{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T08:33:54Z","timestamp":1768034034879,"version":"3.49.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031400025","type":"print"},{"value":"9783031400032","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40003-2_3","type":"book-chapter","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T13:03:04Z","timestamp":1691586184000},"page":"57-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A High-Performance Hardware Implementation of\u00a0the\u00a0LESS Digital Signature Scheme"],"prefix":"10.1007","author":[{"given":"Luke","family":"Beckwith","sequence":"first","affiliation":[]},{"given":"Robert","family":"Wallace","sequence":"additional","affiliation":[]},{"given":"Kamyar","family":"Mohajerani","sequence":"additional","affiliation":[]},{"given":"Kris","family":"Gaj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,10]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Aikata, et al.: A unified cryptoprocessor for lattice-based signature and key-exchange. IEEE Trans. Comput. 1\u201313 (2022). https:\/\/doi.org\/10.1109\/TC.2022.3215064","DOI":"10.1109\/TC.2022.3215064"},{"issue":"2","key":"3_CR2","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TCSI.2022.3219555","volume":"70","author":"A Aikata","year":"2023","unstructured":"Aikata, A., Mert, A.C., Imran, M., Pagliarini, S., Roy, S.S.: KaLi: a crystal for post-quantum security using Kyber and Dilithium. IEEE Trans. Circuits Syst. I Regul. Pap. 70(2), 747\u2013758 (2023). https:\/\/doi.org\/10.1109\/TCSI.2022.3219555","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Alagic, G., et al.: Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. National Institute of Standards and Technology Interagency or Internal Report NIST IR 8413-upd1, National Institute of Standards and Technology (2022). https:\/\/doi.org\/10.6028\/NIST.IR.8413-upd1","DOI":"10.6028\/NIST.IR.8413-upd1"},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Amiet, D., Leuenberger, L., Curiger, A., Zbinden, P.: FPGA-based SPHINCS+ implementations: mind the glitch. In: 2020 23rd Euromicro Conference on Digital System Design (DSD), Kranj, Slovenia, pp. 229\u2013237. IEEE (2020). https:\/\/doi.org\/10.1109\/DSD51259.2020.00046","DOI":"10.1109\/DSD51259.2020.00046"},{"key":"3_CR5","unstructured":"Aumasson, J.P., et al.: SPHINCS+ Specification v3.1 (2022). https:\/\/sphincs.org\/data\/sphincs+-r3.1-specification.pdf"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Balasubramanian, S., Carter, H.W., Bogdanov, A., Rupp, A., Ding, J.: Fast multivariate signature generation in hardware: the case of Rainbow. In: 16th International Symposium on Field-Programmable Custom Computing Machines, FCCM 2008, pp. 25\u201330 (2008)","DOI":"10.1109\/FCCM.2008.52"},{"key":"3_CR7","unstructured":"Balasubramanian, S.R.: A parallel hardware architecture for fast signature generation of Rainbow. Master\u2019s thesis, University of Cincinnati, Cincinnati, OH (2007)"},{"key":"3_CR8","unstructured":"Baldi, M., et al.: LESS: Linear Equivalence Signature Scheme. https:\/\/www.less-project.com\/"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-030-81293-5_2","volume-title":"Post-Quantum Cryptography","author":"A Barenghi","year":"2021","unstructured":"Barenghi, A., Biasse, J.-F., Persichetti, E., Santini, P.: LESS-FM: fine-tuning signatures from the code equivalence problem. In: Cheon, J.H., Tillich, J.-P. (eds.) PQCrypto 2021 2021. LNCS, vol. 12841, pp. 23\u201343. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81293-5_2"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Beckwith, L., Nguyen, D.T., Gaj, K.: High-performance hardware implementation of CRYSTALS-Dilithium. In: 2021 International Conference on Field-Programmable Technology (ICFPT), Auckland, New Zealand, pp. 1\u201310. IEEE (2021). https:\/\/doi.org\/10.1109\/ICFPT52863.2021.9609917","DOI":"10.1109\/ICFPT52863.2021.9609917"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Beckwith, L., Nguyen, D.T., Gaj, K.: High-performance hardware implementation of lattice-based digital signatures (2022). https:\/\/eprint.iacr.org\/2022\/217","DOI":"10.1109\/ICFPT52863.2021.9609917"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-030-51938-4_3","volume-title":"Progress in Cryptology - AFRICACRYPT 2020","author":"J-F Biasse","year":"2020","unstructured":"Biasse, J.-F., Micheli, G., Persichetti, E., Santini, P.: LESS is more: code-based signatures without syndromes. In: Nitaj, A., Youssef, A. (eds.) AFRICACRYPT 2020. LNCS, vol. 12174, pp. 45\u201365. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51938-4_3"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-540-85053-3_4","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"A Bogdanov","year":"2008","unstructured":"Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-area optimized public-key engines: $$\\cal{MQ}$$-cryptosystems as replacement for elliptic curves? In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 45\u201361. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_4"},{"key":"3_CR14","unstructured":"CERG: SHAKE. https:\/\/github.com\/GMUCERG\/SHAKE"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Ferozpuri, A., Gaj, K.: High-speed FPGA implementation of the NIST round 1 Rainbow signature scheme. In: 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig), Cancun, Mexico, pp. 1\u20138. IEEE (2018). https:\/\/doi.org\/10.1109\/RECONFIG.2018.8641734","DOI":"10.1109\/RECONFIG.2018.8641734"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Gupta, N., Jati, A., Chattopadhyay, A., Jha, G.: Lightweight hardware accelerator for post-quantum digital signature CRYSTALS-Dilithium. IEEE Trans. Circuits Syst. I: Regular Pap. 1\u201310 (2023). https:\/\/doi.org\/10.1109\/TCSI.2023.3274599","DOI":"10.1109\/TCSI.2023.3274599"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Hochet, B., Quinton, P., Robert, Y.: Systolic solution of linear systems over GF(p) with partial pivoting. In: 1987 IEEE 8th Symposium on Computer Arithmetic (ARITH), Como, Italy, pp. 161\u2013168. IEEE (1987). https:\/\/doi.org\/10.1109\/ARITH.1987.6158700","DOI":"10.1109\/ARITH.1987.6158700"},{"issue":"9","key":"3_CR19","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1109\/12.29471","volume":"38","author":"B Hochet","year":"1989","unstructured":"Hochet, B., Quinton, P., Robert, Y.: Systolic Gaussian elimination over GF(p) with partial pivoting. IEEE Trans. Comput. 38(9), 1321\u20131324 (1989). https:\/\/doi.org\/10.1109\/12.29471","journal-title":"IEEE Trans. Comput."},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Karl, P., Schupp, J., Fritzmann, T., Sigl, G.: Post-quantum signatures on RISC-V with hardware acceleration. ACM Trans. Embed. Comput. Syst. (2023). https:\/\/doi.org\/10.1145\/3579092","DOI":"10.1145\/3579092"},{"key":"3_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-030-97348-3_12","volume-title":"Smart Card Research and Advanced Applications","author":"G Land","year":"2022","unstructured":"Land, G., Sasdrich, P., G\u00fcneysu, T.: A hard crystal - implementing Dilithium on reconfigurable hardware. In: Grosso, V., P\u00fcppelmann, T. (eds.) CARDIS 2021. LNCS, vol. 13173, pp. 210\u2013230. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-97348-3_12"},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"150798","DOI":"10.1109\/ACCESS.2021.3126208","volume":"9","author":"P Nannipieri","year":"2021","unstructured":"Nannipieri, P., Di Matteo, S., Zulberti, L., Albicocchi, F., Saponara, S., Fanucci, L.: A RISC-V post quantum cryptography instruction set extension for number theoretic transform to speed-up CRYSTALS algorithms. IEEE Access 9, 150798\u2013150808 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3126208","journal-title":"IEEE Access"},{"key":"3_CR23","unstructured":"NSA: Cybersecurity Advisory Announcing the Commercial National Security Algorithm Suite 2.0 (2022). https:\/\/media.defense.gov\/2022\/Sep\/07\/2003071834\/-1\/-1\/0\/CSA_CNSA_2.0_ALGORITHMS_.PDF"},{"key":"3_CR24","unstructured":"Persichetti, E.: LESS: Digital Signatures from Linear Code Equivalence (2023). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/workshops-and-timeline\/pqc-seminars"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Preucil, T.: Implementation of the signature scheme Rainbow on SoC FPGA. Master\u2019s thesis, Uppsala University, Uppsala, Sweden (2022). http:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:uu:diva-484811","DOI":"10.1109\/DSD57027.2022.00074"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Preucil, T., Socha, P., Novotny, M.: Implementation of the Rainbow signature scheme on SoC FPGA. In: 2022 25th Euromicro Conference on Digital System Design (DSD), Maspalomas, Spain, pp. 513\u2013519. IEEE (2022). https:\/\/doi.org\/10.1109\/DSD57027.2022.00074","DOI":"10.1109\/DSD57027.2022.00074"},{"issue":"4","key":"3_CR27","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.vlsi.2010.09.001","volume":"44","author":"A Rupp","year":"2011","unstructured":"Rupp, A., Eisenbarth, T., Bogdanov, A., Grieb, O.: Hardware SLE solvers: efficient building blocks for cryptographic and cryptanalytic applications. Integration 44(4), 290\u2013304 (2011). https:\/\/doi.org\/10.1016\/j.vlsi.2010.09.001","journal-title":"Integration"},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, pp. 124\u2013134. IEEE Computer Society Press (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"3_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-642-25405-5_15","volume-title":"Post-Quantum Cryptography","author":"S Tang","year":"2011","unstructured":"Tang, S., Yi, H., Ding, J., Chen, H., Chen, G.: High-speed hardware implementation of Rainbow signature on FPGAs. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 228\u2013243. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5_15"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Yi, H., Li, W.: Small FPGA implementations for solving systems of linear equations in finite fields. In: 2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, pp. 561\u2013564. IEEE (2015). https:\/\/doi.org\/10.1109\/ICSESS.2015.7339120","DOI":"10.1109\/ICSESS.2015.7339120"},{"issue":"1","key":"3_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-018-1117-2","volume":"2018","author":"H Yi","year":"2018","unstructured":"Yi, H., Nie, Z.: High-speed hardware architecture for implementations of multivariate signature generations on FPGAs. EURASIP J. Wirel. Commun. Netw. 2018(1), 1\u20139 (2018). https:\/\/doi.org\/10.1186\/s13638-018-1117-2","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"1","key":"3_CR32","doi-asserted-by":"publisher","first-page":"270","DOI":"10.46586\/tches.v2022.i1.270-295","volume":"2022","author":"C Zhao","year":"2021","unstructured":"Zhao, C., et al.: A compact and high-performance hardware architecture for CRYSTALS-Dilithium. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1), 270\u2013295 (2021). https:\/\/doi.org\/10.46586\/tches.v2022.i1.270-295","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"7","key":"3_CR33","doi-asserted-by":"publisher","first-page":"2871","DOI":"10.1109\/TCSI.2022.3162593","volume":"69","author":"Y Zhao","year":"2022","unstructured":"Zhao, Y., Xie, R., Xin, G., Han, J.: A high-performance domain-specific processor with matrix extension of RISC-V for module-LWE applications. IEEE Trans. Circuits Syst. I Regul. Pap. 69(7), 2871\u20132884 (2022). https:\/\/doi.org\/10.1109\/TCSI.2022.3162593","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"3_CR34","doi-asserted-by":"publisher","unstructured":"Zhou, Z., He, D., Liu, Z., Luo, M., Choo, K.K.R.: A software\/hardware co-design of CRYSTALS-Dilithium signature scheme. ACM Trans. Reconfigurable Technol. Syst. 14(2), 11:1\u201311:21 (2021). https:\/\/doi.org\/10.1145\/3447812","DOI":"10.1145\/3447812"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40003-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T13:03:19Z","timestamp":1691586199000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40003-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031400025","9783031400032"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40003-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"10 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"College Park, MD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pqcrypto2023.umiacs.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"49% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.16","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.30","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}