisen, A.: XMSS: eXtended Merkle Signature Scheme. RFC 8391 (2018). https:\/\/www.rfc-editor.org\/info\/rfc8391","DOI":"10.17487\/RFC8391"},{"key":"18_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-38553-7_10","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2013","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A.: W-OTS+ \u2013 shorter signatures for hash-based signature schemes. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 173\u2013188. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38553-7_10"},{"key":"18_CR28","first-page":"4209","volume":"66","author":"A Jalali","year":"2019","unstructured":"Jalali, A., Azarderakhsh, R., Mozaffari Kermani, M., Campagna, M., Jao, D.: ARMv8 SIKE: optimized supersingular isogeny key encapsulation on ARMv8 processors. IEEE Trans. Circ. Syst. I: Regul. Pap. 66, 4209\u20134218 (2019)","journal-title":"IEEE Trans. Circ. Syst. I: Regul. Pap."},{"key":"18_CR29","unstructured":"Kannwischer, M.J., Petri, R., Rijneveld, J., Schwabe, P., Stoffelen, K.: PQM4: post-quantum crypto library for the ARM Cortex-M4. https:\/\/github.com\/mupq\/pqm4"},{"issue":"3","key":"18_CR30","doi-asserted-by":"publisher","first-page":"243","DOI":"10.46586\/tches.v2018.i3.243-266","volume":"2018","author":"A Karmakar","year":"2018","unstructured":"Karmakar, A., Bermudo Mera, J.M., Sinha Roy, S., Verbauwhede, I.: Saber on ARM. IACR Trans. Cryptographic Hardw. Embed. Syst. 2018(3), 243\u2013266 (2018)","journal-title":"IACR Trans. Cryptographic Hardw. Embed. Syst."},{"key":"18_CR31","doi-asserted-by":"publisher","first-page":"44446","DOI":"10.1109\/ACCESS.2022.3169784","volume":"10","author":"Y Kim","year":"2022","unstructured":"Kim, Y., Song, J., Seo, S.C.: Accelerating falcon on ARMv8. IEEE Access 10, 44446\u201344460 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3169784","journal-title":"IEEE Access"},{"key":"18_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-030-89432-0_17","volume-title":"Information Security Applications","author":"H Kwon","year":"2021","unstructured":"Kwon, H., et al.: ARMed Frodo. In: Kim, H. (ed.) WISA 2021. LNCS, vol. 13009, pp. 206\u2013217. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-89432-0_17"},{"key":"18_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1007\/978-3-642-10366-7_35","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"V Lyubashevsky","year":"2009","unstructured":"Lyubashevsky, V.: Fiat-Shamir with aborts: applications to lattice and factoring-based signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 598\u2013616. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10366-7_35"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"McGrew, D., Curcio, M., Fluhrer, S.: RFC 8554: Leighton-Micali hash-based signatures (2019). https:\/\/www.rfc-editor.org\/rfc\/rfc8554","DOI":"10.17487\/RFC8554"},{"key":"18_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-030-81293-5_13","volume-title":"Post-Quantum Cryptography","author":"DT Nguyen","year":"2021","unstructured":"Nguyen, D.T., Gaj, K.: Fast NEON-based multiplication for lattice-based NIST post-quantum cryptography finalists. In: Cheon, J.H., Tillich, J.-P. (eds.) PQCrypto 2021 2021. LNCS, vol. 12841, pp. 234\u2013254. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81293-5_13"},{"key":"18_CR36","unstructured":"Nguyen, D.T., Gaj, K.: Optimized software implementations of CRYSTALS-Kyber, NTRU, and Saber using NEON-based special instructions of ARMv8. In: Proceedings of the NIST 3rd PQC Standardization Conference (NIST PQC 2021) (2021)"},{"key":"18_CR37","unstructured":"Pornin, T.: New Efficient, Constant-Time Implementations of Falcon. Cryptology ePrint Archive, Report 2019\/893 (2019). https:\/\/eprint.iacr.org\/2019\/893"},{"issue":"8","key":"18_CR38","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.1109\/TCSI.2020.2979410","volume":"67","author":"H Seo","year":"2020","unstructured":"Seo, H., Sanal, P., Jalali, A., Azarderakhsh, R.: Optimized implementation of SIKE round 2 on 64-bit ARM Cortex-A processors. IEEE Trans. Circuits Syst. I Regul. Pap. 67(8), 2659\u20132671 (2020)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE Computer Society Press, Santa Fe, NM, USA (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"18_CR40","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1109\/TC.2017.2773524","volume":"11","author":"S Streit","year":"2018","unstructured":"Streit, S., De Santis, F.: Post-quantum key exchange on ARMv8-A: a new hope for NEON made simple. IEEE Trans. Comput. 11, 1651\u20131662 (2018)","journal-title":"IEEE Trans. Comput."},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"Zhao, L., Zhang, J., Huang, J., Liu, Z., Hancke, G.: Efficient Implementation of kyber on Mobile devices. In: 2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS), pp. 506\u2013513","DOI":"10.1109\/ICPADS53394.2021.00069"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37679-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T01:18:22Z","timestamp":1729732702000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37679-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031376788","9783031376795"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37679-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sousse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}