{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:20:06Z","timestamp":1757618406711,"version":"3.44.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s11390-024-3517-6","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:37:18Z","timestamp":1752140238000},"page":"904-920","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["OSKR\/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice"],"prefix":"10.1007","volume":"40","author":[{"given":"Shi-Yu","family":"Shen","sequence":"first","affiliation":[]},{"given":"Hong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"He","sequence":"additional","affiliation":[]},{"given":"Zhi-Chuang","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Jie-Yu","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Han-Yu","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhen-Feng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yun-Lei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,9]]},"reference":[{"key":"3517_CR1","series-title":"Technical Report","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8413","volume-title":"Status report on the third round of the NIST post-quantum cryptography standardization process","author":"G Alagic","year":"2025","unstructured":"Alagic G, Apon D, Cooper D, et al. Status report on the third round of the NIST post-quantum cryptography standardization process. Technical Report, NIST IR 8413, NIST, 2022. https:\/\/doi.org\/10.6028\/NIST.IR.8413, May 2025."},{"key":"3517_CR2","series-title":"Technical Report","volume-title":"CRYSTALS-KYBER: Algorithm specifications and supporting documentation","author":"R Avanzi","year":"2025","unstructured":"Avanzi R, Bos J, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck J M, Schwabe P, Seiler G, Stehl\u00e9 D. CRYSTALS-KYBER: Algorithm specifications and supporting documentation. Technical Report, 2021. https:\/\/pq-crystals.org\/kyber\/data\/kyber-specification-round320210131.pdf, May 2025."},{"key":"3517_CR3","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1109\/EuroSP.2018.00032","volume-title":"Proc. the 2018 IEEE European Symposium on Security and Privacy","author":"J W Bos","year":"2018","unstructured":"Bos J W, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck J M, Schwabe P, Seiler G, Stehl\u00e9 D. CRYSTALS - Kyber: A CCA-secure module-lattice-based KEM. In Proc. the 2018 IEEE European Symposium on Security and Privacy, Apr. 2018, pp.353\u2013367. DOI: https:\/\/doi.org\/10.1109\/EUROSP.2018.00032."},{"key":"3517_CR4","series-title":"Technical Report","volume-title":"CRYSTALS-Dilithium: Algorithm specifications and supporting documentation","author":"S Bai","year":"2025","unstructured":"Bai S, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schwabe P, Seiler G, Stehl\u00e9 D. CRYSTALS-Dilithium: Algorithm specifications and supporting documentation. Technical Report, 2021. https:\/\/pq-crystals.org\/dilithium\/data\/dilithium-specification-round3-20210208.pdf, May 2025."},{"key":"3517_CR5","series-title":"Technical Report","volume-title":"FALCON: Fast-Fourier lattice-based compact signatures over NTRU","author":"P A Fouque","year":"2025","unstructured":"Fouque P A, Hoffstein J, Kirchner P, Lyubashevsky V, Pornin T, Prest T, Ricosset T, Seiler G, Whyte W, Zhang Z. FALCON: Fast-Fourier lattice-based compact signatures over NTRU. Technical Report, 2020. https:\/\/falconsign.info\/falcon.pdf, May 2025."},{"key":"3517_CR6","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/237814.237838","volume-title":"Proc. the 28th Annual ACM Symposium on Theory of Computing","author":"M Ajtai","year":"1996","unstructured":"Ajtai M. Generating hard instances of lattice problems. In Proc. the 28th Annual ACM Symposium on Theory of Computing, May 1996, pp.99\u2013108. DOI: https:\/\/doi.org\/10.1145\/237814.237838."},{"key":"3517_CR7","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/1060590.1060603","volume-title":"Proc. the 37th Annual ACM Symposium on Theory of Computing","author":"O Regev","year":"2005","unstructured":"Regev O. On lattices, learning with errors, random linear codes, and cryptography. In Proc. the 37th Annual ACM Symposium on Theory of Computing, May 2005, pp.84\u201393. DOI: https:\/\/doi.org\/10.1145\/1060590.1060603."},{"issue":"3","key":"3517_CR8","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s10623-014-9938-4","volume":"75","author":"A Langlois","year":"2015","unstructured":"Langlois A, Stehl\u00e9 D. Worst-case to average-case reductions for module lattices. Designs, Codes and Cryptography, 2015, 75(3): 565\u2013599. DOI: https:\/\/doi.org\/10.1007\/S10623-014-9938-4.","journal-title":"Designs, Codes and Cryptography"},{"key":"3517_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-030-45388-6_2","volume-title":"Proc. the 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography","author":"J Zhang","year":"2020","unstructured":"Zhang J, Yu Y, Fan S, Zhang Z, Yang K. Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes. In Proc. the 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, May 2020, pp.37\u201365. DOI: https:\/\/doi.org\/10.1007\/978-3-030-45388-6_2."},{"key":"3517_CR10","series-title":"Technique Report","volume-title":"The transport layer security (TLS) protocol version 1.3","author":"E Rescorla","year":"2025","unstructured":"Rescorla E, Dierks T. The transport layer security (TLS) protocol version 1.3. Technique Report, RFC 8446, IETF, 2018. https:\/\/www.rfc-editor.org\/rfc\/rfc8446, May 2025."},{"key":"3517_CR11","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-030-45724-2_10","volume-title":"Proc. the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"S Jaques","year":"2020","unstructured":"Jaques S, Naehrig M, Roetteler M, Virdia F. Implementing Grover oracles for quantum key search on AES and LowMC. In Proc. the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, pp.280\u2013310. DOI: https:\/\/doi.org\/10.1007\/978-3-030-45724-2_10."},{"key":"3517_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-02945-9","volume-title":"A Course in Computational Algebraic Number Theory","author":"H Cohen","year":"1993","unstructured":"Cohen H. A Course in Computational Algebraic Number Theory. Springer, 1993. DOI: https:\/\/doi.org\/10.1007\/978-3-662-02945-9."},{"issue":"90","key":"3517_CR13","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"J W Cooley","year":"1965","unstructured":"Cooley J W, Tukey J W. An algorithm for the machine calculation of complex Fourier series. Mathematics of Computation, 1965, 19(90): 297\u2013301. DOI: https:\/\/doi.org\/10.1090\/S0025-5718-1965-0178586-1.","journal-title":"Mathematics of Computation"},{"key":"3517_CR14","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1090\/S0002-9947-1969-0249212-8","volume":"142","author":"S A Cook","year":"1969","unstructured":"Cook S A, Aanderaa S O. On the minimum computation time of functions. Trans. American Mathematical Society, 1969, 142: 291\u2013314. DOI: https:\/\/doi.org\/10.1090\/S0002-9947-1969-0249212-8.","journal-title":"Trans. American Mathematical Society"},{"issue":"2","key":"3517_CR15","first-page":"293","volume":"145","author":"A Karatsuba","year":"1962","unstructured":"Karatsuba A, Ofman Y. Multiplication of many-digital numbers by automatic computers. Doklady Akademii Nauk SSSR, 1962, 145(2): 293\u2013294.","journal-title":"Doklady Akademii Nauk SSSR"},{"issue":"3","key":"3517_CR16","first-page":"496","volume":"150","author":"A L Toom","year":"1963","unstructured":"Toom A L. The complexity of a scheme of functional elements realizing the multiplication of integers. Doklady Akademii Nauk SSSR, 1963, 150(3): 496\u2013498.","journal-title":"Doklady Akademii Nauk SSSR"},{"key":"3517_CR17","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-030-14234-6_7","volume-title":"Proc. the 14th International Conference on Information Security and Cryptology","author":"S Zhou","year":"2018","unstructured":"Zhou S, Xue H, Zhang D, Wang K, Lu X, Li B, He J. Preprocess-then-NTT technique and its applications to KYBER and NEWHOPE. In Proc. the 14th International Conference on Information Security and Cryptology, Dec. 2018, pp.117\u2013137. DOI: https:\/\/doi.org\/10.1007\/978-3-030-14234-6_7."},{"key":"3517_CR18","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-030-88052-1_15","volume-title":"Proc. the 23rd International Conference on Information and Communications Security","author":"Y Zhu","year":"2021","unstructured":"Zhu Y, Liu Z, Pan Y. When NTT meets Karatsuba: Pre-process-then-NTT technique revisited. In Proc. the 23rd International Conference on Information and Communications Security, Nov. 2021, pp.249\u2013264. DOI: https:\/\/doi.org\/10.1007\/978-3-030-88052-1_15."},{"key":"3517_CR19","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-030-30530-7_12","volume-title":"Proc. the 6th International Conference on Cryptology and Information Security in Latin America","author":"E Alkim","year":"2019","unstructured":"Alkim E, Bilgin Y A, Cenk M. Compact and simple RLWE based key encapsulation mechanism. In Proc. the 6th International Conference on Cryptology and Information Security in Latin America, Oct. 2019, pp.237\u2013256. DOI: https:\/\/doi.org\/10.1007\/978-3-030-30530-7_12."},{"key":"3517_CR20","unstructured":"Weimerskirch A, Paar C. Generalizations of the Karatsuba algorithm for efficient implementations. IACR Cryptology ePrint Archive: 2006\/224, 2006. http:\/\/eprint.iacr.org\/2006\/224, May 2025."},{"key":"3517_CR21","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-030-71852-7_28","volume-title":"Proc. the 16th International Conference on Information Security and Cryptology","author":"Z Liang","year":"2020","unstructured":"Liang Z, Shen S, Shi Y, Sun D, Zhang C, Zhang G, Zhao Y, Zhao Z. Number theoretic transform: Generalization, optimization, concrete analysis and applications. In Proc. the 16th International Conference on Information Security and Cryptology, Dec. 2020, pp.415\u2013432. DOI: https:\/\/doi.org\/10.1007\/978-3-030-71852-7_28."},{"key":"3517_CR22","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-319-70500-2_12","volume-title":"Proc. the 15th International Conference on Theory of Cryptography","author":"D Hofheinz","year":"2017","unstructured":"Hofheinz D, H\u00f6velmanns K, Kiltz E. A modular analysis of the Fujisaki-Okamoto transformation. In Proc. the 15th International Conference on Theory of Cryptography, Nov. 2017, pp.341\u2013371. DOI: https:\/\/doi.org\/10.1007\/978-3-319-70500-2_12."},{"key":"3517_CR23","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Proc. the 19th Annual International Cryptology Conference on Advances in Cryptology","author":"E Fujisaki","year":"1999","unstructured":"Fujisaki E, Okamoto T. Secure integration of asymmetric and symmetric encryption schemes. In Proc. the 19th Annual International Cryptology Conference on Advances in Cryptology, Aug. 1999, pp.537\u2013554. DOI: https:\/\/doi.org\/10.1007\/3-540-48405-1_34."},{"key":"3517_CR24","doi-asserted-by":"publisher","first-page":"2722","DOI":"10.1145\/3460120.3484819","volume-title":"Proc. the 2021 ACM SIGSAC Conference on Computer and Communications Security","author":"J Duman","year":"2021","unstructured":"Duman J, H\u00f6velmanns K, Kiltz E, Lyubashevsky V, Seiler G. Faster lattice-based KEMs via a generic Fujisaki-Okamoto transform using prefix hashing. In Proc. the 2021 ACM SIGSAC Conference on Computer and Communications Security, Nov. 2021, pp.2722\u20132737. DOI: https:\/\/doi.org\/10.1145\/3460120.3484819."},{"key":"3517_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-13190-5_1","volume-title":"Proc. the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology","author":"V Lyubashevsky","year":"2010","unstructured":"Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings. In Proc. the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, May 2010, pp.1\u201323. DOI: https:\/\/doi.org\/10.1007\/978-3-642-13190-5_1."},{"key":"3517_CR26","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/3-540-47721-7_24","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"P Barrett","year":"1987","unstructured":"Barrett P. Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In Advances in Cryptology \u2014 CRYPTO\u2019 86, Odlyzko A M (ed.), Springer, 1987, pp.311\u2013323. DOI: https:\/\/doi.org\/10.1007\/3-540-47721-7_24."},{"issue":"10","key":"3517_CR27","doi-asserted-by":"publisher","first-page":"2086","DOI":"10.7544\/issn1000-1239.2020.20200452","volume":"57","author":"Y Wang","year":"2020","unstructured":"Wang Y, Shen S, Zhao Y, Wang M. Comparisons and optimizations of key encapsulation mechanisms based on module lattices. Journal of Computer Research and Development, 2020, 57(10): 2086\u20132103. DOI: https:\/\/doi.org\/10.7544\/issn1000-1239.2020.20200452. (in Chinese)","journal-title":"Journal of Computer Research and Development"},{"key":"3517_CR28","doi-asserted-by":"publisher","unstructured":"Nejatollahi H, Dutt N, Ray S, Regazzoni F, Banerjee I, Cammarota R. Post-Quantum lattice-based cryptography implementations: A survey. ACM Computing Surveys (CSUR), 2019, 51(6): Article No. 129. DOI: https:\/\/doi.org\/10.1145\/3292548.","DOI":"10.1145\/3292548"},{"key":"3517_CR29","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-319-47560-8_12","volume-title":"Proc. the 21st Nordic Conference on Secure IT Systems","author":"S Gueron","year":"2016","unstructured":"Gueron S, Schlieker F. Speeding up R-LWE post-quantum key exchange. In Proc. the 21st Nordic Conference on Secure IT Systems, Nov. 2016, pp.187\u2013198. DOI: https:\/\/doi.org\/10.1007\/978-3-319-47560-8_12."},{"key":"3517_CR30","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.202","volume-title":"Federal Inf. Process. Stds. (NIST FIPS)","author":"M J Dworkin","year":"2025","unstructured":"Dworkin M J. SHA-3 standard: Permutation-based hash and extendable-output functions. In Federal Inf. Process. Stds. (NIST FIPS), National Institute of Standards and Technology, 2015. https:\/\/doi.org\/10.6028\/NIST.FIPS.202, May 2025."},{"key":"3517_CR31","volume-title":"The Art of Computer Programming","author":"D E Knuth","year":"1997","unstructured":"Knuth D E. The Art of Computer Programming (3rd edition). Addison-Wesley Professional, 1997.","edition":"3rd edition"},{"key":"3517_CR32","unstructured":"Seiler G. Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography. IACR Cryptology ePrint Archive: 2018\/039, 2018. https:\/\/eprint.iacr.org\/2018\/039, May 2025."},{"issue":"4","key":"3517_CR33","doi-asserted-by":"publisher","first-page":"614","DOI":"10.46586\/tches.v2022.i4.614-636","volume":"2022","author":"J Huang","year":"2022","unstructured":"Huang J, Zhang J, Zhao H, Liu Z, Cheung R C C, Ko\u00e7 \u00c7 K, Chen D. Improved Plantard arithmetic for lattice-based cryptography. IACR Trans. Cryptographic Hardware and Embedded Systems, 2022, 2022(4): 614\u2013636. DOI: https:\/\/doi.org\/10.46586\/tches.v2022.i4.614-636.","journal-title":"IACR Trans. Cryptographic Hardware and Embedded Systems"},{"key":"3517_CR34","unstructured":"Kannwischer M J, Rijneveld J, Schwabe P, Stoffelen K. pqm4: Testing and benchmarking NIST PQC on ARM Cortex-M4. IACR Cryptology ePrint Archive: 2019\/844, 2019. https:\/\/eprint.iacr.org\/2019\/844, May 2025."},{"issue":"10","key":"3517_CR35","doi-asserted-by":"publisher","first-page":"2238","DOI":"10.7544\/issn1000-1239.2021.20210617","volume":"58","author":"S Shen","year":"2021","unstructured":"Shen S, He F, Zhao Y. Multi-Platform efficient implementation and optimization of Aigis-enc algorithm. Journal of Computer Research and Development, 2021, 58(10): 2238\u20132252. DOI: https:\/\/doi.org\/10.7544\/issn1000-1239.2021.20210617. (in Chinese)","journal-title":"Journal of Computer Research and Development"},{"key":"3517_CR36","series-title":"ITL Bulletin","volume-title":"Federal Inf. Process. Stds.","author":"S M Radack","year":"2025","unstructured":"Radack S M. Secure hash standard: Updated specifications approved and issued as Federal Information Processing Standard (FIPS) 180\u20134. In ITL Bulletin, National Institute of Standards and Technology, Federal Inf. Process. Stds., 2012. https:\/\/tsapps.nist.gov\/publication\/get_pdf.cfm?pub_id=911344, May 2025."}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-024-3517-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-024-3517-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-024-3517-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T02:08:56Z","timestamp":1757210936000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-024-3517-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["3517"],"URL":"https:\/\/doi.org\/10.1007\/s11390-024-3517-6","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"type":"print","value":"1000-9000"},{"type":"electronic","value":"1860-4749"}],"subject":[],"published":{"date-parts":[[2025,5]]},"assertion":[{"value":"17 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Conflict of Interest The authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics"}}]}}