{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:14:48Z","timestamp":1760044488271,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Bundesministerium f\u00fcr Wirtschaft und Klimaschutz","award":["13I40V010B"],"award-info":[{"award-number":["13I40V010B"]}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1390"],"award-info":[{"award-number":["16KIS1390"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605769.3623993","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T08:31:21Z","timestamp":1700728281000},"page":"51-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Enabling Lattice-Based Post-Quantum Cryptography on the OpenTitan Platform"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0058-1107","authenticated-orcid":false,"given":"Tobias","family":"Stelzer","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Garching, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7822-2880","authenticated-orcid":false,"given":"Felix","family":"Oberhansl","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4171-1656","authenticated-orcid":false,"given":"Jonas","family":"Schupp","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9476-9651","authenticated-orcid":false,"given":"Patrick","family":"Karl","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-031-09234--3_42"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--70694--8_10"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2020.i3.219--242"},{"key":"e_1_3_2_1_5_1","unstructured":"ANSSI. 2022. ANSSI views on the Post-Quantum Cryptography transition. https:\/\/www.ssi.gouv.fr\/en\/publication\/anssi-views-on-the-post-quantum-cryptography-transition\/.  ANSSI. 2022. ANSSI views on the Post-Quantum Cryptography transition. https:\/\/www.ssi.gouv.fr\/en\/publication\/anssi-views-on-the-post-quantum-cryptography-transition\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i4.17--61"},{"key":"e_1_3_2_1_7_1","volume-title":"Stefan K\u00f6 lbl, Ruben Niederhagen, Joost Rijneveld, and Peter Schwabe.","author":"Bernstein Daniel J.","year":"2019","unstructured":"Daniel J. Bernstein , Andreas H\u00fc lsing , Stefan K\u00f6 lbl, Ruben Niederhagen, Joost Rijneveld, and Peter Schwabe. 2019 . The SPHINCS Signature Framework. IACR Cryptol. ePrint Arch . (2019), 1086. https:\/\/eprint.iacr.org\/2019\/1086 Daniel J. Bernstein, Andreas H\u00fc lsing, Stefan K\u00f6 lbl, Ruben Niederhagen, Joost Rijneveld, and Peter Schwabe. 2019. The SPHINCS Signature Framework. IACR Cryptol. ePrint Arch. (2019), 1086. https:\/\/eprint.iacr.org\/2019\/1086"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"e_1_3_2_1_9_1","volume-title":"Eike Kiltz, Tancr\u00e8 de Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, and Damien Stehl\u00e9.","author":"Bos Joppe W.","year":"2017","unstructured":"Joppe W. Bos , L\u00e9 o Ducas , Eike Kiltz, Tancr\u00e8 de Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, and Damien Stehl\u00e9. 2017 . CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. IACR Cryptol. ePrint Arch . (2017), 634. http:\/\/eprint.iacr.org\/2017\/634 Joppe W. Bos, L\u00e9 o Ducas, Eike Kiltz, Tancr\u00e8 de Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, and Damien Stehl\u00e9. 2017. CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. IACR Cryptol. ePrint Arch. (2017), 634. http:\/\/eprint.iacr.org\/2017\/634"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i2.199--224"},{"key":"e_1_3_2_1_11_1","unstructured":"BSI. 2022. Technische Richtlinie: Kryptographische Verfahren: Empfehlungen und Schluessellaengen. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/TechnischeRichtlinien\/TR02102\/BSI-TR-02102.pdf?__blob=publicationFile.  BSI. 2022. Technische Richtlinie: Kryptographische Verfahren: Empfehlungen und Schluessellaengen. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/TechnischeRichtlinien\/TR02102\/BSI-TR-02102.pdf?__blob=publicationFile."},{"key":"e_1_3_2_1_12_1","volume-title":"An algorithm for the machine calculation of complex Fourier series. Mathematics of computation","author":"Cooley James W","year":"1965","unstructured":"James W Cooley and John W Tukey . 1965. An algorithm for the machine calculation of complex Fourier series. Mathematics of computation , Vol. 19 , 90 ( 1965 ), 297--301. James W Cooley and John W Tukey. 1965. An algorithm for the machine calculation of complex Fourier series. Mathematics of computation , Vol. 19, 90 (1965), 297--301."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3222954"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2018.i1.238--268"},{"key":"e_1_3_2_1_15_1","unstructured":"Pierre-Alain Fouque Jeffrey Hoffstein Paul Kirchner Vadim Lyubashevsky Thomas Pornin Thomas Prest Thomas Ricosset Gregor Seiler William Whyte and Zhenfei Zhang. 2017. Falcon Fast-Fourier Lattice-based Compact Signatures over NTRU. https:\/\/falcon-sign.info\/.  Pierre-Alain Fouque Jeffrey Hoffstein Paul Kirchner Vadim Lyubashevsky Thomas Pornin Thomas Prest Thomas Ricosset Gregor Seiler William Whyte and Zhenfei Zhang. 2017. Falcon Fast-Fourier Lattice-based Compact Signatures over NTRU. https:\/\/falcon-sign.info\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.414--460"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741027"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2020.i4.239--280"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--81293--5_12"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i1.1--24"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579092"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--97348--3_12"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014--9938--4"},{"key":"e_1_3_2_1_25_1","volume-title":"Ibex: An embedded 32 bit RISC-V CPU core. https:\/\/ibex-core.readthedocs.io\/en\/latest\/","author":"RISC.","year":"2018","unstructured":"low RISC. 2018 . Ibex: An embedded 32 bit RISC-V CPU core. https:\/\/ibex-core.readthedocs.io\/en\/latest\/ lowRISC. 2018. Ibex: An embedded 32 bit RISC-V CPU core. https:\/\/ibex-core.readthedocs.io\/en\/latest\/"},{"key":"e_1_3_2_1_26_1","unstructured":"lowRISC. 2023 a. HMAC HWIP Technical Specification. https:\/\/opentitan.org\/book\/hw\/ip\/hmac\/index.html  lowRISC. 2023 a. HMAC HWIP Technical Specification. https:\/\/opentitan.org\/book\/hw\/ip\/hmac\/index.html"},{"key":"e_1_3_2_1_27_1","unstructured":"lowRISC. 2023 b. OpenTitan. https:\/\/opentitan.org\/  lowRISC. 2023 b. OpenTitan. https:\/\/opentitan.org\/"},{"key":"e_1_3_2_1_28_1","unstructured":"lowRISC. 2023 c. OpenTitan Big Number Accelerator (OTBN) Technical Specification. https:\/\/opentitan.org\/book\/hw\/ip\/otbn\/index.html  lowRISC. 2023 c. OpenTitan Big Number Accelerator (OTBN) Technical Specification. https:\/\/opentitan.org\/book\/hw\/ip\/otbn\/index.html"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--13190--5_1"},{"key":"e_1_3_2_1_30_1","volume-title":"Modular multiplication without trial division. Mathematics of computation","author":"Montgomery Peter L","year":"1985","unstructured":"Peter L Montgomery . 1985. Modular multiplication without trial division. Mathematics of computation , Vol. 44 , 170 ( 1985 ), 519--521. Peter L Montgomery. 1985. Modular multiplication without trial division. Mathematics of computation , Vol. 44, 170 (1985), 519--521."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3126208"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.202"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--22174--8_19"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2700795"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465756"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i2.328--356"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASID50160.2020.9271722"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3162593"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623993","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605769.3623993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:12Z","timestamp":1750178772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623993"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":40,"alternative-id":["10.1145\/3605769.3623993","10.1145\/3605769"],"URL":"https:\/\/doi.org\/10.1145\/3605769.3623993","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}