{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:51:30Z","timestamp":1762509090238,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819980239"},{"type":"electronic","value":"9789819980246"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8024-6_26","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T05:02:11Z","timestamp":1704862931000},"page":"338-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Evaluating KpqC Algorithm Submissions: Balanced and\u00a0Clean Benchmarking Approach"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9173-512X","authenticated-orcid":false,"given":"Hyeokdong","family":"Kwon","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5242-214X","authenticated-orcid":false,"given":"Minjoo","family":"Sim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4337-1843","authenticated-orcid":false,"given":"Gyeongju","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2356-3055","authenticated-orcid":false,"given":"Minwoo","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0069-9061","authenticated-orcid":false,"given":"Hwajeong","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Feynman, R.P.: Simulating physics with computers. In: Feynman and Computation, pp. 133\u2013153. CRC Press (2018)","DOI":"10.1201\/9780429500459-11"},{"issue":"1818","key":"26_CR2","first-page":"97","volume":"400","author":"D Deutsch","year":"1985","unstructured":"Deutsch, D.: Quantum theory, the Church\u2013Turing principle and the universal quantum computer. Proc. Roy. Soc. Lond. A Math. Phys. Sci. 400(1818), 97\u2013117 (1985)","journal-title":"Proc. Roy. Soc. Lond. A Math. Phys. Sci."},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212\u2013219 (1996)","DOI":"10.1145\/237814.237866"},{"issue":"2","key":"26_CR4","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"26_CR5","unstructured":"Jang, K.-B., Seo, H.-J.: Quantum computer and standardization trend of NIST post-quantum cryptography. In: Proceedings of the Korea Information Processing Society Conference, pp. 129\u2013132. Korea Information Processing Society (2019)"},{"key":"26_CR6","unstructured":"NIST, Round 4 submissions - post-quantum cryptography: CSRC (2022)"},{"issue":"4","key":"26_CR7","first-page":"1","volume":"2","author":"R Avanzi","year":"2019","unstructured":"Avanzi, R., et al.: CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round 2(4), 1\u201343 (2019)","journal-title":"NIST PQC Round"},{"key":"26_CR8","unstructured":"Lyubashevsky, V., et al.: Crystals-dilithium. In: Algorithm Specifications and Supporting Documentation (2020)"},{"key":"26_CR9","unstructured":"Prest, T., et al.: Falcon. In: Post-Quantum Cryptography Project of NIST (2020)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS$$^+$$ signature framework. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2129\u20132146 (2019)","DOI":"10.1145\/3319535.3363229"},{"key":"26_CR11","unstructured":"Aragon, N., et al.: BIKE: bit flipping key encapsulation (2017)"},{"key":"26_CR12","unstructured":"Albrecht, M.R., et al.: Classic McEliece. Technical report, National Institute of Standards and Technology (2020)"},{"key":"26_CR13","unstructured":"Melchor, C.A., et al.: HQC: hamming quasi-cyclic. In: NIST Post-Quantum Standardization, 3rd Round (2021)"},{"key":"26_CR14","unstructured":"Azarderakhsh, R., et al.: Supersingular isogeny key encapsulation. Submission to the NIST Post-Quantum Standardization Project, vol. 152, pp. 154\u2013155 (2017)"},{"key":"26_CR15","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. Cryptology ePrint Archive, Paper 2022\/975 (2022). https:\/\/eprint.iacr.org\/2022\/975"},{"key":"26_CR16","unstructured":"K.\u00a0team: KpqC competition round 1 (2023). https:\/\/kpqc.or.kr\/competition.html. Accessed 07 Apr 2023"},{"key":"26_CR17","unstructured":"Ryu, J., Kim, Y., Yoon, S., Kang, J.-S., Yeom, Y.: IPCC-improved perfect code cryptosystems (2022)"},{"key":"26_CR18","unstructured":"Cho, J., No, J.-S., Lee, Y., Koo, Z., Kim, Y.-S.: Enhanced pqsigRM: code-based digital signature scheme with short signature and fast verification for post-quantum cryptography. Cryptology ePrint Archive (2022)"},{"key":"26_CR19","unstructured":"Kim, C., Kim, Y.-S., No, J.-S.: Layered ROLLO-I: faster rank-metric code-based KEM using ideal LRPC codes. Cryptology ePrint Archive (2022)"},{"key":"26_CR20","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-031-46495-9_8","volume-title":"Code-Based Cryptography","author":"D-C Kim","year":"2022","unstructured":"Kim, D.-C., Jeon, C.-Y., Kim, Y., Kim, M.: PALOMA: binary separable Goppa-based KEM. In: Esser, A., Santini, P. (eds.) CBCrypto 2023. LNCS, vol. 14311, pp. 144\u2013173. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-46495-9_8"},{"key":"26_CR21","unstructured":"Kim, J.-L., et al.: REDOG and its performance analysis. Cryptology ePrint Archive (2022)"},{"key":"26_CR22","unstructured":"Woo, J., Lee, K., Park, J.H.: GCKSign: simple and efficient signatures from generalized compact knapsacks. Cryptology ePrint Archive (2022)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Kim, J., Park, J.H.: NTRU+: compact construction of NTRU using simple encoding method. Cryptology ePrint Archive (2022)","DOI":"10.1109\/TIFS.2023.3299172"},{"key":"26_CR24","unstructured":"Cheon, J.H., et al.: HAETAE: hyperball bimodal module rejection signature scheme (2023)"},{"key":"26_CR25","unstructured":"Cheon, J.H., et al.: SMAUG: the key exchange algorithm based on module-LWE and module-LWR (2023)"},{"key":"26_CR26","unstructured":"Shim, K.-A., Kim, J., An, Y.: NCC-Sign: a new lattice-based signature scheme using non-cyclotomic polynomials (2023)"},{"key":"26_CR27","unstructured":"Park, S., Jung, C.-G., Park, A., Choi, J., Kang, H.: TiGER: tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE (R). Cryptology ePrint Archive (2022)"},{"key":"26_CR28","unstructured":"Seo, E.-Y., Kim, Y.-S., Lee, J.-W., No, J.-S.: Peregrine: toward fastest FALCON based on GPV framework. Cryptology ePrint Archive (2022)"},{"key":"26_CR29","unstructured":"Kim, K., et al.: SOLMAE algorithm specifications (2022)"},{"key":"26_CR30","unstructured":"Shim, K.-A., Kim, J., An, Y.: MQ-Sign: a new post-quantum signature scheme based on multivariate quadratic equations: shorter and faster (2022)"},{"key":"26_CR31","unstructured":"Kim, S., Lee, Y., Yoon, K.: FIBS: fast isogeny based digital signature (2022)"},{"key":"26_CR32","unstructured":"Kim, S., et al.: The AIMer signature scheme (2023)"},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Kannwischer, M.J., Schwabe, P., Stebila, D., Wiggers, T.: Improving software quality in cryptography standardization projects. In: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 19\u201330. IEEE (2022)","DOI":"10.1109\/EuroSPW55150.2022.00010"},{"key":"26_CR34","unstructured":"Kannwischer, M.J., Rijneveld, J., Schwabe, P., Stoffelen, K.: pqm4: testing and benchmarking NIST PQC on ARM Cortex-M4 (2019)"},{"key":"26_CR35","unstructured":"Viega, J., Messier, M., Chandra, P.: Network Security with openSSL: Cryptography for Secure Communications. O\u2019Reilly Media, Inc. (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8024-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T20:09:19Z","timestamp":1731010159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8024-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819980239","9789819980246"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8024-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wisa.or.kr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}