{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:40:28Z","timestamp":1756273228440,"version":"3.44.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/csr64739.2025.11130090","type":"proceedings-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:04:27Z","timestamp":1756235067000},"page":"996-1001","source":"Crossref","is-referenced-by-count":0,"title":["Acceleration of McEliece Cryptosystem with Instruction Set Extension for RISC-V"],"prefix":"10.1109","author":[{"given":"Samuel","family":"Kennedy","sequence":"first","affiliation":[{"name":"University of Southampton,Electronics and Computer Science,Southampton,United Kingdom"}]},{"given":"Basel","family":"Halak","sequence":"additional","affiliation":[{"name":"University of Southampton,Electronics and Computer Science,Southampton,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISS55894.2022.9915232"},{"article-title":"Post-quantum cryptography-selected algorithms","year":"2002","author":"Jochemsz","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3432330"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref5","first-page":"114","article-title":"A public-key cryptosystem based on algebraic","volume":"4244","author":"McEliece","year":"1978","journal-title":"Coding Thv"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2478\/tmmp-2014-0025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD50377.2020.00029"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-79063-3_4"},{"article-title":"ARM architecture reference manual","year":"2001","author":"Seal","key":"ref10"},{"key":"ref11","first-page":"6","article-title":"Introduction to intel aes-ni and intel secure key instructions","volume":"62","author":"Hofemeier","year":"2012","journal-title":"Intel, White Paper"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i1.109-136"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3174587"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED51717.2021.9424273"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355364"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3416812"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055088"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055350"},{"article-title":"Classic mceliece","year":"2023","author":"McEliece","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VDAT63601.2024.10705665"},{"article-title":"Computer architecture: a quantitative approach","year":"2011","author":"Hennessy","key":"ref21"},{"article-title":"The risc-v instruction set manual","year":"2017","author":"Andrew Waterman","key":"ref22"},{"article-title":"Risc-v single cycle rv32i core","year":"2023","author":"Kindall","key":"ref23"}],"event":{"name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2025,8,4]]},"location":"Chania, Crete, Greece","end":{"date-parts":[[2025,8,6]]}},"container-title":["2025 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11129696\/11129957\/11130090.pdf?arnumber=11130090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T05:15:39Z","timestamp":1756271739000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11130090\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/csr64739.2025.11130090","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}