{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:36:37Z","timestamp":1757781397371,"version":"3.37.3"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government","doi-asserted-by":"publisher","award":["2021-0-00907"],"award-info":[{"award-number":["2021-0-00907"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Development of Adaptive and Lightweight Edge-Collaborative Analysis Technology for Enabling Proactively Immediate Response and Rapid Learning"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2021.3138807","type":"journal-article","created":{"date-parts":[[2021,12,27]],"date-time":"2021-12-27T21:01:18Z","timestamp":1640638878000},"page":"2546-2563","source":"Crossref","is-referenced-by-count":10,"title":["A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1892-1698","authenticated-orcid":false,"given":"Jong-Yeon","family":"Park","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6700-1070","authenticated-orcid":false,"given":"Yong-Hyuk","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Wonil","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sung-Hyun","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4621-1674","authenticated-orcid":false,"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"volume-title":"Post quantum cryptography: Current state and quantum mitigation. Enisa","year":"2021","author":"Beullens","key":"ref2"},{"volume-title":"Announcing Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms","year":"2016","key":"ref3"},{"volume-title":"NIST, 3rd Round Finalist and Alternate Candidates","year":"2020","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2009.05.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474139"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i1.169-208"},{"author":"Bos","key":"ref8","article-title":"Post-quantum cryptography with contemporary coprocessors beyond Kronecker, Sch\u00f6nhage\u2013Strassen & Nussbaumer"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89915-8_10"},{"article-title":"Can you save time in multiplying polynomials by encoding them as integers?","year":"2010","author":"Fateman","key":"ref10"},{"key":"ref11","volume-title":"The Art of Computer Programming","volume":"2","author":"Knuth","year":"1981"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9938-4"},{"volume-title":"SABER: Mod-LWR Based KEM(Round 3 Submission), NIST PQC Round 3 Submission","year":"2020","key":"ref13"},{"volume-title":"CRYSTALS-KYBER","year":"2019","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_8"},{"volume-title":"CRYSTALS-Dilithium\u2014Submission to Round 3 of the NIST Post-Quantum Project. Specification Document (Part of the Submission Package)","year":"2020","key":"ref16"},{"volume-title":"Contactless Specifications for Payment System, Book C-2 Kernel 2 Specification, Version 2.6","key":"ref17"},{"volume-title":"Samsung SSP01 of S5E9830 With Specific IC Dedicated Software Revision 1.1","year":"2018","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_24"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1985-0777282-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335"},{"volume-title":"Multidigit Multiplication for Mathematicians","year":"1997","author":"Bernstein","key":"ref22"},{"volume-title":"NXP, Secure Microcontroller SmartMX P71D321","key":"ref23"},{"volume-title":"SLE 78CAFX1M1SPHM","key":"ref24"},{"volume-title":"ESP32 Technical Reference Manual","year":"2021","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1515\/9783112342404-001"},{"volume-title":"Recommendation for Key Management","year":"2020","key":"ref27"},{"volume-title":"M\u00e9canismes Cryptographiques\u2014R\u00e8gles et Recommandations","year":"2014","key":"ref28"},{"volume-title":"Cryptographic Mechanisms: Recommendations and Key Lengths","year":"2020","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1980.1163372"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1965-0178586-1"},{"volume-title":"SHA-3 Standardization","year":"2015","key":"ref32"},{"volume-title":"AVX-512 Instructions","year":"2013","key":"ref33"},{"volume-title":"A First Course in Abstract Algebra","year":"2003","author":"Fraleigh","key":"ref34"},{"volume-title":"Exynos2100: Exynos on Official Reply","year":"2021","key":"ref35"},{"volume-title":"Galaxy S21 5G, S21 + 5G","key":"ref36"},{"key":"ref37","first-page":"5","volume-title":"An Introduction to Microcomputers: Basic Concepts","volume":"1","author":"Adam","year":"1982"},{"volume-title":"Blocking the SBP-2 Driver to Reduce 1394 DMA Threats to BitLocker","year":"2011","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS45731.2020.9180550"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2018.8310174"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2019.2915203"},{"volume-title":"Supersingular isogeny key encapsulation","year":"2019","author":"Azarderakhsh","key":"ref42"},{"volume-title":"FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications and Supporting Documentation","year":"2020","key":"ref43"},{"volume-title":"Post-Quantum Cryptography Proposal: ThreeBears","year":"2017","key":"ref44"},{"volume-title":"PHINCS + Submission to the NIST Post-Quantum Project","year":"2020","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.197"},{"volume-title":"Announcing Approval of FIPS Publication 180-2, Federal Register Notice 02-21599","year":"2008","key":"ref47"},{"key":"ref48","article-title":"Fast multiplication and its applications","volume":"44","author":"Bernstein","year":"2008","journal-title":"Algorithmic Number Theory"},{"volume-title":"A Submission to the NIST, Post-Quantum Standardization Effort, NIST, Round 3 Candidate","key":"ref49"},{"volume-title":"Fast-Fourier Lattice-Based Compact Signatires Over NTRU, NIST Round 3 Candidate","year":"2020","key":"ref50"},{"volume-title":"Classic McEliece, NIST Round 3 Candidate","year":"2020","key":"ref51"},{"key":"ref52","first-page":"1","article-title":"Zalcon: An alternative FPA-free NTRU sampler for Falcon","volume-title":"Proc. 3rd NIST PQC Workshop","author":"Fouque"},{"volume-title":"One of the Three NIST Post-Quantum Signature Finalists","year":"2020","key":"ref53"},{"volume-title":"Blending DSP and ML features into a low-power general-purpose processor\u2014How far can we go?","year":"2020","author":"Yiu","key":"ref54"},{"volume-title":"Optimizing performance with Intel advanced vector extensions","year":"2014","author":"Lento","key":"ref55"},{"volume-title":"CAVP Samsung Smart Secure Platform","year":"2020","key":"ref56"},{"volume-title":"Smart Secure Platform (SSP); Part 1: General Characteristics (Release 15)","year":"2019","key":"ref57"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.2018-0445"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-11607-9_1"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.127-151"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09663274.pdf?arnumber=9663274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:38:36Z","timestamp":1704847116000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9663274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3138807","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2022]]}}}