{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T11:44:10Z","timestamp":1766231050060,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1145\/3750720.3757285","type":"proceedings-article","created":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T11:42:38Z","timestamp":1766230958000},"page":"44-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Support SIMD Optimization with Post Quantum Cryptography Validation on Move Language"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8518-9495","authenticated-orcid":false,"given":"ChiaHui","family":"Su","sequence":"first","affiliation":[{"name":"Department of Computer Science, National Tsing Hua University, Hsinchu, Taiwan and Electronic and Optoelectronic System Research Laboratories, Industrial Technology Research Institute, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2340-7952","authenticated-orcid":false,"given":"Hsuan-Yun","family":"Hung","sequence":"additional","affiliation":[{"name":"National Taipei University of Technology, Taipei, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5073-3680","authenticated-orcid":false,"given":"LiangNi","family":"Wang","sequence":"additional","affiliation":[{"name":"National Tsing Hua University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2547-7155","authenticated-orcid":false,"given":"I-An","family":"Chen","sequence":"additional","affiliation":[{"name":"National Tsing Hua University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9919-6258","authenticated-orcid":false,"given":"Jenq-Kuen","family":"Lee","sequence":"additional","affiliation":[{"name":"National Tsing Hua University, Hsinchu, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2025,12,20]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Massimo Bartoletti Silvia Crafa and Enrico Lipparini. 2025. Formal verification in Solidity and Move: insights from a comparative analysis. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2502.13929 (2025)."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0J Bernstein Niels Duif Tanja Lange Peter Schwabe and Bo-Yin Yang. 2012. High-speed high-security signatures. Journal of cryptographic engineering 2 2 (2012) 77\u201389.","DOI":"10.1007\/s13389-012-0027-1"},{"key":"e_1_3_3_2_4_2","unstructured":"Sam Blackshear Evan Cheng David\u00a0L Dill Victor Gao Ben Maurer Todd Nowacki Alistair Pott Shaz Qadeer Dario\u00a0Russi Rain Stephane Sezer et\u00a0al. 2019. Move: A language with programmable resources. Libra Assoc 1 (2019)."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"G\u00a0Robert Blakley and Itshak Borosh. 1979. Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Computers & mathematics with applications 5 3 (1979) 169\u2013178.","DOI":"10.1016\/0898-1221(79)90039-7"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6_4"},{"key":"e_1_3_3_2_7_2","unstructured":"L\u00e9o Ducas Tancrede Lepoint Vadim Lyubashevsky Peter Schwabe Gregor Seiler and Damien Stehl\u00e9. 2018. Crystals\u2013dilithium: Digital signatures from module lattices. (2018)."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/WSCE59557.2023.10365887"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Don Johnson Alfred Menezes and Scott Vanstone. 2001. The elliptic curve digital signature algorithm (ECDSA). International journal of information security 1 (2001) 36\u201363.","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Matthias\u00a0J. Kannwischer Peter Schwabe Douglas Stebila and Thom Wiggers. 2022. Improving Software Quality in Cryptography Standardization Projects. Cryptology ePrint Archive Paper 2022\/337. https:\/\/eprint.iacr.org\/2022\/337","DOI":"10.1109\/EuroSPW55150.2022.00010"},{"key":"e_1_3_3_2_11_2","unstructured":"Roman Kashitsyn Robin K\u00fcnzler Ognjen Mari\u0107 and Lara Schmid. 2025. Combating Reentrancy Bugs on Sharded Blockchains. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2506.05932 (2025)."},{"key":"e_1_3_3_2_12_2","unstructured":"National Institute of Standards and Technology. [n. d.]. Post-Quantum Cryptography Standardization. https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography. Accessed: 2025-07-17."},{"key":"e_1_3_3_2_13_2","unstructured":"OQ Safe. 2023. liboqs: C library for quantum-resistant cryptographic algorithms."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Deepraj Soni Kanad Basu Mohammed Nabeel Najwa Aaraj Marc Manzano Ramesh Karri Deepraj Soni Kanad Basu Mohammed Nabeel Najwa Aaraj et\u00a0al. 2021. Crystals-dilithium. Hardware Architectures for Post-Quantum Digital Signature Schemes (2021) 13\u201330.","DOI":"10.1007\/978-3-030-57682-0_2"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_3"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639153"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Jian Zheng Huawei Huang Zibin Zheng and Song Guo. 2023. Adaptive double-spending attacks on PoW-based blockchains. IEEE Transactions on Dependable and Secure Computing (2023).","DOI":"10.1109\/TDSC.2023.3268668"}],"event":{"name":"ICPP Workshops '25: The 54th International Conference on Parallel Processing Workshops","location":"San Diego CA USA","acronym":"ICPP Workshops '25"},"container-title":["Workshop Proceedings of the 54th International Conference on Parallel Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3750720.3757285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T11:43:00Z","timestamp":1766230980000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3750720.3757285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":17,"alternative-id":["10.1145\/3750720.3757285","10.1145\/3750720"],"URL":"https:\/\/doi.org\/10.1145\/3750720.3757285","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"2025-12-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}