{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:16:46Z","timestamp":1775384206763,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032155405","type":"print"},{"value":"9783032155412","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-15541-2_4","type":"book-chapter","created":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:38Z","timestamp":1769803658000},"page":"57-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["LightNTT: A Tiny NTT\/iNTT Core for\u00a0ML-DSA Featuring a\u00a0Constant-Geometry Pipelined Design"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9538-6961","authenticated-orcid":false,"given":"Bardia","family":"Taghavi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6921-6868","authenticated-orcid":false,"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4513-3109","authenticated-orcid":false,"given":"Mehran","family":"Mozaffari Kermani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,31]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., Mozaffari-Kermani, M.: High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography. In: 2021 IEEE 28th Symposium on Computer Arithmetic (ARITH), pp. 94\u2013101 (2021). https:\/\/doi.org\/10.1109\/ARITH51176.2021.00028","DOI":"10.1109\/ARITH51176.2021.00028"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Can, F., Ustun, A., Ors, B., Alaybeyoglu, E., Savas, E.: Hardware implementation of K2RED and plantard modular multiplication algorithms in post-quantum cryptography. In: 2024 Panhellenic Conference on Electronics & Telecommunications (PACET), pp.\u00a01\u20136 (2024). https:\/\/doi.org\/10.1109\/PACET60398.2024.10497033","DOI":"10.1109\/PACET60398.2024.10497033"},{"issue":"90","key":"4_CR3","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"JW Cooley","year":"1965","unstructured":"Cooley, J.W., Tukey, J.W.: An algorithm for the machine calculation of complex Fourier series. Math. Comput. 19(90), 297\u2013301 (1965)","journal-title":"Math. Comput."},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Du, G., Chen, Z., Li, Z., Wang, X., Zhang, D.: A low-latency polynomial multiplier accelerator for crystals-dilithium digital signature. In: Partin-Vaisband, I., Katkoori, S., Peng, L., Vaisband, B., Nikoubin, T. (eds.) Proceedings of the Great Lakes Symposium on VLSI 2024, GLSVLSI 2024, Clearwater, FL, USA, June 12-14, 2024, pp. 258\u2013262. ACM (2024). https:\/\/doi.org\/10.1145\/3649476.3658794","DOI":"10.1145\/3649476.3658794"},{"issue":"5","key":"4_CR5","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1109\/TCSII.2023.3260811","volume":"70","author":"Y Geng","year":"2023","unstructured":"Geng, Y., Hu, X., Li, M., Wang, Z.: Rethinking parallel memory access pattern in number theoretic transform design. IEEE Trans. Circuits Syst. II Express Briefs 70(5), 1689\u20131693 (2023). https:\/\/doi.org\/10.1109\/TCSII.2023.3260811","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Gentleman, W.M., Sande, G.: Fast Fourier transforms: for fun and profit. In: Proceedings of the November 7-10, 1966, Fall Joint Computer Conference. AFIPS Conference Proceedings, vol.\u00a029, pp. 563\u2013578. AFIPS \/ ACM \/ Spartan Books, Washington D.C. (1966). https:\/\/doi.org\/10.1145\/1464291.1464352","DOI":"10.1145\/1464291.1464352"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Greuet, A., Montoya, S., Vermeersch, C.: Quotient approximation modular reduction. In: 29th IEEE Symposium on Computer Arithmetic, ARITH 2022, Lyon, France, September 12-14, 2022, pp. 103\u2013110. IEEE (2022). https:\/\/doi.org\/10.1109\/ARITH54963.2022.00028","DOI":"10.1109\/ARITH54963.2022.00028"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Huang, J., et al.: Improved plantard arithmetic for lattice-based cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 614\u2013636 (2022). https:\/\/doi.org\/10.46586\/TCHES.V2022.I4.614-636","DOI":"10.46586\/TCHES.V2022.I4.614-636"},{"issue":"7","key":"4_CR9","doi-asserted-by":"publisher","first-page":"400","DOI":"10.3390\/INFO15070400","volume":"15","author":"B Kieu-Do-Nguyen","year":"2024","unstructured":"Kieu-Do-Nguyen, B., Binh, N.T., Pham-Quoc, C., Nghi, H.P., Tran, N., Hoang, T., Pham, C.: Compact and low-latency fpga-based number theoretic transform architecture for CRYSTALS kyber postquantum cryptography scheme. Inf. 15(7), 400 (2024). https:\/\/doi.org\/10.3390\/INFO15070400","journal-title":"Inf."},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Kundi, D., Mera, J.M.B., Strub, P., Hutter, M.: High-performance NTT hardware accelerator to support ml-kem and ml-dsa. In: Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security. pp. 100\u2013105. ASHES \u201924, Association for Computing Machinery (2024). https:\/\/doi.org\/10.1145\/3689939.3695785","DOI":"10.1145\/3689939.3695785"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Land, G., Sasdrich, P., G\u00fcneysu, T.: A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware, Lecture Notes in Computer Science, vol. 13173, pp. 210\u2013230. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-97348-3_12","DOI":"10.1007\/978-3-030-97348-3_12"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Liang, Z., Zhao, Y.: Number theoretic transform and its applications in lattice-based cryptosystems: a survey (2022). https:\/\/doi.org\/10.48550\/ARXIV.2211.13546, https:\/\/doi.org\/10.48550\/arXiv.2211.13546","DOI":"10.48550\/ARXIV.2211.13546"},{"key":"4_CR13","unstructured":"Malal, A.: Designing efficient and flexible NTT accelerators (2023). https:\/\/eprint.iacr.org\/2023\/1617"},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Mandal, S., Roy, D.B.: Kid: A hardware design framework targeting unified NTT multiplication for crystals-kyber and crystals-dilithium on fpga. In: 2024 37th International Conference on VLSI Design and 2024 23rd International Conference on Embedded Systems (VLSID), pp. 455\u2013460. IEEE (2024). https:\/\/doi.org\/10.1109\/VLSID60093.2024.00082","DOI":"10.1109\/VLSID60093.2024.00082"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"25501","DOI":"10.1109\/ACCESS.2024.3367109","volume":"12","author":"SD Matteo","year":"2024","unstructured":"Matteo, S.D., Sarno, I., Saponara, S.: Cryphtor: a memory-unified NTT-based hardware accelerator for post-quantum crystals algorithms. IEEE Access 12, 25501\u201325511 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3367109","journal-title":"IEEE Access"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Miteloudi, K., Bos, J.W., Bronchain, O., Fay, B., Renes, J.: PQ.V.ALU.E: post-quantum RISC-V custom ALU extensions on dilithium and kyber. In: Bhasin, S., Roche, T. (eds.) Smart Card Research and Advanced Applications - 22nd International Conference, CARDIS 2023, Amsterdam, The Netherlands, November 14-16, 2023, Revised Selected Papers. Lecture Notes in Computer Science, vol. 14530, pp. 190\u2013209. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-54409-5_10","DOI":"10.1007\/978-3-031-54409-5_10"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44, 519\u2013521 (1985). https:\/\/api.semanticscholar.org\/CorpusID:119574413","DOI":"10.1090\/S0025-5718-1985-0777282-X"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"34918","DOI":"10.1109\/ACCESS.2024.3371581","volume":"12","author":"TH Nguyen","year":"2024","unstructured":"Nguyen, T.H., Kieu-Do-Nguyen, B., Pham, C.K., Hoang, T.T.: High-speed NTT accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium. IEEE Access 12, 34918\u201334930 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3371581","journal-title":"IEEE Access"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"NIST, F.: Module-lattice-based digital signature standard. National Institute of Standards and Technology (U.S.) (08 2024). https:\/\/doi.org\/10.6028\/nist.fips.204","DOI":"10.6028\/nist.fips.204"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"NIST, F.: Module-lattice-based key-encapsulation mechanism standard. National Institute of Standards and Technology (U.S.) (08 2024). https:\/\/doi.org\/10.6028\/nist.fips.203","DOI":"10.6028\/nist.fips.203"},{"key":"4_CR21","doi-asserted-by":"publisher","unstructured":"NIST, F.: Stateless Hash-Based Digital Signature Standard. National Institute of Standards and Technology (U.S.) (08 2024). https:\/\/doi.org\/10.6028\/NIST.FIPS.205","DOI":"10.6028\/NIST.FIPS.205"},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"\u00d6zerk, \u00d6., Elgezen, C., Mert, A.C., \u00d6zt\u00fcrk, E., Sava\u015f, E.: Efficient number theoretic transform implementation on gpu for homomorphic encryption. J. Supercomput. 78(2), 2840\u20132872 (2 2022). https:\/\/doi.org\/10.1007\/s11227-021-03980-5","DOI":"10.1007\/s11227-021-03980-5"},{"key":"4_CR23","doi-asserted-by":"publisher","unstructured":"Pease, M.C.: An adaptation of the fast Fourier transform for parallel processing. J. ACM 15(2), 252\u2013264 (Apr 1968). https:\/\/doi.org\/10.1145\/321450.321457","DOI":"10.1145\/321450.321457"},{"issue":"3","key":"4_CR24","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1109\/TETC.2021.3073475","volume":"9","author":"T Plantard","year":"2021","unstructured":"Plantard, T.: Efficient word size modular arithmetic. IEEE Trans. Emerg. Top. Comput. 9(3), 1506\u20131518 (2021)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"4_CR25","volume-title":"7 Series fpgas Data Sheet: Overview","author":"SFD Sheet","year":"2020","unstructured":"Sheet, S.F.D.: 7 Series fpgas Data Sheet: Overview. CA, USA, San Jose (2020)"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994, pp. 124\u2013134. IEEE Computer Society (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Shrivastava, R., Ratnala, C.P., Puli, D.M., Banerjee, U.: A unified hardware accelerator for fast Fourier transform and number theoretic transform. In: ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135 (2025). https:\/\/doi.org\/10.1109\/ICASSP49660.2025.10889132","DOI":"10.1109\/ICASSP49660.2025.10889132"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Solinas, J.A.: Generalized mersenne prime. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, 2nd Ed, pp. 509\u2013510. Springer (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_32","DOI":"10.1007\/978-1-4419-5906-5_32"},{"key":"4_CR29","doi-asserted-by":"publisher","unstructured":"Taghavi, B., Azarderakhsh, R., Mozaffari\u00a0Kermani, M.: ParallelNTT: Maximizing performance of forward and inverse NTT on FPGA for ML-DSA and ML-KEM. In: Proceedings of the Great Lakes Symposium on VLSI 2025, pp. 372\u2013378. GLSVLSI \u201925 (2025). https:\/\/doi.org\/10.1145\/3716368.3735214","DOI":"10.1145\/3716368.3735214"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-15541-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:40Z","timestamp":1769803660000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-15541-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032155405","9783032155412"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-15541-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"31 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LightSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Lightweight Cryptography for Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lightsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.encrypt-on.com\/activities\/conferences\/lightsec-2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}