{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:59:09Z","timestamp":1776113949712,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Quantum resistant communications (QUARC) Project of European Union (EU) Horizon Europe Research and Innovation Program within the Framework of Marie Sk\u0142odowska-Curie Actions","award":["101073355"],"award-info":[{"award-number":["101073355"]}]},{"name":"Dutch Ministry of Economic Affairs and Climate Policy (EZK) as part of the Quantum Delta Netherlands (NL) National Growthfunds for Quantum Technology"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3681219","type":"journal-article","created":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T19:57:43Z","timestamp":1775505463000},"page":"53831-53845","source":"Crossref","is-referenced-by-count":0,"title":["Offloading Post-Quantum Cryptography to Data Processing Units: A Performance Analysis of HQC Key Encapsulation"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9209-5346","authenticated-orcid":false,"given":"Joseph","family":"Meyer","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology (TU\/e), Eindhoven, The Netherlands"}]},{"given":"Elad","family":"Mentovich","sequence":"additional","affiliation":[{"name":"NVIDIA Corporation, Yokne&#x2019;am Illit, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2935-7682","authenticated-orcid":false,"given":"Idelfonso","family":"Tafur Monroy","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology (TU\/e), Eindhoven, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6796-1602","authenticated-orcid":false,"given":"Juan","family":"Jose Vegas Olmos","sequence":"additional","affiliation":[{"name":"NVIDIA Corporation, Yokne&#x2019;am Illit, Israel"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.203"},{"key":"ref2","article-title":"HQC: Hamming quasi-cyclic\u2014Algorithm specifications and supporting documentation","author":"Melchor","year":"2023"},{"key":"ref3","first-page":"1","article-title":"First line-rate end-to-end post-quantum encrypted optical fiber link using data processing units (DPUS)","volume-title":"Proc. Opt. Fiber Commun. Conf. (OFC)","author":"Aguilera"},{"key":"ref4","first-page":"2","article-title":"First demonstration of 200 Gbps regime line-rate quantum-secure macsec optical links using commodity hardware offloads","volume-title":"Proc. Opt. Fiber Commun. Conf. (OFC)","author":"Aguilera"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_2"},{"key":"ref6","author":"Bernstein","year":"2026","journal-title":"EBACS: Ecrypt Benchmarking of Cryptographic Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44223-1_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography9020032"},{"key":"ref9","volume-title":"HQC: Hamming Quasi-Cyclic Key Encapsulation Mechanism","year":"2024"},{"key":"ref10","article-title":"OptHQC: Optimize HQC for high-performance post-quantum cryptography","author":"Dong","year":"2025","journal-title":"arXiv:2512.12904"},{"key":"ref11","author":"Carter","year":"2025","journal-title":"PQC Benchmark 2025: Kyber vs Bike vs HQC OnlineHashCrack"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD57390.2023.10323839"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HOST55342.2024.10545409"},{"key":"ref14","article-title":"A systematic study of lattice-based NIST PQC algorithms: From reference implementations to hardware accelerators","author":"Imran","year":"2020","journal-title":"arXiv:2009.07091"},{"key":"ref15","volume-title":"Link-Security Software for TLS Offload","year":"2024"},{"key":"ref16","volume-title":"DPU Offloading: Performance and Efficiency","year":"2023"},{"key":"ref17","volume-title":"Offloading and Isolating Data Center Workloads With BlueField DPU","year":"2022"},{"key":"ref18","article-title":"Plug & offload: Transparently offloading TCP stack onto off-path smartnic with PnO-TCP","author":"Nan","journal-title":"arXiv:2503.22930"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14214234"},{"key":"ref20","volume-title":"Accelerating quantum-secure communications via DPU-based network offloads","author":"Aguilera","year":"2026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24203"},{"key":"ref22","article-title":"Hybrid key exchange in TLS 1.3","author":"Stebila","year":"2020"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423350"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761723"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.30837\/rt.2022.3.210.05"},{"key":"ref27","volume-title":"FIPS 204: Module-Lattice-Based Digital Signature Standard, Federal Information Processing Standards Publication","year":"2024"},{"key":"ref28","volume-title":"FIPS 205: Stateless Hash-Based Digital Signature Standard, Federal Information Processing Standards Publication","year":"2024"},{"key":"ref29","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","volume":"44","author":"McEliece","year":"1978"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"ref31","volume-title":"BlueField-3 DPU Datasheet","year":"2023"},{"key":"ref32","first-page":"51","article-title":"Azure accelerated networking: SmartNICs in the public cloud","volume-title":"Proc. USENIX Symp. Networked Syst. Design Implement. (NSDI)","author":"Firestone"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405895"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342079"},{"key":"ref35","volume-title":"Transition to Post-quantum Cryptography Standards","author":"Moody","year":"2024"},{"key":"ref36","article-title":"Optimized implementation of ML-KEM on ARMv9-A with SVE2 and SME","author":"Wei"},{"key":"ref37","article-title":"Vectorized SVE2 optimization of the post-quantum signature ML-DSA on ARMv9-A architecture","author":"Wei"},{"key":"ref38","article-title":"Scientific colour maps","author":"Crameri","year":"2018"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-19160-7"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11475462.pdf?arnumber=11475462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:38:01Z","timestamp":1776109081000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11475462\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3681219","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}