{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:15:14Z","timestamp":1766067314229,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,7]]},"DOI":"10.1109\/isqed51717.2021.9424273","type":"proceedings-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T00:09:51Z","timestamp":1620691791000},"page":"401-407","source":"Crossref","is-referenced-by-count":8,"title":["Exploring the RISC-V Vector Extension for the Classic McEliece Post-Quantum Cryptosystem"],"prefix":"10.1109","author":[{"given":"S.","family":"Pircher","sequence":"first","affiliation":[]},{"given":"J.","family":"Geier","sequence":"additional","affiliation":[]},{"given":"A.","family":"Zeh","sequence":"additional","affiliation":[]},{"given":"D.","family":"Mueller-Gritschneder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"369","article-title":"Analysis of Error-Correcting Codes for Lattice-Based Key Exchange","author":"fritzmann","year":"2018","journal-title":"Selected Areas in Cryptography (SAC)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2013.6670327"},{"key":"ref12","article-title":"ANDES plots RISC-V Vector Heading","author":"demler","year":"2020","journal-title":"Microprocessor Report"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2950087"},{"journal-title":"eBACS ECRYPT Benchmarking of Cryptographic Systems","year":"2020","author":"bernstein","key":"ref15"},{"journal-title":"Classic McEliece NIST submission","year":"2019","author":"bernstein","key":"ref16"},{"key":"ref17","first-page":"159","article-title":"Knapsack-type Cryptosystems and Algebraic Coding Theory","volume":"15","author":"niederreiter","year":"1986","journal-title":"PROBLEMS CONTROL INFORM THEORY"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_15"},{"key":"ref19","first-page":"24","article-title":"A New Class of Linear Error Correcting Codes","volume":"6","author":"goppa","year":"1970","journal-title":"Problemy Peredachi Informatsii"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3130265.3138858"},{"journal-title":"Vector Extension RVV0 9","year":"2020","key":"ref3"},{"key":"ref6","first-page":"15","article-title":"Classic McEliece Implementation with Low Memory Footprint","author":"roth","year":"2020","journal-title":"Smart Card Research and Advanced Applications (CARDIS)"},{"key":"ref5","first-page":"114","article-title":"A Public-Key Cryptosystem Based On Algebraic Coding Theory","volume":"44","author":"mceliece","year":"1978","journal-title":"Deep Space Network Progress Report"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49445-6_19"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-79063-3_4"},{"journal-title":"Post-Quantum Cryptography","year":"2020","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref9","article-title":"Ring-LWE Ciphertext Compression and Error Correction","author":"saarinen","year":"2016","journal-title":"Cryptology ePrint Archive Report 2016\/1058"},{"journal-title":"DBT-RISE-RISCV","year":"2020","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2926114"},{"journal-title":"Berkeley SoftFloat","year":"2018","author":"hauser","key":"ref21"},{"journal-title":"Open Source Repository of the Chair of Electronic Design Automation TU Munich","year":"2021","key":"ref23"}],"event":{"name":"2021 22nd International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2021,4,7]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2021,4,9]]}},"container-title":["2021 22nd International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424228\/9424248\/09424273.pdf?arnumber=9424273","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:41:23Z","timestamp":1652197283000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9424273\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/isqed51717.2021.9424273","relation":{},"subject":[],"published":{"date-parts":[[2021,4,7]]}}}