{"id":"https://openalex.org/W4313645570","doi":"https://doi.org/10.1145/3579092","title":"Post-Quantum Signatures on RISC-V with Hardware Acceleration","display_name":"Post-Quantum Signatures on RISC-V with Hardware Acceleration","publication_year":2023,"publication_date":"2023-01-06","ids":{"openalex":"https://openalex.org/W4313645570","doi":"https://doi.org/10.1145/3579092"},"language":"en","primary_location":{"id":"doi:10.1145/3579092","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579092","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037163073","display_name":"Patrick Karl","orcid":"https://orcid.org/0000-0001-9476-9651"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Patrick Karl","raw_affiliation_strings":["Technical University of Munich; TUM School of Computation, Information and Technology; Chair of Security in Information Technology, Munich, Bavaria, Germany","Technical University of Munich","TUM School of Computation, Information and Technology"],"raw_orcid":"https://orcid.org/0000-0001-9476-9651","affiliations":[{"raw_affiliation_string":"Technical University of Munich; TUM School of Computation, Information and Technology; Chair of Security in Information Technology, Munich, Bavaria, Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Technical University of Munich","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"TUM School of Computation, Information and Technology","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102735008","display_name":"Jonas Schupp","orcid":"https://orcid.org/0000-0002-4171-1656"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jonas Schupp","raw_affiliation_strings":["Technical University of Munich; TUM School of Computation, Information and Technology; Chair of Security in Information Technology, Munich, Bavaria, Germany","Technical University of Munich","TUM School of Computation, Information and Technology"],"raw_orcid":"https://orcid.org/0000-0002-4171-1656","affiliations":[{"raw_affiliation_string":"Technical University of Munich; TUM School of Computation, Information and Technology; Chair of Security in Information Technology, Munich, Bavaria, Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Technical University of Munich","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"TUM School of Computation, Information and Technology","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047790485","display_name":"Tim Fritzmann","orcid":"https://orcid.org/0000-0002-5483-4292"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tim Fritzmann","raw_affiliation_strings":["Technical University of Munich; TUM School of Computation, Information and Technology; Chair of Security in Information Technology, Munich, Bavaria, Germany","TUM School of Computation, Information and Technology","Technical University of Munich"],"raw_orcid":"https://orcid.org/0000-0002-5483-4292","affiliations":[{"raw_affiliation_string":"Technical University of Munich; TUM School of Computation, Information and Technology; Chair of Security in Information Technology, Munich, Bavaria, Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"TUM School of Computation, Information and Technology","institution_ids":[]},{"raw_affiliation_string":"Technical University of Munich","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026512033","display_name":"Georg Sigl","orcid":"https://orcid.org/0000-0003-3152-941X"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Georg Sigl","raw_affiliation_strings":["Technical University of Munich; TUM School of Computation, Information and Technology; Chair of Security in Information Technology, Munich, Germany; and Fraunhofer Institute for Applied and Integrated Security, Garching, Bavaria, Germany","Technical University of Munich","TUM School of Computation, Information and Technology","Chair of Security in Information Technology, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0003-3152-941X","affiliations":[{"raw_affiliation_string":"Technical University of Munich; TUM School of Computation, Information and Technology; Chair of Security in Information Technology, Munich, Germany; and Fraunhofer Institute for Applied and Integrated Security, Garching, Bavaria, Germany","institution_ids":["https://openalex.org/I4210136922","https://openalex.org/I62916508"]},{"raw_affiliation_string":"Technical University of Munich","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"TUM School of Computation, Information and Technology","institution_ids":[]},{"raw_affiliation_string":"Chair of Security in Information Technology, Munich, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037163073"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":9.894,"has_fulltext":false,"cited_by_count":60,"citation_normalized_percentile":{"value":0.98629625,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"23","issue":"2","first_page":"1","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6926862001419067},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5488680601119995},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5170917510986328},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4835672080516815},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.4563603401184082},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4425026476383209},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.43344438076019287},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4273582100868225},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.42352741956710815},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.40686774253845215},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.32191094756126404},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.30535799264907837},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20753249526023865},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1485070288181305},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.13460081815719604},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1183510422706604}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6926862001419067},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5488680601119995},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5170917510986328},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4835672080516815},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.4563603401184082},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4425026476383209},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.43344438076019287},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4273582100868225},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.42352741956710815},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.40686774253845215},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.32191094756126404},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.30535799264907837},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20753249526023865},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1485070288181305},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.13460081815719604},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1183510422706604},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3579092","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579092","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1699822","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1699822","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/475144","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/475144","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"journal article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.8999999761581421,"id":"https://metadata.un.org/sdg/7"}],"awards":[{"id":"https://openalex.org/G1305463392","display_name":null,"funder_award_id":"6G-life","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1506156414","https://openalex.org/W2061171222","https://openalex.org/W2069441027","https://openalex.org/W2168676717","https://openalex.org/W2619630761","https://openalex.org/W2914925470","https://openalex.org/W2919682937","https://openalex.org/W2959588354","https://openalex.org/W2963255460","https://openalex.org/W2970276809","https://openalex.org/W3012153794","https://openalex.org/W3093786062","https://openalex.org/W3095245686","https://openalex.org/W3097058029","https://openalex.org/W3159164431","https://openalex.org/W3159258450","https://openalex.org/W3166957364","https://openalex.org/W3195434025","https://openalex.org/W3210291496","https://openalex.org/W3213547738","https://openalex.org/W3216234213","https://openalex.org/W3216842157","https://openalex.org/W4225986329","https://openalex.org/W4250492047","https://openalex.org/W4285302767","https://openalex.org/W4296842505","https://openalex.org/W4312807212","https://openalex.org/W4312960344","https://openalex.org/W4385327521","https://openalex.org/W6762902957","https://openalex.org/W6840819767","https://openalex.org/W6922644948"],"related_works":["https://openalex.org/W4293172089","https://openalex.org/W1553510179","https://openalex.org/W2414747139","https://openalex.org/W2350215162","https://openalex.org/W2017125388","https://openalex.org/W3082967883","https://openalex.org/W2382634619","https://openalex.org/W1802397081","https://openalex.org/W254439514","https://openalex.org/W328824506"],"abstract_inverted_index":{"CRYSTALS-Dilithium":[0],"and":[1,57,62,81,121,173],"Falcon":[2],"are":[3,12,125],"digital":[4],"signature":[5,96,179],"algorithms":[6],"based":[7],"on":[8],"cryptographic":[9],"lattices,":[10],"which":[11,72],"considered":[13],"secure":[14],"even":[15],"if":[16],"large-scale":[17],"quantum":[18],"computers":[19],"will":[20],"be":[21],"able":[22],"to":[23,51,144,171,175],"break":[24],"conventional":[25],"public-key":[26],"cryptography.":[27],"Both":[28],"schemes":[29],"have":[30,73],"been":[31,74],"selected":[32],"for":[33,77,85,91,119,165,177],"standardization":[34],"in":[35],"the":[36,53,66],"NIST":[37],"Post-Quantum":[38,86],"competition.":[39],"In":[40,142],"this":[41],"work,":[42],"we":[43,146],"present":[44,147],"a":[45,94,112,148],"RISC-V":[46],"HW/SW":[47,140],"codesign":[48],"that":[49,102,118,129,154],"aims":[50],"combine":[52],"advantages":[54],"of":[55,68,106],"software":[56,136],"hardware":[58,70,161],"implementations,":[59],"i.e.,":[60],"flexibility":[61],"performance.":[63],"It":[64,88],"shows":[65],"use":[67],"flexible":[69],"accelerators,":[71],"previously":[75],"used":[76],"Public-Key":[78],"Encryption":[79],"(PKE)":[80],"Key-Encapsulation":[82],"Mechanism":[83],"(KEM),":[84],"signatures.":[87,109],"is":[89,132,167],"optimized":[90],"Dilithium":[92,120,166],"as":[93],"generic":[95],"scheme":[97],"but":[98],"also":[99],"accelerates":[100],"applications":[101],"require":[103],"fast":[104],"verification":[105],"Falcon\u2019s":[107,178],"compact":[108,149],"We":[110],"provide":[111],"comparison":[113],"with":[114],"previous":[115,135],"works":[116],"showing":[117],"Falcon,":[122],"cycle":[123],"counts":[124],"significantly":[126],"reduced,":[127],"such":[128],"our":[130],"design":[131,153],"faster":[133],"than":[134],"implementations":[137],"or":[138],"other":[139],"codesigns.":[141],"addition":[143],"that,":[145],"Globalfoundries":[150],"22nm":[151],"ASIC":[152],"runs":[155],"at":[156],"800":[157],"MHz.":[158],"By":[159],"using":[160],"acceleration,":[162],"energy":[163],"consumption":[164],"reduced":[168],"by":[169],"up":[170,174],"92.2%,":[172],"67.5%":[176],"verification.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":24},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1}],"updated_date":"2026-05-09T13:55:54.758798","created_date":"2025-10-10T00:00:00"}
