{"id":"https://openalex.org/W4384339345","doi":"https://doi.org/10.1145/3609223","title":"Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512","display_name":"Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512","publication_year":2023,"publication_date":"2023-07-14","ids":{"openalex":"https://openalex.org/W4384339345","doi":"https://doi.org/10.1145/3609223"},"language":"en","primary_location":{"id":"doi:10.1145/3609223","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3609223","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073317728","display_name":"Douwei Lei","orcid":"https://orcid.org/0009-0008-3047-0480"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Douwei Lei","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, China and Institute of Information Technology, Shenzhen Institute of Information Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, China and Institute of Information Technology, Shenzhen Institute of Information Technology, China","institution_ids":["https://openalex.org/I158809036"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), China and School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), China and School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043346874","display_name":"Cong Peng","orcid":"https://orcid.org/0000-0002-9958-3255"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Peng","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088264677","display_name":"Min Luo","orcid":"https://orcid.org/0000-0002-1819-9332"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min Luo","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, China and Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, China and Shanghai Key Laboratory of Privacy-Preserving Computation, MatrixElements Technologies, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100462347","display_name":"Zhe Liu","orcid":"https://orcid.org/0000-0001-8578-2635"},"institutions":[{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Liu","raw_affiliation_strings":["Zhejiang Lab, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang Lab, China","institution_ids":["https://openalex.org/I4210123185"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["Artificial Intelligence Thrust, Information Hub, Hong Kong University of Science and Technology(Guangzhou), China, China"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence Thrust, Information Hub, Hong Kong University of Science and Technology(Guangzhou), China, China","institution_ids":["https://openalex.org/I200769079","https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5073317728"],"corresponding_institution_ids":["https://openalex.org/I158809036"],"apc_list":null,"apc_paid":null,"fwci":1.725,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.8742272,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"22","issue":"5","first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7203801870346069},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based cryptography","score":0.700707197189331},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.695216178894043},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5329493284225464},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.4815843105316162},{"id":"https://openalex.org/keywords/neural-cryptography","display_name":"Neural cryptography","score":0.465166836977005},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.4148882031440735},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.41032102704048157},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.35178717970848083},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3396603465080261},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3214816451072693},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3202497065067291},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2957514524459839},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1983030140399933},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.16823095083236694},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10926553606987},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.10275730490684509}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7203801870346069},{"id":"https://openalex.org/C137660015","wikidata":"https://www.wikidata.org/wiki/Q6497083","display_name":"Lattice-based cryptography","level":5,"score":0.700707197189331},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.695216178894043},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5329493284225464},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.4815843105316162},{"id":"https://openalex.org/C126954023","wikidata":"https://www.wikidata.org/wiki/Q4316440","display_name":"Neural cryptography","level":4,"score":0.465166836977005},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.4148882031440735},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.41032102704048157},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.35178717970848083},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3396603465080261},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3214816451072693},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3202497065067291},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2957514524459839},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1983030140399933},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.16823095083236694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10926553606987},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.10275730490684509},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3609223","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3609223","pdf_url":null,"source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-131768","is_oa":false,"landing_page_url":"https://repository.hkust.edu.hk/ir/Record/1783.1-131768","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G10506919","display_name":null,"funder_award_id":"62272350","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2323946575","display_name":null,"funder_award_id":"U21A2046","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3161156106","display_name":null,"funder_award_id":"2022PD0AC02","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3210377478","display_name":null,"funder_award_id":"62132008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3554999643","display_name":null,"funder_award_id":"202228017","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3910829908","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3939246998","display_name":null,"funder_award_id":"2020AEA013","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4190834028","display_name":null,"funder_award_id":"62172307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5570204100","display_name":null,"funder_award_id":"U21A204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5870270166","display_name":null,"funder_award_id":"2132008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6638587073","display_name":null,"funder_award_id":"62272350, U21A20466, 62172307, 62132008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7668319085","display_name":null,"funder_award_id":"BK20220075","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G7775223652","display_name":null,"funder_award_id":"2021BAA025","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W190054078","https://openalex.org/W1531368347","https://openalex.org/W1764552993","https://openalex.org/W1985439922","https://openalex.org/W2004814164","https://openalex.org/W2007466965","https://openalex.org/W2056748176","https://openalex.org/W2061171222","https://openalex.org/W2069448237","https://openalex.org/W2137147061","https://openalex.org/W2146633075","https://openalex.org/W2177209050","https://openalex.org/W2467320551","https://openalex.org/W2527193322","https://openalex.org/W2528154059","https://openalex.org/W2619630761","https://openalex.org/W2791664942","https://openalex.org/W2895182117","https://openalex.org/W2919682937","https://openalex.org/W2949507333","https://openalex.org/W3021991761","https://openalex.org/W3166957364","https://openalex.org/W3195434025","https://openalex.org/W3211431797","https://openalex.org/W4206438819","https://openalex.org/W4246927843"],"related_works":["https://openalex.org/W2411027466","https://openalex.org/W4235564189","https://openalex.org/W2895169885","https://openalex.org/W4385627932","https://openalex.org/W4226178278","https://openalex.org/W2295565109","https://openalex.org/W2591713603","https://openalex.org/W4389982864","https://openalex.org/W2003152337","https://openalex.org/W4320025257"],"abstract_inverted_index":{"With":[0],"the":[1,6,63,79,107],"development":[2],"of":[3,78,81,92,111],"quantum":[4],"computing,":[5],"existing":[7],"cryptography":[8,31,42],"schemes":[9],"based":[10],"on":[11],"classical":[12],"cryptographic":[13,25],"primitives":[14],"will":[15],"no":[16],"longer":[17],"be":[18,71],"secure.":[19],"Hence,":[20],"cryptographers":[21],"are":[22,62],"designing":[23],"post-quantum":[24],"(PQC)":[26],"schemes,":[27],"and":[28,59,67,95,130],"ideal":[29,40,54],"lattice-based":[30,41,55],"has":[32],"emerged":[33],"as":[34,39],"a":[35,120],"prime":[36],"candidate.":[37],"Today,":[38],"becomes":[43,48],"more":[44],"mature,":[45],"its":[46,126],"performance":[47,122],"an":[49],"important":[50],"optimization":[51],"goal.":[52],"In":[53,73],"cryptography,":[56],"polynomial":[57,60,93,96],"arithmetic":[58,94],"sampling":[61],"most":[64],"time-consuming":[65],"operations":[66],"therefore":[68],"need":[69],"to":[70,125],"accelerated.":[72],"this":[74],"article,":[75],"taking":[76],"advantage":[77],"parallelism":[80],"new":[82],"512-bit":[83],"advanced":[84,132],"vector":[85,133],"instructions":[86,134],"(AVX512),":[87],"we":[88],"present":[89],"parallel":[90],"implementations":[91],"sampling,":[97],"thus":[98],"comprehensively":[99],"improving":[100],"their":[101],"performance.":[102],"We":[103],"conduct":[104],"experiments":[105],"with":[106],"Dilithium":[108],"scheme(one":[109],"scheme":[110],"NIST":[112],"PQC":[113],"Standardization":[114],"Process":[115],"Round-4).":[116],"Our":[117],"implementation":[118],"gets":[119],"nice":[121],"boost":[123],"compared":[124],"pure":[127],"C":[128],"language":[129],"256-bit":[131],"(AVX2)":[135],"implementation.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
