{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T08:27:48Z","timestamp":1774772868746,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2022YFB2701601"],"award-info":[{"award-number":["2022YFB2701601"]}]},{"name":"Shanghai Collaborative Innovation Fund","award":["XTCX-KJ-2023-54"],"award-info":[{"award-number":["XTCX-KJ-2023-54"]}]},{"name":"Special Fund for Key Technologies in Blockchain of Shanghai Scientific and Technological Committee","award":["23511100300"],"award-info":[{"award-number":["23511100300"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tdsc.2025.3575915","type":"journal-article","created":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T14:04:59Z","timestamp":1748873099000},"page":"5730-5743","source":"Crossref","is-referenced-by-count":1,"title":["Optimized Vectorization Implementation of CRYSTALS-Dilithium"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-8228","authenticated-orcid":false,"given":"Jieyu","family":"Zheng","sequence":"first","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0297-2898","authenticated-orcid":false,"given":"Haoliang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9418-3483","authenticated-orcid":false,"given":"Zhenyu","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0462-9291","authenticated-orcid":false,"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2623-9170","authenticated-orcid":false,"given":"Yunlei","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Information technology-open systems interconnection-the directory: Public-key and attribute certificate framework","year":"2000"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8114"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8413"},{"key":"ref8","article-title":"Module-lattice-Based digital signature standard","year":"2023","journal-title":"Federal Inf. Process. Standards Publication"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9938-4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"ref12","first-page":"1","article-title":"Introduction to Intel advanced vector extensions","volume":"23","author":"Lomont","year":"2011","journal-title":"Intel White Paper"},{"key":"ref13","article-title":"10th generation Intel core processor based on ice lake microarchitecture instruction throughput and latency","year":"2020"},{"key":"ref14","article-title":"Submission to the NIST post-quantum cryptography standardization project","author":"Avanzi","year":"2022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42068-0_4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i1.1-24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5226390"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.221-244"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09234-3_42"},{"key":"ref20","article-title":"Fast quantum-safe cryptography on IBM Z","author":"Bradbury","year":"2021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3564629"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i2.41-68"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.618-649"},{"key":"ref24","article-title":"Optimizing the NIST post quantum candidate SPHINCS using AVX-512","author":"Alter","year":"2021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.5753\/sbseg.2018.4266"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3609223"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-70890-9_7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_24"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47560-8_12"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5753\/sbseg.2018.4269"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/hpcc\/smartcity\/dss.2018.00059"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14788-3_18"},{"key":"ref33","article-title":"Faster multiplication over f_mbox2[x] using AVX512 instruction set and VPCLMULQDQ instruction","author":"Robert","year":"2022"},{"key":"ref34","article-title":"SHA-3 standard: Permutation-based hash and extendable-output functions","author":"Dworkin","year":"2015","journal-title":"Federal Inf. Process. Standards Publication"},{"key":"ref35","first-page":"39","article-title":"Faster AVX2 optimized NTT multiplication for ring-LWE lattice cryptography","volume-title":"IACR Cryptol. ePrint Arch.","volume":"2018","author":"Seiler","year":"2018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2307\/2003354"},{"key":"ref37","article-title":"Intel intrinsics guide","year":"2024"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11150357\/11021393.pdf?arnumber=11021393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:53:15Z","timestamp":1757011995000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11021393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":37,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3575915","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}