{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:16:48Z","timestamp":1775384208649,"version":"3.50.1"},"reference-count":144,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100015689","name":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100015689","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015689","name":"2023 Bank Central Asia (BCA) Innovation Awards arranged by the Lembaga Pengembangan Inovasi dan Kewirausahaan (LPIK)-Institut Teknologi Bandung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100015689","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3294446","type":"journal-article","created":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T17:26:31Z","timestamp":1689096391000},"page":"70288-70316","source":"Crossref","is-referenced-by-count":50,"title":["Conceptual Review on Number Theoretic Transform and Comprehensive Review on Its Implementations"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5400-0995","authenticated-orcid":false,"given":"Ardianto","family":"Satriawan","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia"}]},{"given":"Infall","family":"Syafalni","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia"}]},{"given":"Rella","family":"Mareta","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering, Inha University, Incheon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5134-7264","authenticated-orcid":false,"given":"Isa","family":"Anshori","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia"}]},{"given":"Wervyan","family":"Shalannanda","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia"}]},{"given":"Aleams","family":"Barra","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics and Natural Sciences, Institut Teknologi Bandung, Bandung, Indonesia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49301-4_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3292548"},{"issue":"131","key":"ref5","first-page":"164","article-title":"NIST post-quantum cryptography standardization","volume":"800","author":"Chen","year":"2017","journal-title":"Transition"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8240"},{"key":"ref7","volume-title":"Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process","volume":"2","author":"Alagic","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8413-upd1"},{"key":"ref9","volume-title":"Selected Algorithms 2022","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"ref11","article-title":"CRYSTALS-Dilithium","author":"Lyubashevsky","year":"2020","journal-title":"Algorithm Specifications Supporting Documentation"},{"issue":"5","key":"ref12","article-title":"FALCON: Fast-Fourier lattice-based compact signatures over NTRU","volume":"36","author":"Fouque","year":"2018","journal-title":"Submission to NIST\u2019s Post-Quantum Cryptography Standardization Process"},{"issue":"4","key":"ref13","first-page":"1","article-title":"CRYSTALS\u2013Kyber algorithm specifications and supporting documentation (version 1.0)","volume":"2","author":"Avanzi","year":"2017","journal-title":"NIST Post-Quantum Cryptogr. Standardization Process"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref15","article-title":"CRYSTALS\u2013Kyber algorithm specifications and supporting documentation (version 2.0)","author":"Avanzi","journal-title":"NIST Post-Quantum Cryptogr. Standardization Process"},{"key":"ref16","article-title":"CRYSTALS\u2013Kyber algorithm specifications and supporting documentation (version 3.0)","author":"Avanzi","journal-title":"NIST Post-Quantum Cryptogr. Standardization Process"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2015.7393307"},{"issue":"2","key":"ref18","first-page":"293","article-title":"Multiplication of many-digital numbers by automatic computers","volume":"145","author":"Karatsuba","year":"1962","journal-title":"Doklady Akademii Nauk SSSR"},{"key":"ref19","article-title":"Generalizations of the Karatsuba algorithm for efficient implementations","author":"Weimerskirch","journal-title":"Cryptol. ePrint Arch."},{"issue":"4","key":"ref20","first-page":"714","article-title":"The complexity of a scheme of functional elements realizing the multiplication of integers","volume":"3","author":"Toom","year":"1963","journal-title":"Soviet Math. Doklady"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1969-0249212-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1201\/CHCOMPUTMTH"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/2003354"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/258726.258836"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73074-3_10"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9791"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1980.1163372"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/2004932"},{"key":"ref30","volume-title":"Theoria Interpolationis Methodo Nova Tractata Werke Band 3, 265\u2013327","author":"Gauss","year":"1886"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4007\/annals.2021.193.2.4"},{"key":"ref32","volume-title":"Fast Fourier Transform","author":"Weisstein","year":"2015"},{"key":"ref33","article-title":"Number theoretic transform and its applications in lattice-based cryptosystems: A survey","author":"Liang","year":"2022","journal-title":"arXiv:2211.13546"},{"key":"ref34","article-title":"Implementation of an RNS based sequential NTT convolver","author":"Modak","year":"1982"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/82.329736"},{"key":"ref36","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","journal-title":"Cryptol. ePrint Arch."},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref40","article-title":"Simple encrypted arithmetic library-seal (V2. 0)","author":"Laine","year":"2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-81897-4_2"},{"key":"ref43","volume-title":"Convolution and Polynomial Multiplication in MATLAB","year":"2023"},{"key":"ref44","volume-title":"Numpy Convolution","year":"2023"},{"key":"ref45","volume-title":"Modulo-n Circular Convolution in MATLAB","year":"2023"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3143804"},{"key":"ref47","volume-title":"Sympy 1.11 Documentation","year":"2023"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/BF02242355"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/82.281844"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1972.223497"},{"key":"ref51","first-page":"463","article-title":"Fourier transforms and the fast Fourier transform (FFT) algorithm","volume":"2","author":"Heckbert","year":"1995","journal-title":"Comput. Graph."},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1994.389992"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_24"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICSICT.2012.6467863"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_4"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1985-0777282-x"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/40.502403"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/app12115305"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09234-3_42"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9474139"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3219555"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5226390"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530656"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3179459"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.94-126"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i2.49-72"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3569456"},{"key":"ref68","first-page":"496","article-title":"Lightweight hardware accelerator for post-quantum digital signature CRYSTALS-Dilithium","volume":"2022","author":"Gupta","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564629"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.270-295"},{"key":"ref71","first-page":"766","article-title":"A new approach to pipeline FFT processor","volume-title":"Proc. Int. Conf. Parallel Process.","author":"He"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/82.539000"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97348-3_12"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3447812"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT47387.2019.00070"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_8"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT52863.2021.9609917"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON53757.2021.9666622"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465756"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.221-244"},{"key":"ref81","article-title":"Where star wars meets star trek: Saber and Dilithium on the same polynomial multiplier","author":"Basso","journal-title":"Cryptol. ePrint Arch."},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i1.1-24"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3222954"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.93"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3162593"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ISOCC56007.2022.10031533"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17143-7_25"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-022-06928-w"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90022-9_23"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.5753\/sbseg.2022.224450"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.614-636"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2021.3073475"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3184703"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2022.3230359"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3144101"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88238-9_6"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i2.328-356"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3126208"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3103184"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS53394.2021.00069"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81293-5_13"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2020.12.005"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_33"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH51176.2021.00028"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2021.3106639"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/CISCE52179.2021.9445987"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401253"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401170"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1587\/elex.17.20200234"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC47756.2020.9045459"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23696-0_11"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3169784"},{"key":"ref113","article-title":"High throughput lattice-based signatures on GPUs: Comparing Falcon and Mitaka","author":"Lee","journal-title":"Cryptol. ePrint Arch."},{"key":"ref114","volume-title":"Australian Research Data Commons Nectar Research Cloud System","year":"2023"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3579092"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2654506"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/FPL50879.2020.00016"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3505584"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref122","article-title":"Design and implementation of helib: A homomorphic encryption library","author":"Halevi","journal-title":"Cryptol. ePrint Arch."},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"ref124","first-page":"64","article-title":"Lattigo: A multiparty homomorphic encryption library in go","volume-title":"Proc. 8th Workshop Encrypted Comput. Appl. Homomorphic Cryptogr.","author":"Mouchet"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3228628"},{"key":"ref126","article-title":"Encrypted cloud using GPUs","author":"Zheng","year":"2020"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2574340"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865755"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7041001"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3265583"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03980-5"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3166355"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2345388"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3017930"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3225208"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2691727"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2677426"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3166550"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3163970"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2902799"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2498606"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66626-2_7"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75539-3_19"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10177902.pdf?arnumber=10177902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T03:41:37Z","timestamp":1710387697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10177902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":144,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3294446","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}