{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:35:16Z","timestamp":1767321316866,"version":"3.48.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032105356","type":"print"},{"value":"9783032105363","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10536-3_11","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:33:34Z","timestamp":1767321214000},"page":"293-314","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["High-Throughput EdDSA Verification on\u00a0Intel Processors with\u00a0Advanced Vector Extensions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1723-6806","authenticated-orcid":false,"given":"Bowen","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4539-3034","authenticated-orcid":false,"given":"Hao","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3210-3102","authenticated-orcid":false,"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1677-9034","authenticated-orcid":false,"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"issue":"7","key":"11_CR1","doi-asserted-by":"publisher","first-page":"806","DOI":"10.2307\/2310929","volume":"71","author":"R Bellman","year":"1964","unstructured":"Bellman, R., Straus, E.: Addition chains of vectors. Am. Math. Mon. 71(7), 806\u2013808 (1964)","journal-title":"Am. Math. Mon."},{"key":"11_CR2","unstructured":"Bernstein, D.J.: Pippenger\u2019s exponentiation algorithm. Preprint (2002). https:\/\/cr.yp.to\/papers.html#pippenger"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11745853_14"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted edwards curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 389\u2013405. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68164-9_26"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","volume":"2","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.-Y.: High-speed high-security signatures. J. Cryptogr. Eng. 2(2), 77\u201389 (2012). https:\/\/doi.org\/10.1007\/s13389-012-0027-1","journal-title":"J. Cryptogr. Eng."},{"key":"11_CR6","unstructured":"Bernstein, D.J., Nath, K.: Artifact: Lib25519, a microlibrary for the x25519 encryption system and the ed25519 signature system (2024). https:\/\/lib25519.cr.yp.to"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Brickell, E.F., Gordon, D.M., McCurley, K.S., Wilson, D.B.: Fast exponentiation with precomputation. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 200\u2013207. Springer (1992)","DOI":"10.1007\/3-540-47555-9_18"},{"key":"11_CR8","doi-asserted-by":"publisher","unstructured":"Cheng, H., Fotiadis, G., Gro\u00dfsch\u00e4dl, J., Ryan, P.Y.A.: Highly vectorized SIKE for AVX-512. IACR Trans. Cryptogr. Hardw. Embed. Syst. (TCHES) 2022(2), 41\u201368 (2022). https:\/\/doi.org\/10.46586\/tches.v2022.i2.41-68","DOI":"10.46586\/tches.v2022.i2.41-68"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Cheng, H., Fotiadis, G., Gro\u00dfsch\u00e4dl, J., Ryan, P.Y.A., R\u00f8nne, P.B.: Batching CSIDH group actions using AVX-512. IACR Trans. Cryptogr. Hardw. Embed. Syst. (TCHES) 2021(4), 618\u2013649 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i4.618-649","DOI":"10.46586\/tches.v2021.i4.618-649"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1007\/978-3-030-81652-0_27","volume-title":"Selected Areas in Cryptography","author":"H Cheng","year":"2021","unstructured":"Cheng, H., Gro\u00dfsch\u00e4dl, J., Tian, J., R\u00f8nne, P.B., Ryan, P.Y.A.: High-throughput elliptic curve cryptography using AVX2 vector instructions. In: Dunkelman, O., Jacobson, Jr., M.J., O\u2019Flynn, C. (eds.) SAC 2020. LNCS, vol. 12804, pp. 698\u2013719. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81652-0_27"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-319-31301-6_8","volume-title":"Selected Areas in Cryptography \u2013 SAC 2015","author":"T Chou","year":"2016","unstructured":"Chou, T.: Sandy2x: new Curve25519 speed records. In: Dunkelman, O., Keliher, L. (eds.) SAC 2015. LNCS, vol. 9566, pp. 145\u2013160. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31301-6_8"},{"issue":"3","key":"11_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3309759","volume":"45","author":"A Faz-Hern\u00e1ndez","year":"2019","unstructured":"Faz-Hern\u00e1ndez, A., L\u00f3pez, J., Dahab, R.: High-performance implementation of elliptic curve cryptography using vector instructions. ACM Trans. Math. Softw. (TOMS) 45(3), 1\u201335 (2019). https:\/\/doi.org\/10.1145\/3309759","journal-title":"ACM Trans. Math. Softw. (TOMS)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-319-22174-8_18","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2015","author":"A Faz-Hern\u00e1ndez","year":"2015","unstructured":"Faz-Hern\u00e1ndez, A., L\u00f3pez, J.: Fast implementation of Curve25519 using AVX2. In: Lauter, K., Rodr\u00edguez-Henr\u00edquez, F. (eds.) LATINCRYPT 2015. LNCS, vol. 9230, pp. 329\u2013345. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22174-8_18"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"RP Gallant","year":"2001","unstructured":"Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster point multiplication on elliptic curves with efficient endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 190\u2013200. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_11"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-030-93206-0_16","volume-title":"Information Security Practice and Experience","author":"J Gro\u00dfsch\u00e4dl","year":"2021","unstructured":"Gro\u00dfsch\u00e4dl, J., Franck, C., Liu, Z.: Lightweight EdDSA signature verification for the ultra-low-power internet of things. In: Deng, R., et al. (eds.) ISPEC 2021. LNCS, vol. 13107, pp. 263\u2013282. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-93206-0_16"},{"key":"11_CR16","doi-asserted-by":"publisher","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer (2004). https:\/\/doi.org\/10.1007\/b97644","DOI":"10.1007\/b97644"},{"key":"11_CR17","unstructured":"Hi\u015fil, H., E\u011frice, B., Yassi, M.: Fast 4 way vectorized ladder for the complete set of Montgomery curves. Cryptology ePrint Archive, Report 2020\/388 (2020). https:\/\/eprint.iacr.org"},{"key":"11_CR18","unstructured":"Hisil, H., Egrice, B., Yassi, M.: Fast 4 way vectorized ladder for the complete set of Montgomery curves. Cryptology ePrint Archive, Paper 2020\/388 (2020). https:\/\/eprint.iacr.org\/2020\/388"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted edwards curves revisited. Cryptology ePrint Archive, Paper 2008\/522 (2008). https:\/\/eprint.iacr.org\/2008\/522","DOI":"10.1007\/978-3-540-89255-7_20"},{"key":"11_CR20","unstructured":"M\u00f6ller, B.: Public-Key CryptographyTheory and Practice. Ph.D. thesis, Technische Universit\u00e4t Darmstadt (2003)"},{"issue":"177","key":"11_CR21","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P Montgomery","year":"1987","unstructured":"Montgomery, P.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. (MCOM) 48(177), 243\u2013264 (1987). https:\/\/doi.org\/10.1090\/S0025-5718-1987-0866113-7","journal-title":"Math. Comput. (MCOM)"},{"issue":"3","key":"11_CR22","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TC.2021.3060505","volume":"71","author":"K Nath","year":"2021","unstructured":"Nath, K., Sarkar, P.: Efficient 4-way vectorizations of the Montgomery ladder. IEEE Trans. Comput. (TOC) 71(3), 712\u2013723 (2021). https:\/\/doi.org\/10.1109\/TC.2021.3060505","journal-title":"IEEE Trans. Comput. (TOC)"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/3-540-44709-1_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"K Okeya","year":"2001","unstructured":"Okeya, K., Sakurai, K.: Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 126\u2013141. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_12"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Pippenger, N.: On the evaluation of powers and related problems. In: 17th Annual Symposium on Foundations of Computer Science (SFCS 1976), pp. 258\u2013263. IEEE Computer Society (1976)","DOI":"10.1109\/SFCS.1976.21"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings","author":"CP Schnorr","year":"1990","unstructured":"Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239\u2013252. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_22"},{"key":"11_CR26","doi-asserted-by":"publisher","unstructured":"Solinas, J.A.: Efficient arithmetic on koblitz curves. Des. Codes Cryptogr. (DCC) 19(2\/3), 195\u2013249 (2000). https:\/\/doi.org\/10.1023\/A:1008306223194","DOI":"10.1023\/A:1008306223194"},{"key":"11_CR27","unstructured":"Solinas, J.A.: Low-weight binary representation for pairs of integers. Combinatorics and Optimization Research Report CORR 2001-41 (2001)"},{"key":"11_CR28","unstructured":"WikiChip. Intel microarchitectures: Cascade lake. https:\/\/en.wikichip.org\/wiki\/intel\/microarchitectures\/cascade_lake. Accessed 06 Oct 2024"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10536-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:33:35Z","timestamp":1767321215000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10536-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032105356","9783032105363"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10536-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC25\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}