{"id":"https://openalex.org/W1508634734","doi":"https://doi.org/10.1007/978-3-642-40349-1_15","title":"McBits: Fast Constant-Time Code-Based Cryptography","display_name":"McBits: Fast Constant-Time Code-Based Cryptography","publication_year":2013,"publication_date":"2013-01-01","ids":{"openalex":"https://openalex.org/W1508634734","doi":"https://doi.org/10.1007/978-3-642-40349-1_15","mag":"1508634734"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-40349-1_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-40349-1_15","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-40349-1_15.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-40349-1_15.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108114375","display_name":"Daniel J. Bernstein","orcid":null},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]},{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL","US"],"is_corresponding":true,"raw_author_name":"Daniel J. Bernstein","raw_affiliation_strings":["Department of Computer Science, University of Illinois at Chicago, Chicago, IL, 60607\u20137053, USA","Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Illinois at Chicago, Chicago, IL, 60607\u20137053, USA","institution_ids":["https://openalex.org/I39422238"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016198049","display_name":"Tung Chou","orcid":"https://orcid.org/0000-0003-3043-6190"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Tung Chou","raw_affiliation_strings":["Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, P.O. Box 513, 5600 MB, Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074344027","display_name":"Peter Schwabe","orcid":"https://orcid.org/0000-0002-1310-0997"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Peter Schwabe","raw_affiliation_strings":["Digital Security Group, Radboud University Nijmegen, Mailbox 47, P.O. Box 9010, 6500 GL, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Radboud University Nijmegen, Mailbox 47, P.O. Box 9010, 6500 GL, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108114375"],"corresponding_institution_ids":["https://openalex.org/I39422238","https://openalex.org/I83019370"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":5.4169,"has_fulltext":true,"cited_by_count":115,"citation_normalized_percentile":{"value":0.96346783,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"250","last_page":"272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8722947835922241},{"id":"https://openalex.org/keywords/timing-attack","display_name":"Timing attack","score":0.7145292162895203},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6150584816932678},{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.5892339944839478},{"id":"https://openalex.org/keywords/fast-fourier-transform","display_name":"Fast Fourier transform","score":0.5605019330978394},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5256568193435669},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.49518218636512756},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.4837455749511719},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.46441739797592163},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4290933907032013},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.425085186958313},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.42409470677375793},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3778471052646637},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.34538015723228455},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3427113890647888},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24968141317367554},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.21430930495262146},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08265551924705505}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8722947835922241},{"id":"https://openalex.org/C28420585","wikidata":"https://www.wikidata.org/wiki/Q2665075","display_name":"Timing attack","level":4,"score":0.7145292162895203},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6150584816932678},{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.5892339944839478},{"id":"https://openalex.org/C75172450","wikidata":"https://www.wikidata.org/wiki/Q623950","display_name":"Fast Fourier transform","level":2,"score":0.5605019330978394},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5256568193435669},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.49518218636512756},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.4837455749511719},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.46441739797592163},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4290933907032013},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.425085186958313},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.42409470677375793},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3778471052646637},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.34538015723228455},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3427113890647888},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24968141317367554},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.21430930495262146},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08265551924705505},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":10,"locations":[{"id":"doi:10.1007/978-3-642-40349-1_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-40349-1_15","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-40349-1_15.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.tue.nl:publications/cb0e81d4-46e7-41c2-83dc-3a9b5dc71337","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/cb0e81d4-46e7-41c2-83dc-3a9b5dc71337","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Bernstein, D J, Chou, T & Schwabe, P 2013, McBits : Fast constant-time code-based cryptography. in G Bertoni & J-S Coron (eds), Cryptographic Hardware and Embedded Systems \u2013 CHES 2013 (15th International Workshop, Santa Barbara CA, USA, August 20-23, 2013. Proceedings). Lecture Notes in Computer Science, vol. 8086, Springer, Berlin, pp. 250-272, conference; 15th International Workshop on Cryptographic Hardware and Embedded Systems; 2013-08-20; 2013-08-23, 20/08/13. https://doi.org/10.1007/978-3-642-40349-1_15","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:756822","is_oa":false,"landing_page_url":"http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=756822","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.308.6027","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.308.6027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cryptojedi.org/papers/mcbits-20130616.pdf","raw_type":"text"},{"id":"pmh:oai:library.tue.nl:756822","is_oa":false,"landing_page_url":"http://repository.tue.nl/756822","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:library.tue.nl:802788","is_oa":false,"landing_page_url":"http://repository.tue.nl/802788","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:oai:library.tue.nl:891169","is_oa":false,"landing_page_url":"http://repository.tue.nl/891169","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"External research report"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/f7a8fa53-6133-4a8e-b1cf-e074f5f5a70e","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/f7a8fa53-6133-4a8e-b1cf-e074f5f5a70e","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bernstein, D J, Chou, T & Schwabe, P 2015, McBits: fast constant-time code-based cryptography. Cryptology ePrint Archive, vol. 2015/610, International Association for Cryptologic Research.","raw_type":"book"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/117089","is_oa":false,"landing_page_url":"http://hdl.handle.net/2066/117089","pdf_url":null,"source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bertoni, G.; Coron, J.-S. (ed.), Cryptographic Hardware and Embedded Systems - CHES 2013, pp. 250-272","raw_type":"Part of book or chapter of book"},{"id":"pmh:tue:oai:pure.tue.nl:publications/f7a8fa53-6133-4a8e-b1cf-e074f5f5a70e","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/f7a8fa53-6133-4a8e-b1cf-e074f5f5a70e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/report"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-40349-1_15","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-40349-1_15","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-40349-1_15.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7799999713897705}],"awards":[{"id":"https://openalex.org/G1502640350","display_name":"TC: Small: Higher-Speed Cryptography","funder_award_id":"1018836","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G629491556","display_name":null,"funder_award_id":"(NWO)","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"},{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1508634734.pdf","grobid_xml":"https://content.openalex.org/works/W1508634734.grobid-xml"},"referenced_works_count":80,"referenced_works":["https://openalex.org/W47417907","https://openalex.org/W51430393","https://openalex.org/W84256862","https://openalex.org/W86758347","https://openalex.org/W252592998","https://openalex.org/W310218969","https://openalex.org/W316732839","https://openalex.org/W616061519","https://openalex.org/W634741417","https://openalex.org/W1479801926","https://openalex.org/W1483957515","https://openalex.org/W1499500956","https://openalex.org/W1506139516","https://openalex.org/W1513904472","https://openalex.org/W1518716055","https://openalex.org/W1534643746","https://openalex.org/W1536485115","https://openalex.org/W1540966986","https://openalex.org/W1548516269","https://openalex.org/W1554153316","https://openalex.org/W1555772964","https://openalex.org/W1579684562","https://openalex.org/W1592220802","https://openalex.org/W1594652978","https://openalex.org/W1594784179","https://openalex.org/W1595415026","https://openalex.org/W1602905584","https://openalex.org/W1763079358","https://openalex.org/W1973452640","https://openalex.org/W1981663184","https://openalex.org/W1985586225","https://openalex.org/W1985709119","https://openalex.org/W2010393691","https://openalex.org/W2012188345","https://openalex.org/W2035696589","https://openalex.org/W2066356146","https://openalex.org/W2076458424","https://openalex.org/W2097130694","https://openalex.org/W2102702231","https://openalex.org/W2115148615","https://openalex.org/W2134316164","https://openalex.org/W2136570131","https://openalex.org/W2136772235","https://openalex.org/W2141389982","https://openalex.org/W2149636648","https://openalex.org/W2154220188","https://openalex.org/W2156279885","https://openalex.org/W2167511540","https://openalex.org/W2395967649","https://openalex.org/W2405015683","https://openalex.org/W2407105577","https://openalex.org/W2486348220","https://openalex.org/W2486703285","https://openalex.org/W2487822210","https://openalex.org/W2495326574","https://openalex.org/W2495860794","https://openalex.org/W2501207893","https://openalex.org/W2506075711","https://openalex.org/W2540879644","https://openalex.org/W2561675875","https://openalex.org/W2619380141","https://openalex.org/W2752853835","https://openalex.org/W2770684288","https://openalex.org/W2791742471","https://openalex.org/W2800143172","https://openalex.org/W2913570393","https://openalex.org/W2915981297","https://openalex.org/W2986959318","https://openalex.org/W3030941681","https://openalex.org/W3141465168","https://openalex.org/W3172550433","https://openalex.org/W4214882369","https://openalex.org/W4231286867","https://openalex.org/W4231677194","https://openalex.org/W4236963012","https://openalex.org/W4246129640","https://openalex.org/W4297991408","https://openalex.org/W4302318984","https://openalex.org/W4308661851","https://openalex.org/W7074215236"],"related_works":["https://openalex.org/W2467989920","https://openalex.org/W1625325917","https://openalex.org/W1602905584","https://openalex.org/W2041290864","https://openalex.org/W1964925533","https://openalex.org/W2738998050","https://openalex.org/W1611563112","https://openalex.org/W2095890461","https://openalex.org/W209920635","https://openalex.org/W3168480899"],"abstract_inverted_index":{"This":[0],"paper":[1,24],"presents":[2],"extremely":[3],"fast":[4,52,60],"algorithms":[5,45],"for":[6,51,59],"code-based":[7],"public-key":[8],"cryptography,":[9],"including":[10],"full":[11],"protection":[12],"against":[13],"timing":[14],"attacks.":[15,70],"For":[16],"example,":[17],"at":[18],"a":[19,26,39,55,64],"2128":[20],"security":[21],"level,":[22],"this":[23],"achieves":[25],"reciprocal":[27],"decryption":[28],"throughput":[29],"of":[30],"just":[31],"60493":[32],"cycles":[33],"(plus":[34],"cipher":[35],"cost":[36],"etc.)":[37],"on":[38,47],"single":[40],"Ivy":[41],"Bridge":[42],"core.":[43],"These":[44],"rely":[46],"an":[48],"additive":[49,57],"FFT":[50,58],"root":[53],"computation,":[54,62],"transposed":[56],"syndrome":[61],"and":[63],"sorting":[65],"network":[66],"to":[67],"avoid":[68],"cache-timing":[69]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":15},{"year":2017,"cited_by_count":18},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
