{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:40:24Z","timestamp":1767339624622,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819709441"},{"type":"electronic","value":"9789819709458"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0945-8_7","type":"book-chapter","created":{"date-parts":[[2024,2,24]],"date-time":"2024-02-24T20:02:14Z","timestamp":1708804934000},"page":"111-129","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Hardware Acceleration of\u00a0NTT-Based Polynomial Multiplication in\u00a0CRYSTALS-Kyber"],"prefix":"10.1007","author":[{"given":"Hang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Rongmao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zixuan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,25]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on the Foundations of Computer Science, Los Alamitos, CA, pp. 124\u2013134. IEEE Computer Society Press (1994)","key":"7_CR1","DOI":"10.1109\/SFCS.1994.365700"},{"doi-asserted-by":"crossref","unstructured":"Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography: a combination of post-quantum cryptography and steganography. In: 2013 IEEE Third International Conference on Information Science and Technology (ICIST) (2014)","key":"7_CR2","DOI":"10.1109\/ICIST.2013.6747589"},{"doi-asserted-by":"crossref","unstructured":"Alagic, G., et al.: Status report on the third round of the NIST post-quantum cryptography standardization process (2022). https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=935591","key":"7_CR3","DOI":"10.6028\/NIST.IR.8413"},{"unstructured":"Avanzi, R.M., et al.: Crystals-kyber algorithm specifications and supporting documentation (2017)","key":"7_CR4"},{"unstructured":"Li, H., Guo, Y., Jia, R.: A hardware acceleration method for the normalized product correlation algorithm and its FPGA implementation. Comput. Eng. Sci.\/Jisuanji Gongcheng yu Kexue 1905\u20131910 (2019)","key":"7_CR5"},{"unstructured":"Han, Z., Jiang J., Qiao L., Dou, Y., Xu, J., Kan, Z.: Design and implementation of event extraction model and accelerator based on FPGA. Comput. Eng. Sci.\/Jisuanji Gongcheng yu Kexue 1941\u20131948 (2020)","key":"7_CR6"},{"doi-asserted-by":"publisher","unstructured":"Chen, Z., Ma, Y., Chen, T., Lin, J., Jing, J.: Towards efficient kyber on FPGAS: a processor for vector of polynomials. In: 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 247\u2013252 (2020). https:\/\/doi.org\/10.1109\/ASP-DAC47756.2020.9045459","key":"7_CR7","DOI":"10.1109\/ASP-DAC47756.2020.9045459"},{"doi-asserted-by":"publisher","unstructured":"Mert, A.C., \u00d6zt\u00fcrk, E., Sava\u015f, E.: Design and implementation of a fast and scalable NTT-based polynomial multiplier architecture. In: 2019 22nd Euromicro Conference on Digital System Design (DSD), pp. 253\u2013260 (2019). https:\/\/doi.org\/10.1109\/DSD.2019.00045","key":"7_CR8","DOI":"10.1109\/DSD.2019.00045"},{"issue":"8","key":"7_CR9","doi-asserted-by":"publisher","first-page":"1916","DOI":"10.1109\/TC.2021.3112052","volume":"71","author":"T Zijlstra","year":"2022","unstructured":"Zijlstra, T., Bigou, K., Tisserand, A.: Lattice-based cryptosystems on FPGA: parallelization and comparison using HLS. IEEE Trans. Comput. 71(8), 1916\u20131927 (2022). https:\/\/doi.org\/10.1109\/TC.2021.3112052","journal-title":"IEEE Trans. Comput."},{"doi-asserted-by":"crossref","unstructured":"Fritzmann, T., Sigl, G., Sep\u00falveda, J.: RISQ-V: tightly coupled RISC-V accelerators for post-quantum cryptography. Cryptology ePrint Archive, Paper 2020\/446 (2020). https:\/\/eprint.iacr.org\/2020\/446","key":"7_CR10","DOI":"10.46586\/tches.v2020.i4.239-280"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"08","DOI":"10.1587\/elex.17.20200234","volume":"17","author":"Y Huang","year":"2020","unstructured":"Huang, Y., Huang, M., Lei, Z., Jiaxuan, W.: A pure hardware implementation of crystals-kyber PQC algorithm through resource reuse. IEICE Electron. Exp. 17, 08 (2020). https:\/\/doi.org\/10.1587\/elex.17.20200234","journal-title":"IEICE Electron. Exp."},{"doi-asserted-by":"publisher","unstructured":"Mert, A.C., Karabulut, E., \u00d6zt\u00fcrk, E., Sava\u015f, E., Aysu, A.: An extensive study of flexible design methods for the number theoretic transform. IEEE Trans. Comput. 71(11), 2829\u20132843 (2022). https:\/\/doi.org\/10.1109\/TC.2020.3017930","key":"7_CR12","DOI":"10.1109\/TC.2020.3017930"},{"doi-asserted-by":"crossref","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., Mozaffari-Kermani, M.: High-speed NTT-based polynomial multiplication accelerator for crystals-kyber post-quantum cryptography. Cryptology ePrint Archive, Paper 2021\/563 (2021). https:\/\/eprint.iacr.org\/2021\/563","key":"7_CR13","DOI":"10.1109\/ARITH51176.2021.00028"},{"doi-asserted-by":"publisher","unstructured":"Yaman, F., Mert, A.C., \u00d6zt\u00fcrk, E., Sava\u015f, E.: A hardware accelerator for polynomial multiplication operation of crystals-kyber PQC scheme. In: 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 1020\u20131025 (2021). https:\/\/doi.org\/10.23919\/DATE51398.2021.9474139","key":"7_CR14","DOI":"10.23919\/DATE51398.2021.9474139"},{"doi-asserted-by":"crossref","unstructured":"Xing, Y., Li, S.: A compact hardware implementation of CCA-secure key exchange mechanism crystals-kyber on FPGA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 328\u2013356 (2021)","key":"7_CR15","DOI":"10.46586\/tches.v2021.i2.328-356"},{"doi-asserted-by":"crossref","unstructured":"Ricci, S., Jedlicka, P., C\u00edbik, P., Dzurenda, P., Malina, L., Hajny, J.: Towards crystals-kyber VHDL implementation. In: International Conference on Security and Cryptography (2021)","key":"7_CR16","DOI":"10.5220\/0010580400002998"},{"unstructured":"Ni, Z., Khalid, A., O\u2019Neill, M., Liu, W.: Efficient pipelining exploration for a high-performance crystals-kyber accelerator. Cryptology ePrint Archive, Paper 2022\/1093 (2022). https:\/\/eprint.iacr.org\/2022\/1093","key":"7_CR17"},{"unstructured":"Salarifard, R., Soleimany, H.: Efficient accelerator for NTT-based polynomial multiplication. Cryptology ePrint Archive, Paper 2023\/686 (2023). https:\/\/eprint.iacr.org\/2023\/686","key":"7_CR18"},{"key":"7_CR19","first-page":"2020","volume":"49\u201372","author":"N Zhang","year":"2020","unstructured":"Zhang, N., Yang, B., Chen, C., Yin, S., Wei, S., Liu, L.: Highly efficient architecture of NewHope-NIST on FPGA using low-complexity NTT\/INTT. IACR Trans. Cryptogr. Hardw. Embed. Syst. 49\u201372, 2020 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"7_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104451","volume":"89","author":"K Derya","year":"2022","unstructured":"Derya, K., Mert, A.C., \u00d6zt\u00fcrk, E., Sava\u015f, E.: CoHA-NTT: a configurable hardware accelerator for NTT-based polynomial multiplication. Microprocess. Microsyst. 89, 104451 (2022)","journal-title":"Microprocess. Microsyst."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0945-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T17:29:47Z","timestamp":1741368587000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0945-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819709441","9789819709458"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0945-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2023.github.io\/#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"152","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}