{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:34:30Z","timestamp":1763458470005,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","funder":[{"name":"SERICS","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]},{"name":"Key Digital Technologies Joint Undertaking","award":["101095947"],"award-info":[{"award-number":["101095947"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,28]]},"DOI":"10.1145\/3706594.3726969","type":"proceedings-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T04:13:09Z","timestamp":1751861589000},"page":"30-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Deep Dive into Integration Methodologies in RISC-V"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3552-7162","authenticated-orcid":false,"given":"Valeria","family":"Piscopo","sequence":"first","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9480-1352","authenticated-orcid":false,"given":"Alessandra","family":"Dolmeta","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6556-8876","authenticated-orcid":false,"given":"Mattia","family":"Mirigaldi","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3069-0319","authenticated-orcid":false,"given":"Maurizio","family":"Martina","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2238-9443","authenticated-orcid":false,"given":"Guido","family":"Masera","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Turin, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,7,6]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"G. Bertoni J. Daemen M. Peeters G. Van\u00a0Assche and R. Van\u00a0Keer. 2015. FIPS PUB 202 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. (2015). https:\/\/keccak.team\/hardware.html"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3587135.3591432"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715173"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Tim Fritzmann Georg Sigl and Johanna Sep\u00falveda. 2020. RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 4 (Aug. 2020) 239\u2013280. 10.13154\/tches.v2020.i4.239-280","DOI":"10.13154\/tches.v2020.i4.239-280"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"Junhao Huang Alexandre Adomnic\u0103i Jipeng Zhang Wangchen Dai Yao Liu Ray C.\u00a0C. Cheung \u00c7etin\u00a0Kaya Ko\u00e7 and Donglong Chen. 2024. Revisiting Keccak and Dilithium Implementations on ARMv7-M. IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 2 (Mar. 2024) 1\u201324. 10.46586\/tches.v2024.i2.1-24","DOI":"10.46586\/tches.v2024.i2.1-24"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Jihye Lee Whijin Kim and Ji-Hoon Kim. 2023. A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. Sensors 23 23 (2023). 10.3390\/s23239408","DOI":"10.3390\/s23239408"},{"key":"e_1_3_3_2_8_2","unstructured":"Simone Machetti Pasquale\u00a0Davide Schiavone Thomas\u00a0Christoph M\u00fcller Miguel Pe\u00f3n-Quir\u00f3s and David Atienza. 2024. X-HEEP: An Open-Source Configurable and Extendible RISC-V Microcontroller for the Exploration of Ultra-Low-Power Edge Accelerators. arxiv:https:\/\/arXiv.org\/abs\/2401.05548\u00a0[cs.AR]"},{"key":"e_1_3_3_2_9_2","unstructured":"National Institute of Standards and Technology. 2024. SHA-3 Project. https:\/\/csrc.nist.gov\/projects\/hash-functions\/sha-3-project Accessed: February 21 2025."}],"event":{"name":"CF '25 Companion: 22nd ACM International Conference on Computing Frontiers","location":"Cagliari Italy","acronym":"CF '25 Companion","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["Proceedings of the 22nd ACM International Conference on Computing Frontiers: Workshops and Special Sessions"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706594.3726969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T04:13:57Z","timestamp":1751861637000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706594.3726969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,28]]},"references-count":8,"alternative-id":["10.1145\/3706594.3726969","10.1145\/3706594"],"URL":"https:\/\/doi.org\/10.1145\/3706594.3726969","relation":{},"subject":[],"published":{"date-parts":[[2025,5,28]]},"assertion":[{"value":"2025-07-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}