{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:45:43Z","timestamp":1775745943598,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"China National Key R&amp;D Program","award":["2022YFB4400704"],"award-info":[{"award-number":["2022YFB4400704"]}]},{"name":"Hong Kong Innovation and Technology Commission","award":["ITS\/098\/22"],"award-info":[{"award-number":["ITS\/098\/22"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tc.2025.3540647","type":"journal-article","created":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T13:23:13Z","timestamp":1739280193000},"page":"1649-1662","source":"Crossref","is-referenced-by-count":6,"title":["PQNTRU: Acceleration of NTRU-Based Schemes via Customized Post-Quantum Processor"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3623-3554","authenticated-orcid":false,"given":"Zewen","family":"Ye","sequence":"first","affiliation":[{"name":"College of Information Science &#x0026; Electronic Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5103-7028","authenticated-orcid":false,"given":"Junhao","family":"Huang","sequence":"additional","affiliation":[{"name":"BNU-HKBU United International College, Zhuhai, China"}]},{"given":"Tianshun","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Information Science &#x0026; Electronic Engineering, Zhejiang University, Hangzhou, China"}]},{"given":"Yudan","family":"Bai","sequence":"additional","affiliation":[{"name":"College of Information Science &#x0026; Electronic Engineering, Zhejiang University, Hangzhou, China"}]},{"given":"Jinze","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science &#x0026; Electronic Engineering, Zhejiang University, Hangzhou, China"}]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Science &#x0026; Electronic Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8399-9467","authenticated-orcid":false,"given":"Guangyan","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5357-7442","authenticated-orcid":false,"given":"Donglong","family":"Chen","sequence":"additional","affiliation":[{"name":"BNU-HKBU United International College, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6764-0729","authenticated-orcid":false,"given":"Ray C. C.","family":"Cheung","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, City University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3722-9979","authenticated-orcid":false,"given":"Kejie","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Information Science &#x0026; Electronic Engineering, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"4","key":"ref2","first-page":"1","article-title":"CRYSTALS-Kyber algorithm specifications and supporting documentation","volume":"2","author":"Avanzi","year":"2019","journal-title":"NIST PQC Round"},{"key":"ref3","article-title":"Crystals-dilithium: Algorithm specifications and supporting documentation (version 3.1)","volume":"3","author":"Lyubashevsky","year":"2021"},{"issue":"5","key":"ref4","first-page":"1","article-title":"FALCON: Fast-Fourier lattice-based compact signatures over NTRU","volume":"36","author":"Fouque","year":"2018","journal-title":"NIST\u2019s Post-Quantum Cryptography Standardization Process"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363229"},{"key":"ref6","article-title":"Call for additional digital signature schemes for the post-quantum cryptography standardization process","year":"2022"},{"key":"ref7","article-title":"PQC meets ML or AI: Exploring the synergy of machine learning and post-quantum cryptography","volume-title":"Authorea Preprints","author":"Darzi","year":"2024"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2417"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"ref11","article-title":"Hawk: A signature scheme inspired by the lattice isomorphism problem.","author":"Bos","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3169784"},{"key":"ref13","first-page":"1","article-title":"PQM4: Benchmarking NIST additional post-quantum signature schemes on microcontrollers","volume-title":"Cryptol. ePrint Arch.","author":"Kannwischer","year":"2024"},{"key":"ref14","first-page":"405","article-title":"Benchmarking and analysing the NIST PQC finalist lattice-based signature schemes on the ARM Cortex M7","volume":"2022","author":"Howe","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref15","first-page":"1","article-title":"New efficient, constant-time implementations of Falcon","volume-title":"Cryptol. ePrint Arch.","author":"Pornin","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2023.3305156"},{"key":"ref17","first-page":"31","volume-title":"FALCON","author":"Soni","year":"2021"},{"key":"ref18","first-page":"1","article-title":"Falcon takes off\u2014A hardware implementation of the Falcon signature scheme","volume-title":"Cryptol. ePrint Arch.","author":"Schmid","year":"2023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3579092"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2019.00045"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3205552"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3184703"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2958334"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3017930"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT47387.2019.00070"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3675172"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72565-9_12"},{"key":"ref31","article-title":"Making NTRUEnrypt and NTRUSign as secure as standard worst-case problems over ideal lattices","author":"Stehle","year":"2013"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17259-6_17"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2350431"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2024.i2.130-153"},{"key":"ref35","first-page":"1","article-title":"Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography","volume-title":"Cryptol. ePrint Arch.","author":"Seiler","year":"2018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2021.3073475"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.614-636"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3371369"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/2003354"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-49445-6_19","article-title":"NewHope on ARM Cortex-M","author":"Alkim","year":"2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i4.239-280"},{"key":"ref42","first-page":"169","article-title":"The complexity of computations","volume-title":"Proc. Steklov Inst. Math.-Interperiodica Transl.","volume":"211","author":"Karatsuba","year":"1995"},{"key":"ref43","article-title":"ARM Cortex-M4 Datasheet","year":"2020"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2017.02.002"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3603170"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/12\/10957749\/10880097.pdf?arnumber=10880097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T23:10:27Z","timestamp":1762384227000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10880097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":47,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tc.2025.3540647","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}