{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:55:40Z","timestamp":1769313340199,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1109\/tc.2020.3023045","type":"journal-article","created":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T20:25:53Z","timestamp":1599683153000},"page":"1705-1718","source":"Crossref","is-referenced-by-count":33,"title":["Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4"],"prefix":"10.1109","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0069-9061","authenticated-orcid":false,"given":"Hwajeong","family":"Seo","sequence":"first","affiliation":[]},{"given":"Mila","family":"Anastasova","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Jalali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6921-6868","authenticated-orcid":false,"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927267"},{"key":"ref32","article-title":"Use cases and requirements: Industrial use cases and requirements for the deployment of post-quantum cryptography","author":"noack","year":"0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_32"},{"key":"ref37","article-title":"Post-quantum cryptography standardization","year":"0"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.1-20"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31578-8_3"},{"key":"ref10","article-title":"A performance study of X25519 on Cortex-M3 and M4","author":"de groot","year":"2015"},{"key":"ref11","first-page":"19","article-title":"Towards side-channel protected X25519 on ARM Cortex-M4 processors","author":"de santis and","year":"2016","journal-title":"Proc Softw Perform Enhancement Encryption Decryption Benchmarking"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2771535"},{"key":"ref13","first-page":"36","article-title":"Curve25519 for the Cortex-M4 and beyond","volume":"35","author":"fujii","year":"2017","journal-title":"Progress Cryptol -LATINCRYPT"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_3"},{"key":"ref15","first-page":"176","article-title":"Side-channel analysis of cryptographic software via early-terminating multiplications","author":"gro\u00dfsch\u00e4dl","year":"2009","journal-title":"Proc Int Conf Inf Secur Cryptol"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i2.1-48"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70500-2_12"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0093-2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49890-4_11"},{"key":"ref4","first-page":"34","article-title":"Efficient microcontroller implementation of BIKE","author":"bischof","year":"2019","journal-title":"Proc Int Conf Inf Technol Commun Secur"},{"key":"ref27","article-title":"18 seconds to key exchange: Limitations of supersingular isogeny Diffie-Hellman on embedded devices","author":"koppermann","year":"2018"},{"key":"ref3","article-title":"Supersingular isogeny key encapsulation &#x2013; Submission to the NIST's post-quantum cryptography standardization process, round 2","author":"azarderakhsh","year":"0"},{"key":"ref6","article-title":"Faster modular arithmetic for isogeny based crypto on embedded devices","volume":"2018","author":"bos","year":"2018","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2851238"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_21"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1147\/sj.294.0526"},{"key":"ref2","article-title":"Supersingular isogeny key encapsulation &#x2013; Submission to the NIST's post-quantum cryptography standardization process","author":"azarderakhsh","year":"0"},{"key":"ref9","first-page":"2016","article-title":"SIDH library","author":"costello","year":"0"},{"key":"ref1","article-title":"Q1 2017 roadshow slides","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_30"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2723891"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05072-6_3"},{"key":"ref24","article-title":"PQM4: Post-quantum crypto library for the ARM Cortex-M4","author":"kannwischer","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5747642"},{"key":"ref25","article-title":"pqm4: Testing and benchmarking NIST PQC on ARM Cortex-M4","volume":"2019","author":"kannwischer","year":"0"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/9530592\/09190059.pdf?arnumber=9190059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T22:03:54Z","timestamp":1645481034000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9190059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,1]]},"references-count":37,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tc.2020.3023045","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,1]]}}}