{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T14:25:46Z","timestamp":1769955946963,"version":"3.49.0"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100013145","name":"Primary Research and Development Plan of Jiangsu Province","doi-asserted-by":"publisher","award":["BE2023025"],"award-info":[{"award-number":["BE2023025"]}],"id":[{"id":"10.13039\/501100013145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62572255"],"award-info":[{"award-number":["62572255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302238"],"award-info":[{"award-number":["62302238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372245"],"award-info":[{"award-number":["62372245"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20220388"],"award-info":[{"award-number":["BK20220388"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2025T180411"],"award-info":[{"award-number":["2025T180411"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Computer Federation (CCF)-Tencent Rhino-Bird Open Research Fund","award":["CCF-Tencent RAGR20240129"],"award-info":[{"award-number":["CCF-Tencent RAGR20240129"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3599681","type":"journal-article","created":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T19:41:53Z","timestamp":1755546113000},"page":"9441-9453","source":"Crossref","is-referenced-by-count":2,"title":["GOLF: Unleashing GPU-Driven Acceleration for FALCON Post-Quantum Cryptography"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9003-6077","authenticated-orcid":false,"given":"Ruihao","family":"Dai","sequence":"first","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1693-3000","authenticated-orcid":false,"given":"Jiankuo","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Mingrui","family":"Qiu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1213-8686","authenticated-orcid":false,"given":"Zhenjiang","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1815-2793","authenticated-orcid":false,"given":"Fu","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1508-4879","authenticated-orcid":false,"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Science and Technology of China, Hefei, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3599681"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography7030040"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3254481"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC43674.2020.9286147"},{"key":"ref6","article-title":"A survey on NIST PQ signatures","author":"Di Chiano","year":"2021","journal-title":"arXiv:2107.11082"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"issue":"5","key":"ref8","first-page":"1","article-title":"Falcon: Fast-Fourier lattice-based compact signatures over ntru","volume":"36","author":"Fouque","year":"2018","journal-title":"NISTs Post-Quantum Cryptogr. Standardization Process"},{"key":"ref9","volume-title":"BIKE: Bit Flipping Key Encapsulation","author":"Aragon","year":"2017"},{"issue":"4","key":"ref10","first-page":"13","article-title":"Hamming quasi-cyclic (HQC)","volume":"2","author":"Melchor","year":"2018","journal-title":"NIST PQC Round"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363229"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8413"},{"key":"ref14","volume-title":"Status Report on the Third Round of the Nist Post-quantum Cryptography Standardization Process","author":"Alagic","year":"2022"},{"key":"ref15","volume-title":"Post-quantum Cryptography: Selected Algorithms 2022"},{"key":"ref16","volume-title":"Nist Releases First 3 Finalized Post-quantum Encryption Standards","year":"2024"},{"issue":"11","key":"ref17","first-page":"13","article-title":"New efficient cryptographic techniques for cloud computing security","volume":"21","author":"Kaleem","year":"2024","journal-title":"Migration Lett."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s23218744"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25510-7_4"},{"key":"ref20","article-title":"New efficient, constant-time implementations of falcon","volume":"2019","author":"Pornin","year":"2019","journal-title":"Cryptol. ePrint Archive"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT52863.2021.9609917"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3169784"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5226390"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-37679-5_18"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22170-5_3"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3379734"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3453289"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3367319"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3098987"},{"key":"ref30","article-title":"Falcon takes off\u2014A hardware implementation of the falcon signature scheme","volume":"2023","author":"Schmid","year":"2023","journal-title":"Cryptol. ePrint Arch."},{"key":"ref31","article-title":"Grasp: Accelerating hash-based PQC performance on GPU parallel architecture","volume":"2024","author":"Ning","year":"2024","journal-title":"Cryptol. ePrint Arch."}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11129029.pdf?arnumber=11129029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T17:30:22Z","timestamp":1758130222000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11129029\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3599681","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}