{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:11:22Z","timestamp":1761397882793,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032018052"},{"type":"electronic","value":"9783032018069"}],"license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01806-9_9","type":"book-chapter","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:06:02Z","timestamp":1761397562000},"page":"152-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PQMagic: Towards Secure and\u00a0Efficient Post Quantum Cryptography Implementations"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0563-9022","authenticated-orcid":false,"given":"Yituo","family":"He","sequence":"first","affiliation":[]},{"given":"Xinpeng","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Juanru","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,26]]},"reference":[{"issue":"1","key":"9_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.46586\/tches.v2024.i1.87-132","volume":"2024","author":"A Abdulrahman","year":"2024","unstructured":"Abdulrahman, A., Becker, H., Kannwischer, M.J., Klein, F.: Fast and clean: auditable high-performance assembly via constraint solving. IACR Trans. Cryptographic Hardware Embed. Syst. 2024(1), 87\u2013132 (2024)","journal-title":"IACR Trans. Cryptographic Hardware Embed. Syst."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Abdulrahman, A., Kannwischer, M.J., Lim, T.H.: Enabling microarchitectural agility: taking ml-kem & ml-dsa from cortex-m4 to m7 with slothy. Cryptology ePrint Archive (2025)","DOI":"10.1145\/3708821.3736210"},{"key":"9_CR3","unstructured":"Abel, A., Reineke, J.: Uops info. http:\/\/www.uops.info, Accessed 13 Mar 2025"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Abel, A., Reineke, J.: uops. info: Characterizing latency, throughput, and port usage of instructions on intel microarchitectures. In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 673\u2013686 (2019)","DOI":"10.1145\/3297858.3304062"},{"key":"9_CR5","unstructured":"Alagic, G., Dang, Q., Moody, D., Robinson, A., Silberg, H., Smith-Tone, D., et\u00a0al.: Module-lattice-based key-encapsulation mechanism standard (2024)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Blessing, J., Specter, M.A., Weitzner, D.J.: Cryptography in the wild: an empirical analysis of vulnerabilities in cryptographic libraries. In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 605\u2013620 (2024)","DOI":"10.1145\/3634737.3657012"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Bos, J., et al.: Crystals-kyber: a cca-secure module-lattice-based kem. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 353\u2013367. IEEE (2018)","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Cohen, B., Subramony, M., Clark, M.: Next generation \u201czen 5\u201d core. In: 2024 IEEE Hot Chips 36 Symposium (HCS), pp. 1\u201327. IEEE (2024)","DOI":"10.1109\/HCS61935.2024.10665102"},{"key":"9_CR9","unstructured":"Dang, T., et\u00a0al.: Module-lattice-based digital signature standard (2024)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Ducas, L., et al.: Crystals-dilithium: a lattice-based digital signature scheme. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 238\u2013268 (2018)","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Gueron, S., Schlieker, F.: Speeding up r-lwe post-quantum key exchange. In: Nordic Conference on secure IT Systems, pp. 187\u2013198. Springer (2016)","DOI":"10.1007\/978-3-319-47560-8_12"},{"key":"9_CR12","unstructured":"Intel: Intel 64 and ia-32 architectures optimization reference manual. https:\/\/www.intel.com\/content\/www\/us\/en\/content-details\/821612\/intel-64-and-ia-32-architectures-optimization-reference-manual-volume-1.html, Accessed 13 Mar 2025"},{"key":"9_CR13","unstructured":"Intel: Intel intrinsics guide. https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/intrinsics-guide\/index.html, Accessed 13 Mar 2025"},{"issue":"5","key":"9_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3609223","volume":"22","author":"D Lei","year":"2023","unstructured":"Lei, D., He, D., Peng, C., Luo, M., Liu, Z., Huang, X.: Faster implementation of ideal lattice-based cryptography using avx512. ACM Trans. Embed. Comput. Syst. 22(5), 1\u201318 (2023)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"9_CR15","unstructured":"OpenSSL: Openssl. https:\/\/github.com\/openssl\/openssl, Accessed 13 Mar 2025"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Schneider, M., Lain, D., Puddu, I., Dutly, N., Capkun, S.: Breaking bad: how compilers break constant-time$$^-$$ implementations. arXiv preprint arXiv:2410.13489 (2024)","DOI":"10.1145\/3708821.3733909"},{"key":"9_CR17","unstructured":"Seiler, G.: Faster avx2 optimized ntt multiplication for ring-lwe lattice cryptography. Cryptology ePrint Archive (2018)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Singh, T., et\u00a0al.: \u201czen 5\u201d: the amd high-performance 4nm x86-64 microprocessor core. In: 2025 IEEE International Solid-State Circuits Conference (ISSCC), vol.\u00a068, pp.\u00a01\u20133. IEEE (2025)","DOI":"10.1109\/ISSCC49661.2025.10904529"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Stebila, D., Mosca, M.: Post-quantum key exchange for the internet and the open quantum safe project. In: Avanzi, R., Heys, H. (eds.) Selected Areas in Cryptography (SAC) 2016, LNCS, vol. 10532, pp. 1\u201324. Springer, October 2017, https:\/\/openquantumsafe.org","DOI":"10.1007\/978-3-319-69453-5_2"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Zheng, J., et al.: Faster post-quantum tls 1.3 based on ml-kem: implementation and assessment. In: European Symposium on Research in Computer Security, pp. 123\u2013143. Springer (2024)","DOI":"10.1007\/978-3-031-70890-9_7"},{"key":"9_CR21","unstructured":"Zheng, J., Zhu, H., Song, Z., Wang, Z., Zhao, Y.: Optimized vectorization implementation of crystals-dilithium. arXiv preprint arXiv:2306.01989 (2023)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01806-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:06:11Z","timestamp":1761397571000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01806-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,26]]},"ISBN":["9783032018052","9783032018069"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01806-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,26]]},"assertion":[{"value":"26 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}