{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:01:15Z","timestamp":1770742875554,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819609567","type":"print"},{"value":"9789819609574","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0957-4_4","type":"book-chapter","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:33:52Z","timestamp":1738272832000},"page":"65-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Semi-compressed CRYSTALS-Kyber"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3762-8550","authenticated-orcid":false,"given":"Shuiyin","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4569-3384","authenticated-orcid":false,"given":"Amin","family":"Sakzad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,31]]},"reference":[{"key":"4_CR1","unstructured":"Alkim, E., Ducas, L., P\u00f6ppelmann, T., Schwabe, P.: Post-quantum key exchange\u2014a new hope. In: 25th USENIX Security Symposium (USENIX Security 16), pp. 327\u2013343. USENIX Association, Austin (2016). https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/alkim"},{"key":"4_CR2","unstructured":"Avanzi, R., et al.: Algorithm specifications and supporting documentation (version 3.02). Technical report, Submission to the NIST post-quantum project (2021). https:\/\/pq-crystals.org\/kyber\/resources.shtml"},{"key":"4_CR3","unstructured":"Azimi, M.: Digital Image Processing Lectures 7 & 8. Colorado State University (2011). https:\/\/www.engr.colostate.edu\/ECE513\/SP09\/lectures\/lectures7_8.pdf"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Bos, J., et al.: CRYSTALS - kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 353\u2013367 (2018). https:\/\/doi.org\/10.1109\/EuroSP.2018.00032","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, 3\u20137 December 2017, Proceedings, Part I 23, pp. 409\u2013437. Springer (2017)","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","volume":"33","author":"I Chillotti","year":"2020","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33, 34\u201391 (2020). https:\/\/doi.org\/10.1007\/s00145-019-09319-x","journal-title":"J. Cryptol."},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Costache, A., Curtis, B.R., Hales, E., Murphy, S., Ogilvie, T., Player, R.: On the precision loss in approximate homomorphic encryption. In: Selected Areas in Cryptography \u2013 SAC 2023, pp. 325\u2013345. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-53368-6_16","DOI":"10.1007\/978-3-031-53368-6_16"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"D\u2019Anvers, J.P., Batsleer, S.: Multitarget decryption failure attacks and their application to saber and kyber. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) Public-Key Cryptography \u2013 PKC 2022, pp. 3\u201333. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-97121-2_1","DOI":"10.1007\/978-3-030-97121-2_1"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-030-17259-6_19","volume-title":"Public-Key Cryptography \u2013 PKC 2019","author":"J-P D\u2019Anvers","year":"2019","unstructured":"D\u2019Anvers, J.-P., Guo, Q., Johansson, T., Nilsson, A., Vercauteren, F., Verbauwhede, I.: Decryption failure attacks on IND-CCA secure lattice-based schemes. In: Lin, D., Sako, K. (eds.) PKC 2019. LNCS, vol. 11443, pp. 565\u2013598. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17259-6_19"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"D\u2019Anvers, J.P., Tiepelt, M., Vercauteren, F., Verbauwhede, I.: Timing attacks on error correcting codes in post-quantum schemes. In: Proceedings of ACM Workshop on Theory of Implementation Security Workshop, TIS\u201919, pp. 2\u20139. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3338467.3358948","DOI":"10.1145\/3338467.3358948"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Fritzmann, T., P\u00f6ppelmann, T., Sepulveda, J.: Analysis of error-correcting codes for lattice-based key exchange. In: Cid, C., Jacobson\u00a0Jr, M.J. (eds.) Selected Areas in Cryptography \u2013 SAC 2018, pp. 369\u2013390. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-10970-7_17","DOI":"10.1007\/978-3-030-10970-7_17"},{"key":"4_CR12","unstructured":"Lin, S., Costello, D.J.: Error Control Coding, 2nd edn. Prentice-Hall Inc. (2004)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Liu, S., Sakzad, A.: Lattice codes for CRYSTALS-kyber (2023). https:\/\/arxiv.org\/abs\/2308.13981","DOI":"10.36227\/techrxiv.24031218.v1"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd, S.: Least squares quantization in PCM. IEEE Trans. Inf. Theory 28(2), 129\u2013137 (1982). https:\/\/doi.org\/10.1109\/TIT.1982.1056489","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Lyu, S., Liu, L., Ling, C., Lai, J., Chen, H.: Lattice codes for lattice-based PKE. Des. Codes Cryptogr. (2023). https:\/\/doi.org\/10.1007\/s10623-023-01321-6","DOI":"10.1007\/s10623-023-01321-6"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Maringer, G., Puchinger, S., Wachter-Zeh, A.: Information- and coding-theoretic analysis of the RLWE\/MLWE channel. IEEE Trans. Inf. Forensics Secur. 18, 549\u2013564 (2023). https:\/\/doi.org\/10.1109\/TIFS.2022.3226907","DOI":"10.1109\/TIFS.2022.3226907"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology: Module-Lattice-Based Key Encapsulation Mechanism Standard. Federal Information Processing Standards Publication (FIPS) NIST FIPS 203 ipd. (2023). https:\/\/doi.org\/10.6028\/NIST.FIPS.203.ipd","DOI":"10.6028\/NIST.FIPS.203.ipd"},{"key":"4_CR18","unstructured":"van Poppelen, A.: Cryptographic decoding of the Leech lattice. Cryptology ePrint Archive, Paper 2016\/1050 (2016). https:\/\/eprint.iacr.org\/2016\/1050"},{"key":"4_CR19","volume-title":"Digital Communications","author":"JG Proakis","year":"2000","unstructured":"Proakis, J.G.: Digital Communications, 4th edn. McGraw-Hill, New York (2000)","edition":"4"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Saliba, C., Luzzi, L., Ling, C.: A reconciliation approach to key generation based on module-LWE. In: 2021 IEEE International Symposium on Information Theory (ISIT), pp. 1636\u20131641 (2021). https:\/\/doi.org\/10.1109\/ISIT45174.2021.9517882","DOI":"10.1109\/ISIT45174.2021.9517882"},{"issue":"5","key":"4_CR21","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/0167-8655(96)00011-6","volume":"17","author":"P Scheunders","year":"1996","unstructured":"Scheunders, P.: A genetic Lloyd-Max image quantization algorithm. Pattern Recogn. Lett. 17(5), 547\u2013556 (1996). https:\/\/doi.org\/10.1016\/0167-8655(96)00011-6","journal-title":"Pattern Recogn. Lett."},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"Tang, Y., Clapp, R.G.: Selection of reference-anisotropy parameters for wavefield extrapolation by Lloyd\u2019s algorithm. In: SEG Technical Program Expanded Abstracts, pp. 189\u2013193 (2006). https:\/\/doi.org\/10.1190\/1.2369897","DOI":"10.1190\/1.2369897"},{"issue":"5","key":"4_CR23","doi-asserted-by":"publisher","first-page":"1306","DOI":"10.1109\/JLT.2020.3039178","volume":"39","author":"M Urlea","year":"2021","unstructured":"Urlea, M., Loyka, S.: Simple closed-form approximations for achievable information rates of coded modulation systems. J. Lightwave Technol. 39(5), 1306\u20131311 (2021). https:\/\/doi.org\/10.1109\/JLT.2020.3039178","journal-title":"J. Lightwave Technol."},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Walters, M., Roy, S.S.: Constant-time BCH error-correcting code. In: 2020 IEEE International Symposium on Circuits and Systems (ISCAS), pp.\u00a01\u20135 (2020). https:\/\/doi.org\/10.1109\/ISCAS45731.2020.9180846","DOI":"10.1109\/ISCAS45731.2020.9180846"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0957-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T21:34:06Z","timestamp":1738272846000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0957-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819609567","9789819609574"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0957-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"31 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2024.github.io\/ProvSec2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}