{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:00:48Z","timestamp":1775692848727,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484819","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"2722-2737","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing"],"prefix":"10.1145","author":[{"given":"Julien","family":"Duman","sequence":"first","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]},{"given":"Kathrin","family":"H\u00f6velmanns","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, United Kingdom"}]},{"given":"Eike","family":"Kiltz","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]},{"given":"Vadim","family":"Lyubashevsky","sequence":"additional","affiliation":[{"name":"IBM Research Europe, Z\u00fcrich, Switzerland"}]},{"given":"Gregor","family":"Seiler","sequence":"additional","affiliation":[{"name":"IBM Research Europe &amp; ETH Zurich, Z\u00fcrich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--26951--7_10"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642-03356--8_35"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--22006--7_34"},{"key":"e_1_3_2_1_4_1","volume-title":"CRYPTO (2) (Lecture Notes in Computer Science)","author":"Attema Thomas","unstructured":"Thomas Attema, Vadim Lyubashevsky, and Gregor Seiler. 2020. Practical Product Proofs for Lattice Commitments. In CRYPTO (2) (Lecture Notes in Computer Science), Vol. 12171. Springer, 470--499."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1998.743485"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_18"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"key":"e_1_3_2_1_8_1","volume-title":"eBACS: ECRYPT Benchmarking of Cryptographic Systems. ( Accessed","author":"Bernstein Daniel","year":"2021","unstructured":"Daniel Bernstein. Accessed May 2021. eBACS: ECRYPT Benchmarking of Cryptographic Systems. ( Accessed May 2021). https:\/\/bench.cr.yp.to\/results-kem.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Daniel J. Bernstein. 2015. Multi-user Schnorr security revisited. Cryptology ePrint Archive Report 2015\/996. (2015). https:\/\/eprint.iacr.org\/2015\/996."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--36033--7_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"e_1_3_2_1_12_1","volume-title":"Eike Kiltz, Tancr\u00e8 de Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehl\u00e9.","author":"Bos Joppe W.","year":"2018","unstructured":"Joppe W. Bos, L\u00e9 o Ducas, Eike Kiltz, Tancr\u00e8 de Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehl\u00e9. 2018. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. In EuroS&P . IEEE, 353--367."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--69453--5_24"},{"key":"e_1_3_2_1_14_1","volume-title":"Sujoy Sinha Roy, and Frederik Vercauteren","author":"D'Anvers Jan-Pieter","year":"2018","unstructured":"Jan-Pieter D'Anvers, Angshuman Karmakar, Sujoy Sinha Roy, and Frederik Vercauteren. 2018. Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM. In AFRICACRYPT (Lecture Notes in Computer Science), Vol. 10831. Springer, 282--305."},{"key":"e_1_3_2_1_15_1","unstructured":"Jelle Don Serge Fehr Christian Majenz and Christian Schaffner. 2021. Online-Extractability in the Quantum Random-Oracle Model. Cryptology ePrint Archive Report 2021\/280. (2021). https:\/\/eprint.iacr.org\/2021\/280."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--48405--1_34"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-011--9114--1"},{"key":"e_1_3_2_1_18_1","unstructured":"Mike Hamburg. 201. Post-quantum cryptography proposal: ThreeBears. https:\/\/www.shiftleft.org\/papers\/threebears\/nist-submission.pdf . (201)."},{"key":"e_1_3_2_1_19_1","unstructured":"Mike Hamburg. 2019. Security proof of ThreeBears. https:\/\/www.shiftleft.org\/papers\/threebears\/proof-round2.pdf . (2019)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217019"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70500-2_12"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Kathrin H\u00f6velmanns. 2021. Generic constructions of quantum-resistant cryptosystems . doctoralthesis. Ruhr-Universit\"at Bochum Universit\"atsbibliothek. https:\/\/doi.org\/10.13154\/294--7758","DOI":"10.13154\/294--7758"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--45388--6_14"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--96878-0_4"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--17259--6_21"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--25510--7_13"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45727-3_24"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9938-4"},{"key":"e_1_3_2_1_29_1","unstructured":"Asheesh Laroia. 2011. Short key IDs are bad news (with OpenPGP and GNU Privacy Guard). http:\/\/www.asheesh.org\/note\/debian\/short-key-ids-are-bad-news.html . (2011)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_31_1","unstructured":"NIST. 2016. Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/call-for-proposals-final-dec-2016.pdf . (2016)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--78372--7_17"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:47:15Z","timestamp":1763498835000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":33,"alternative-id":["10.1145\/3460120.3484819","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484819","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}