{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:38:46Z","timestamp":1772242726975,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031544088","type":"print"},{"value":"9783031544095","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54409-5_10","type":"book-chapter","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T06:08:12Z","timestamp":1708582092000},"page":"190-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["PQ.V.ALU.E: Post-quantum RISC-V Custom ALU Extensions on\u00a0Dilithium and\u00a0Kyber"],"prefix":"10.1007","author":[{"given":"Konstantina","family":"Miteloudi","sequence":"first","affiliation":[]},{"given":"Joppe W.","family":"Bos","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Bronchain","sequence":"additional","affiliation":[]},{"given":"Bj\u00f6rn","family":"Fay","sequence":"additional","affiliation":[]},{"given":"Joost","family":"Renes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"key":"10_CR1","unstructured":"Aikata, A., Mert, A.C., Imran, M., Pagliarini, S., Roy, S.S.: KaLi: a crystal for post-quantum security using Kyber and Dilithium. IEEE Trans. Circ. Syst. I: Regular Pap. 1\u201312 (2022)"},{"key":"10_CR2","unstructured":"Bai, S., et al.: CRYSTALS-Dilithium algorithm specifications and supporting documentation (Version 3.1) (2021). https:\/\/pq-crystals.org\/dilithium\/"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.46586\/tches.v2019.i4.17-61","volume":"4","author":"U Banerjee","year":"2019","unstructured":"Banerjee, U., Ukyab, T.S., Chandrakasan, A.P.: Sapphire: a configurable crypto-processor for post-quantum lattice-based protocols. IACR Trans. Cryptogr. Hardw. Embed. Syst. 4, 17\u201361 (2019)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/3-540-47721-7_24","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"P Barrett","year":"1987","unstructured":"Barrett, P.: Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 311\u2013323. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_24"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Beckwith, L., Nguyen, D.T., Gaj, K.: High-performance hardware implementation of crystals-Dilithium. In: 2021 International Conference on Field-Programmable Technology (ICFPT), pp. 1\u201310 (2021)","DOI":"10.1109\/ICFPT52863.2021.9609917"},{"key":"10_CR6","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Building power analysis resistant implementations of Keccak. In: Second SHA-3 Candidate Conference, vol. 142 (2010)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-030-88238-9_6","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2021","author":"M Bisheh-Niasar","year":"2021","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., Mozaffari-Kermani, M.: A monolithic hardware implementation of Kyber: comparing apples to apples in\u00a0PQC candidates. In: Longa, P., R\u00e0fols, C. (eds.) LATINCRYPT 2021. LNCS, vol. 12912, pp. 108\u2013126. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88238-9_6"},{"issue":"4","key":"10_CR8","doi-asserted-by":"publisher","first-page":"239","DOI":"10.46586\/tches.v2020.i4.239-280","volume":"2020","author":"T Fritzmann","year":"2020","unstructured":"Fritzmann, T., Sigl, G., Sep\u00falveda, J.: RISQ-V: tightly coupled RISC-V accelerators for post-quantum cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4), 239\u2013280 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Gautschi, M., et al.: Near-threshold RISC-V core with DSP extensions for scalable IoT endpoint devices. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 25(10), 2700\u20132713 (2017)","DOI":"10.1109\/TVLSI.2017.2654506"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Greconici, D.O.C., Kannwischer, M.J., Sprenkels, A.: Compact Dilithium implementations on cortex-M3 and cortex-M4. IACR TCHES 2021(1), 1\u201324 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i1.1-24, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8725","DOI":"10.46586\/tches.v2021.i1.1-24"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-38616-9_5","volume-title":"Post-Quantum Cryptography","author":"T G\u00fcneysu","year":"2013","unstructured":"G\u00fcneysu, T., Oder, T., P\u00f6ppelmann, T., Schwabe, P.: Software speed records for lattice-based signatures. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol. 7932, pp. 67\u201382. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38616-9_5"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Gupta, N., Jati, A., Chattopadhyay, A., Jha, G.: Lightweight hardware accelerator for post-quantum digital signature CRYSTALS-Dilithium. IEEE Trans. Circ. Syst. I: Regular Pap. 1\u201310 (2023)","DOI":"10.1109\/TCSI.2023.3274599"},{"key":"10_CR13","unstructured":"Kannwischer, M.J., Petri, R., Rijneveld, J., Schwabe, P., Stoffelen, K.: PQM4: post-quantum crypto library for the ARM Cortex-M4. https:\/\/github.com\/mupq\/pqm4"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Karl, P., Schupp, J., Fritzmann, T., Sigl, G.: Post-quantum signatures on RISC-V with hardware acceleration. ACM Trans. Embed. Comput. Syst. (2023)","DOI":"10.1145\/3579092"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-030-97348-3_12","volume-title":"Smart Card Research and Advanced Applications","author":"G Land","year":"2022","unstructured":"Land, G., Sasdrich, P., G\u00fcneysu, T.: A hard crystal - implementing Dilithium on reconfigurable hardware. In: Grosso, V., P\u00f6ppelmann, T. (eds.) CARDIS 2021. LNCS, vol. 13173, pp. 210\u2013230. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-97348-3_12"},{"key":"10_CR16","unstructured":"Lyubashevsky, V., et al.: CRYSTALS-DILITHIUM. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"150798","DOI":"10.1109\/ACCESS.2021.3126208","volume":"9","author":"P Nannipieri","year":"2021","unstructured":"Nannipieri, P., Di Matteo, S., Zulberti, L., Albicocchi, F., Saponara, S., Fanucci, L.: A RISC-V post quantum cryptography instruction set extension for number theoretic transform to speed-up CRYSTALS algorithms. IEEE Access 9, 150798\u2013150808 (2021)","journal-title":"IEEE Access"},{"key":"10_CR18","unstructured":"National Institute of Standards and Technology: Post-Quantum Cryptography Standardization. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/Post-Quantum-Cryptography-Standardization"},{"key":"10_CR19","unstructured":"Ni, Z., Khalid, A., e Shahwar Kundi, D., O\u2019Neill, M., Liu, W.: Efficient pipelining exploration for a high-performance CRYSTALS-Kyber accelerator. Cryptology ePrint Archive, Paper 2022\/1093 (2022)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Ricci, S., et al.: Implementing CRYSTALS-Dilithium signature scheme on FPGAs. ARES 21, Association for Computing Machinery, New York (2021)","DOI":"10.1145\/3465481.3465756"},{"key":"10_CR21","unstructured":"Schwabe, P., et al.: CRYSTALS-KYBER. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE Computer Society Press (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-030-30530-7_16","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2019","author":"K Stoffelen","year":"2019","unstructured":"Stoffelen, K.: Efficient cryptography on the RISC-V architecture. In: Schwabe, P., Th\u00e9riault, N. (eds.) LATINCRYPT 2019. LNCS, vol. 11774, pp. 323\u2013340. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30530-7_16"},{"issue":"2","key":"10_CR24","doi-asserted-by":"publisher","first-page":"328","DOI":"10.46586\/tches.v2021.i2.328-356","volume":"2021","author":"Y Xing","year":"2021","unstructured":"Xing, Y., Li, S.: A compact hardware implementation of CCA-secure key exchange mechanism CRYSTALS-KYBER on FPGA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2), 328\u2013356 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"1","key":"10_CR25","doi-asserted-by":"publisher","first-page":"270","DOI":"10.46586\/tches.v2022.i1.270-295","volume":"2022","author":"C Zhao","year":"2021","unstructured":"Zhao, C., et al.: A compact and high-performance hardware architecture for CRYSTALS-Dilithium. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1), 270\u2013295 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Zhou, Z., He, D., Liu, Z., Luo, M., Choo, K.K.R.: A software\/hardware co-design of crystals-Dilithium signature scheme. ACM Trans. Reconfigurable Technol. Syst. 14(2) (2021)","DOI":"10.1145\/3447812"}],"updated-by":[{"DOI":"10.1007\/978-3-031-54409-5_14","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T00:00:00Z","timestamp":1708646400000}}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54409-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T05:50:52Z","timestamp":1731390652000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54409-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031544088","9783031544095"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54409-5_10","relation":{"correction":[{"id-type":"doi","id":"10.1007\/978-3-031-54409-5_14","asserted-by":"object"}]},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"23 February 2024","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"A correction has been published.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CARDIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Card Research and Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cardis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}