{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T23:46:01Z","timestamp":1775432761151,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032147813","type":"print"},{"value":"9783032147820","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-14782-0_5","type":"book-chapter","created":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T22:51:27Z","timestamp":1775429487000},"page":"77-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A New Optimized Implementation of\u00a0SMAUG-T for Lightweight Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6905-8293","authenticated-orcid":false,"given":"O\u011fuz","family":"Narl\u0131","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7581-9390","authenticated-orcid":false,"given":"Meltem Kurt","family":"Pehlivano\u011flu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7005-6489","authenticated-orcid":false,"given":"Sedat","family":"Akleylek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC. SCITEPRESS - Science and Technology Publications (2024). https:\/\/doi.org\/10.5220\/0012757800003767","DOI":"10.5220\/0012757800003767"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Module-lattice-based key-encapsulation mechanism standard (2024). https:\/\/doi.org\/10.6028\/nist.fips.203","DOI":"10.6028\/nist.fips.203"},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Abdulrahman, A., Chen, J.P., Chen, Y.J., Hwang, V., Kannwischer, M.J., Yang, B.Y.: Multi-moduli NTTs for saber on Cortex-M3 and Cortex-M4. IACR Trans. Cryptograph. Hardw. Embedd. Syst. 2022(1), 127\u2013151 (2021). https:\/\/doi.org\/10.46586\/tches.v2022.i1.127-151","DOI":"10.46586\/tches.v2022.i1.127-151"},{"key":"5_CR4","unstructured":"Aguilar\u00a0Melchor, C., et\u00a0al.: HQC specification document, version 2.4.0. Technical report, HQC Team (2024). https:\/\/pqc-hqc.org\/doc\/hqc-specification_2024-02-23.pdf"},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1007\/s11227-015-1570-1","volume":"72","author":"S Akleylek","year":"2015","unstructured":"Akleylek, S., Alk\u0131m, E., Tok, Z.Y.: Sparse polynomial multiplication for lattice-based cryptography with small complexity. J. Supercomput. 72(2), 438\u2013450 (2015). https:\/\/doi.org\/10.1007\/s11227-015-1570-1","journal-title":"J. Supercomput."},{"issue":"10","key":"5_CR6","doi-asserted-by":"publisher","first-page":"4129","DOI":"10.1109\/TCSI.2021.3096916","volume":"68","author":"M Anastasova","year":"2021","unstructured":"Anastasova, M., Azarderakhsh, R., Kermani, M.M.: Fast strategies for the implementation of sike round 3 on arm cortex-m4. IEEE Trans. Circuits Syst. I Regul. Pap. 68(10), 4129\u20134141 (2021). https:\/\/doi.org\/10.1109\/TCSI.2021.3096916","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"5_CR7","unstructured":"Aragon, N., et\u00a0al.: BIKE\u2014Bit Flipping Key Encapsulation, Technical report, BIKE Team, version 1.1 (2017). https:\/\/bikesuite.org\/files\/BIKE.2017.11.30.pdf"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Beirendonck, M.V., D\u2019anvers, J.P., Karmakar, A., Balasch, J., Verbauwhede, I.: A side-channel-resistant implementation of saber. J. Emerg. Technol. Comput. Syst. 17(2) (2021). https:\/\/doi.org\/10.1145\/3429983","DOI":"10.1145\/3429983"},{"key":"5_CR9","unstructured":"Bos, J., et al.: FrodoKEM standard proposal, Technical report, FrodoKEM Team, version 2.0 (2024). https:\/\/frodokem.org\/files\/FrodoKEM_standard_proposal_20241205.pdf"},{"key":"5_CR10","unstructured":"Bos, J., et al.: CRYSTALS-Kyber round 3 submission: algorithm specifications and supporting documentation, Technical report, round 3 Submission, Version 3.0 (2021). https:\/\/pq-crystals.org\/kyber\/data\/kyber-specification-round3-20210804.pdf"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Bos, J.W., Bronchain, O., Custers, F., Renes, J., Verbakel, D., van Vredendaal, C.: Enabling FrodoKEM on embedded devices 2023, 74\u201396 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i3.74-96","DOI":"10.46586\/tches.v2023.i3.74-96"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Botros, L., Kannwischer, M.J., Schwabe, P.: Memory-efficient high-speed implementation of kyber on cortex-M4. Cryptology ePrint Archive, Paper 2019\/489 (2019). https:\/\/eprint.iacr.org\/2019\/489","DOI":"10.1007\/978-3-030-23696-0_11"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Bronchain, O., Cassiers, G.: Bitslicing arithmetic\/Boolean masking conversions for fun and profit with application to lattice-based KEMs. Cryptology ePrint Archive, Paper 2022\/158 (2022). https:\/\/eprint.iacr.org\/2022\/158","DOI":"10.46586\/tches.v2022.i4.553-588"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Chen, M.S., Chou, T., Krausz, M.: Optimizing bike for the intel has well and arm cortex-m4. IACR Trans. Cryptograph. Hardw. Embedded Syst. 2021(3), 97\u2013124 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i3.97-124","DOI":"10.46586\/tches.v2021.i3.97-124"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Chung, C.M.M., Hwang, V., Kannwischer, M.J., Seiler, G., Shih, C.J., Yang, B.Y.: NTT multiplication for NTT-unfriendly rings: new speed records for Saber and NTRU on cortex-M4 and avx2. IACR Trans. Cryptograph. Hardw. Embedded Syst. 2021(2), 159\u2013188 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i2.159-188","DOI":"10.46586\/tches.v2021.i2.159-188"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"D\u2019Anvers, J.P., Karmakar, A., Sinha\u00a0Roy, S., Vercauteren, F.: Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. In: Joux, A., Nitaj, A., Rachidi, T. (eds.) Progress in Cryptology \u2013 AFRICACRYPT 2018, pp. 282\u2013305. Springer, Cham (2018)","DOI":"10.1007\/978-3-319-89339-6_16"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"188386","DOI":"10.1109\/ACCESS.2024.3511346","volume":"12","author":"J Hee Cheon","year":"2024","unstructured":"Hee Cheon, J., Choe, H., Seo, J., Seong, H.: Smaug (-t), revisited: timing-secure, more compact, less failure. IEEE Access 12, 188386\u2013188397 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3511346","journal-title":"IEEE Access"},{"key":"5_CR18","unstructured":"Jao, D., et al.: Supersingular isogeny key encapsulation. SIKE Submission to the NIST Post-Quantum Cryptography Standardization Project, submission to NIST PQC Round 3 (2020). https:\/\/sike.org\/files\/SIDH-spec.pdf"},{"key":"5_CR19","unstructured":"Kannwischer, M.J., Krausz, M., Petri, R., Yang, S.Y.: PQM4: benchmarking NIST additional post-quantum signature schemes on microcontrollers. Cryptology ePrint Archive, Paper 2024\/112 (2024). https:\/\/eprint.iacr.org\/2024\/112"},{"key":"5_CR20","unstructured":"Kannwischer, M.J., Petri, R., Rijneveld, J., Schwabe, P., Stoffelen, K.: PQM4: post-quantum crypto library for the ARM Cortex-M4. https:\/\/github.com\/mupq\/pqm4"},{"key":"5_CR21","unstructured":"Kundu, S., Ghosh, A., Karmakar, A., Sen, S., Verbauwhede, I.: Rudraksh: a compact and lightweight post-quantum key-encapsulation mechanism. Cryptology ePrint Archive, Paper 2024\/1170 (2024). https:\/\/eprint.iacr.org\/2024\/1170"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Kundu, S., Karmakar, A., Verbauwhede, I.: On the masking-friendly designs for post-quantum cryptography. In: Regazzoni, F., Mazumdar, B., Parameswaran, S. (eds.) Security, Privacy, and Applied Cryptography Engineering, pp. 162\u2013184. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-51583-5_10"},{"key":"5_CR23","doi-asserted-by":"publisher","first-page":"2080","DOI":"10.1109\/ACCESS.2018.2884084","volume":"7","author":"J Lee","year":"2019","unstructured":"Lee, J., Kim, D., Lee, H., Lee, Y., Cheon, J.H.: Rlizard: post-quantum key encapsulation mechanism for IoT devices. IEEE Access 7, 2080\u20132091 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2018.2884084","journal-title":"IEEE Access"},{"key":"5_CR24","doi-asserted-by":"publisher","unstructured":"McKay, K., Bassham, L., Turan, M.S., Mouha, N.: Report on lightweight cryptography (2017). https:\/\/doi.org\/10.6028\/NIST.IR.8114","DOI":"10.6028\/NIST.IR.8114"},{"key":"5_CR25","unstructured":"National Institute of Standards and Technology: Pqc announcement and outline of NIST\u2019s call for submissions. In: Presentation at the NIST Post-Quantum Cryptography Workshop (2016). https:\/\/csrc.nist.gov\/presentations\/2016\/pqc-announcement-and-outline-of-nists-call-for-sub"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Shehzadi, S., et al.: Kyber-KEM-ascon: benchmarking a lightweight post-quantum KEM on iot devices. In: 2025 IEEE International Symposium on Circuits and Systems (ISCAS), pp.\u00a01\u20135 (2025). https:\/\/doi.org\/10.1109\/ISCAS56072.2025.11043792","DOI":"10.1109\/ISCAS56072.2025.11043792"},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134 (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"5_CR28","unstructured":"STMicroelectronics: STM32 Cortex-M4 MCUs and MPUs Programming Manual. STMicroelectronics, document reference PM0214 (2020). https:\/\/www.st.com\/resource\/en\/programming_manual\/pm0214-stm32-cortexm4-mcus-and-mpus-programming-manual-stmicroelectronics.pdf"},{"key":"5_CR29","doi-asserted-by":"publisher","first-page":"28177","DOI":"10.1109\/ACCESS.2021.3052867","volume":"9","author":"VA Thakor","year":"2021","unstructured":"Thakor, V.A., Razzaque, M.A., Khandaker, M.R.A.: Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities. IEEE Access 9, 28177\u201328193 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3052867","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-14782-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T22:51:29Z","timestamp":1775429489000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-14782-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032147813","9783032147820"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-14782-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tartu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nordsec2025.cs.ut.ee\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}