{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T20:39:54Z","timestamp":1777322394854,"version":"3.51.4"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council (NSTC), Taiwan","doi-asserted-by":"publisher","award":["NSTC 113-2119-M-002-022"],"award-info":[{"award-number":["NSTC 113-2119-M-002-022"]}],"id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Intelligent and Sustainable Medical Electronics Research Fund in National Taiwan University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Solid-State Circuits"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1109\/jssc.2025.3601376","type":"journal-article","created":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T17:53:44Z","timestamp":1756922024000},"page":"2431-2441","source":"Crossref","is-referenced-by-count":0,"title":["A 4.8-mW Hybrid Crypto SoC With Post-Quantum Cryptography and Lightweight Cryptography for Secure Neural Interfacing"],"prefix":"10.1109","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2636-4799","authenticated-orcid":false,"given":"Liang-Hsin","family":"Lin","sequence":"first","affiliation":[{"name":"Graduate Institute of Electronics Engineering, National Taiwan University, Taipei, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zih-Sing","family":"Fu","sequence":"additional","affiliation":[{"name":"Graduate Institute of Electronics Engineering, National Taiwan University, Taipei, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5450-5159","authenticated-orcid":false,"given":"Po-Shao","family":"Chen","sequence":"additional","affiliation":[{"name":"Graduate Institute of Electronics Engineering, National Taiwan University, Taipei, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bo-Yin","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Information Science, Academia Sinica, Taipei, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1163-321X","authenticated-orcid":false,"given":"Chia-Hsiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and the Graduate Institute of Electronics Engineering, National Taiwan University, Taipei, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2196\/16194"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ASSCC.2011.6123572"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CICC48029.2020.9075945"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref5","volume-title":"Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges","author":"Das","year":"2012"},{"key":"ref6","volume-title":"Post-Quantum Cryptography","year":"2025"},{"key":"ref7","volume-title":"Lightweight Cryptography","year":"2025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2019.8662528"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/isscc42614.2022.9731783"},{"key":"ref10","first-page":"230","article-title":"A 28 nm 69.4 kOPS 4.4 \u03bcJ\/Op versatile post-quantum crypto-processor across multiple mathematical problems","volume-title":"IEEE Int. Solid-State Circuits Conf. (ISSCC) Dig. Tech. Papers","author":"Zhu"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2018.8310174"},{"key":"ref12","volume-title":"Falcon","year":"2025"},{"key":"ref13","volume-title":"NTRU","year":"2025"},{"key":"ref14","volume-title":"ASCON","year":"2025"},{"key":"ref15","volume-title":"Module-Lattice-Based Digital Signature Standard","year":"2024"},{"key":"ref16","volume-title":"Stateless Hash-Based Digital Signature Standard","year":"2024"},{"key":"ref17","volume-title":"Module-Lattice-Based Key-Encapsulation Mechanism Standard","year":"2024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.202"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref21","volume-title":"Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process","year":"8413"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i2.159-188"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.94-126"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1985-0777282-x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3064232"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2697841"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i4.17-61"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.269-306"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3184703"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/cicc.2018.8357070"},{"key":"ref36","article-title":"Domain-specific accelerators for ideal lattice-based public key protocols","author":"Nejatollahi","year":"2018","journal-title":"Cryptol. ePrint Archive"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741027"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2022.3216758"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00597-4"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.23919\/vlsitechnologyandcir57934.2023.10185393"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1201\/9781439863961"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2005.51"}],"container-title":["IEEE Journal of Solid-State Circuits"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4\/11494345\/11148275.pdf?arnumber=11148275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T19:49:46Z","timestamp":1777319386000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11148275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":42,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/jssc.2025.3601376","relation":{},"ISSN":["0018-9200","1558-173X"],"issn-type":[{"value":"0018-9200","type":"print"},{"value":"1558-173X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,5]]}}}