{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:46:06Z","timestamp":1767339966743,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/reconfig.2016.7857188","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:20:29Z","timestamp":1487283629000},"page":"1-7","source":"Crossref","is-referenced-by-count":14,"title":["Solving large systems of linear equations over GF(2) on FPGAs"],"prefix":"10.1109","author":[{"given":"Wen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jakub","family":"Szefer","sequence":"additional","affiliation":[]},{"given":"Ruben","family":"Niederhagen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Initial recommendations of long-term secure post-quantum systems","author":"augot","year":"2015","journal-title":"PQCRYPTO - Horizon 2020 ICT-645620 Tech Rep"},{"key":"ref3","first-page":"159","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"niederreiter","year":"1986","journal-title":"Problems of Control and Information Theory"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.115"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/12.29471"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2010.86"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2010.09.001"},{"key":"ref2","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","volume":"44","author":"mceliece","year":"1978","journal-title":"JPL DSN Progress Report"},{"key":"ref9","article-title":"SMITH - a parallel hardware architecture for fast Gaussian elimination over GF(2)","author":"bogdanov","year":"2006","journal-title":"SHARCS - Special-purpose Hardware for Attacking Cryptographic Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/12.241603"}],"event":{"name":"2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","start":{"date-parts":[[2016,11,30]]},"location":"Cancun, Mexico","end":{"date-parts":[[2016,12,2]]}},"container-title":["2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7838017\/7856931\/07857188.pdf?arnumber=7857188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T22:32:18Z","timestamp":1488407538000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7857188\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2016.7857188","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}