{"id":"https://openalex.org/W3159930810","doi":"https://doi.org/10.1109/iscas51556.2021.9401177","title":"High-Speed and Scalable FPGA Implementation of the Key Generation for the Leighton-Micali Signature Protocol","display_name":"High-Speed and Scalable FPGA Implementation of the Key Generation for the Leighton-Micali Signature Protocol","publication_year":2021,"publication_date":"2021-04-27","ids":{"openalex":"https://openalex.org/W3159930810","doi":"https://doi.org/10.1109/iscas51556.2021.9401177","mag":"3159930810"},"language":"en","primary_location":{"id":"doi:10.1109/iscas51556.2021.9401177","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas51556.2021.9401177","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030209013","display_name":"Yifeng Song","orcid":"https://orcid.org/0000-0002-6695-1947"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yifeng Song","raw_affiliation_strings":["School of Electronic Science and Engineering, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072904902","display_name":"Xiao Hu","orcid":"https://orcid.org/0000-0001-7668-4689"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Hu","raw_affiliation_strings":["School of Electronic Science and Engineering, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103325669","display_name":"Wenhao Wang","orcid":"https://orcid.org/0000-0002-3199-2618"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenhao Wang","raw_affiliation_strings":["School of Electronic Science and Engineering, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046054983","display_name":"Jing Tian","orcid":"https://orcid.org/0000-0003-2402-523X"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Tian","raw_affiliation_strings":["School of Electronic Science and Engineering, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100696999","display_name":"Zhongfeng Wang","orcid":"https://orcid.org/0000-0002-7227-4786"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongfeng Wang","raw_affiliation_strings":["School of Electronic Science and Engineering, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5030209013"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":1.0877,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.81380599,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8352067470550537},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5618919730186462},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.5199745893478394},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5081541538238525},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.5066507458686829},{"id":"https://openalex.org/keywords/speedup","display_name":"Speedup","score":0.4924860894680023},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4835367202758789},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46118101477622986},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.43610459566116333},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4350540041923523},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43291330337524414},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.42026054859161377},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3999553918838501},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3600584864616394},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3521517515182495},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2321975827217102},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1477726697921753},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11316266655921936},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10642209649085999}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8352067470550537},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5618919730186462},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.5199745893478394},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5081541538238525},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.5066507458686829},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.4924860894680023},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4835367202758789},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46118101477622986},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.43610459566116333},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4350540041923523},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43291330337524414},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.42026054859161377},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3999553918838501},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3600584864616394},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3521517515182495},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2321975827217102},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1477726697921753},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11316266655921936},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10642209649085999},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscas51556.2021.9401177","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas51556.2021.9401177","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5400000214576721}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1518712071","https://openalex.org/W1534643746","https://openalex.org/W1598269861","https://openalex.org/W1761303171","https://openalex.org/W1996360405","https://openalex.org/W2037107113","https://openalex.org/W2108834246","https://openalex.org/W2137147061","https://openalex.org/W2619630761","https://openalex.org/W2769087986","https://openalex.org/W3014814080","https://openalex.org/W3039552148","https://openalex.org/W4232836212","https://openalex.org/W4294255541"],"related_works":["https://openalex.org/W4235108210","https://openalex.org/W2350215162","https://openalex.org/W2017125388","https://openalex.org/W2382634619","https://openalex.org/W3082967883","https://openalex.org/W254439514","https://openalex.org/W328824506","https://openalex.org/W2117915469","https://openalex.org/W4387407403","https://openalex.org/W3170748431"],"abstract_inverted_index":{"Due":[0],"to":[1,22,94,107,125,141,199],"the":[2,50,55,71,77,91,96,99,112,116,135,150,167,179,194],"rapid":[3],"progress":[4],"made":[5],"in":[6,73,79,202],"quantum":[7,23],"computers,":[8],"modern":[9],"cryptography":[10],"faces":[11],"great":[12],"challenges.":[13],"Many":[14],"new":[15,195],"digital":[16],"signature":[17,35,41,52],"schemes":[18],"that":[19],"have":[20],"resistance":[21],"computing":[24],"are":[25],"being":[26],"presented":[27],"for":[28,49,90,98,115,149],"Post-Quantum":[29],"Cryptography":[30],"(PQC)":[31],"standardization.":[32],"The":[33,102,118,172],"Leighton-Micali":[34],"(LMS),":[36],"a":[37,46,87],"kind":[38],"of":[39,62,120,152],"hash-based":[40],"scheme,":[42],"is":[43,104,122,138],"selected":[44],"as":[45],"promising":[47],"candidate":[48],"PQC":[51],"protocols":[53],"by":[54],"Internet":[56],"Engineering":[57],"Task":[58],"Force":[59],"(IETF)":[60],"because":[61],"its":[63],"small":[64],"private":[65],"and":[66,129,163],"public":[67],"key":[68,74,92],"sizes.":[69],"However,":[70],"low-efficiency":[72],"generation":[75,93],"forms":[76],"bottleneck":[78],"practical":[80],"applications.":[81],"In":[82],"this":[83],"paper,":[84],"we":[85],"propose":[86],"high-speed":[88],"architecture":[89,103],"accelerate":[95],"LMS":[97],"first":[100],"time.":[101],"delicately":[105],"devised":[106],"be":[108],"scalable,":[109],"supporting":[110],"all":[111],"parameter":[113,144,204],"sets":[114,145],"LMS.":[117],"degree":[119],"parallelism":[121],"carefully":[123],"designed":[124],"achieve":[126],"low":[127],"latency":[128],"high":[130],"hardware":[131],"utilization":[132],"efficiency.":[133],"Moreover,":[134],"control":[136],"flow":[137],"well":[139],"managed":[140],"accommodate":[142],"different":[143,203],"with":[146,160,178,191],"constant":[147],"power":[148],"consideration":[151],"anti-power":[153],"analysis":[154],"attacks.":[155],"We":[156],"code":[157],"our":[158],"design":[159,196],"Verilog":[161],"language":[162],"implement":[164],"it":[165],"on":[166,184],"Xilinx":[168],"Zynq":[169],"UltraScale+":[170],"FPGA.":[171],"experimental":[173],"results":[174],"show":[175],"that,":[176],"compared":[177],"optimal":[180],"software":[181],"implementation":[182],"running":[183],"an":[185],"Intel(R)":[186],"Core(TM)":[187],"i7-6850K":[188],"3.60GHz":[189],"CPU":[190],"threading":[192],"enabled,":[193],"achieves":[197],"55x":[198],"2091x":[200],"speedup":[201],"configurations.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
