{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:15:29Z","timestamp":1765228529015,"version":"3.46.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"King Abdulaziz University (KAU) Endowment (WAQF) at King Abdulaziz University, Jeddah, Saudi Arabia"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3638925","type":"journal-article","created":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T18:25:25Z","timestamp":1764613525000},"page":"203620-203632","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight FPGA-Based Number-Theoretic Transform for ML-KEM in Post-Quantum Cryptography"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4394-7499","authenticated-orcid":false,"given":"Mohammed O.","family":"Alshomrany","sequence":"first","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"given":"Muhammad","family":"Al-Hashimi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0396-1347","authenticated-orcid":false,"given":"Fawaz","family":"Alsolami","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1140-6973","authenticated-orcid":false,"given":"Mostafa","family":"Saleh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3431-6890","authenticated-orcid":false,"given":"Osama","family":"Abulnaja","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5571-2150","authenticated-orcid":false,"given":"Turki F.","family":"Al-Somani","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Umm Al-Qura University, Mecca, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4757-9822","authenticated-orcid":false,"given":"Abdullah","family":"Altuwaijri","sequence":"additional","affiliation":[{"name":"National Company of Telecommunications and Information Security (NTIS), Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/tcsi.2024.3443238"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-49244-5","volume-title":"Introduction To Cryptography: Principles and Applications","author":"Delfs","year":"2007"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-0-387-39940-9"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/infcomw.2018.8406957"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2674005.2674991"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.3390\/cryptography8020021"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/sfcs.1994.365700"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-540-88702-7_1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1080\/23742917.2016.1226650"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.6028\/nist.fips.203"},{"year":"2012","author":"Houssain","article-title":"Elliptic curve cryptography algorithms resistant against power analysis attacks on resource-constrained devices","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1587\/elex.13.20160044"},{"year":"1980","author":"Thompson","article-title":"A complexity theory for VLSI","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/esem.2015.7321198"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3136014.3136031"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/s10623-014-9938-4"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/s00145-011-9114-1"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-319-70500-2_12"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.3390\/info15070400"},{"key":"ref20","first-page":"65","article-title":"19th international symposium on design and optimization (ISOCC)","volume-title":"Proc. 19th Int. Symp. Design Optim. (ISOCC)","author":"Das"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/tcsii.2022.3188943"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/asianhost56390.2022.10022178"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/tc.2023.3238129"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/jssc.2023.3253425"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/tvlsi.2023.3277865"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1090\/s0025-5718-1971-0301966-0"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/tcsi.2021.3106639"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/access.2024.3425813"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/icecs61496.2024.10849189"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/iscas58744.2024.10558234"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.46586\/tches.v2021.i2.328-356"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/dsd57027.2022.00076"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.23919\/date51398.2021.9474139"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/tcsii.2024.3465273"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/tvlsi.2024.3465010"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/fpl64840.2024.00032"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/arith51176.2021.00028"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.3390\/cryptography7040046"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/iscas46773.2023.10181340"},{"volume-title":"7 Series FPGAs Data Sheet: Overview","year":"2024","key":"ref40"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11271524.pdf?arnumber=11271524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T18:41:52Z","timestamp":1765219312000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11271524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3638925","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}