{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:32:00Z","timestamp":1762918320923,"version":"3.37.3"},"reference-count":6,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,6]],"date-time":"2022-02-06T00:00:00Z","timestamp":1644105600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,6]],"date-time":"2022-02-06T00:00:00Z","timestamp":1644105600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute of Information & communications Technology Planning & Evaluation (IITP)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,6]]},"DOI":"10.1109\/iceic54506.2022.9748834","type":"proceedings-article","created":{"date-parts":[[2022,4,11]],"date-time":"2022-04-11T21:19:21Z","timestamp":1649711961000},"page":"1-2","source":"Crossref","is-referenced-by-count":7,"title":["Post-Quantum Cryptography Coprocessor for RISC-V CPU Core"],"prefix":"10.1109","author":[{"given":"Jihye","family":"Lee","sequence":"first","affiliation":[{"name":"Ewha Womans University,Dept. of Electronic and Electrical Engineering,Seoul,Republic of Korea"}]},{"given":"Whijin","family":"Kim","sequence":"additional","affiliation":[{"name":"Ewha Womans University,Dept. of Electronic and Electrical Engineering,Seoul,Republic of Korea"}]},{"given":"Sohyeon","family":"Kim","sequence":"additional","affiliation":[{"name":"Ewha Womans University,Dept. of Electronic and Electrical Engineering,Seoul,Republic of Korea"}]},{"given":"Ji-Hoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Ewha Womans University,Dept. of Electronic and Electrical Engineering,Seoul,Republic of Korea"}]}],"member":"263","reference":[{"journal-title":"RISC-V Cryptographic Extensions Volume I Scalar & Entropy Source Instructions","year":"2021","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21236\/ADA605735"},{"key":"ref6","article-title":"Status report on the second round of the NIST post-quantum cryptography standardization process","author":"gorjan","year":"2020","journal-title":"US Department of Commerce NIST SP"},{"journal-title":"RISC-V Bit-Manipulation ISA-extensions","year":"2021","key":"ref5"},{"journal-title":"CORE-V Extension Interface","year":"2021","author":"group","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"}],"event":{"name":"2022 International Conference on Electronics, Information, and Communication (ICEIC)","start":{"date-parts":[[2022,2,6]]},"location":"Jeju, Korea, Republic of","end":{"date-parts":[[2022,2,9]]}},"container-title":["2022 International Conference on Electronics, Information, and Communication (ICEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9748174\/9748152\/09748834.pdf?arnumber=9748834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T20:43:55Z","timestamp":1655239435000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9748834\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,6]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/iceic54506.2022.9748834","relation":{},"subject":[],"published":{"date-parts":[[2022,2,6]]}}}