{"id":"https://openalex.org/W3159164431","doi":"https://doi.org/10.46586/tches.v2022.i1.414-460","title":"Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography","display_name":"Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography","publication_year":2021,"publication_date":"2021-11-19","ids":{"openalex":"https://openalex.org/W3159164431","doi":"https://doi.org/10.46586/tches.v2022.i1.414-460","mag":"3159164431"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2022.i1.414-460","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2022.i1.414-460","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9303/8869","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/9303/8869","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047790485","display_name":"Tim Fritzmann","orcid":"https://orcid.org/0000-0002-5483-4292"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Tim Fritzmann","raw_affiliation_strings":["Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018532230","display_name":"Michiel Van Beirendonck","orcid":"https://orcid.org/0000-0002-5131-8030"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Michiel Van Beirendonck","raw_affiliation_strings":["imec-COSIC KU Leuven Kasteelpark Arenberg 10 - bus 2452, 3001 Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"imec-COSIC KU Leuven Kasteelpark Arenberg 10 - bus 2452, 3001 Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102710760","display_name":"Debapriya Basu Roy","orcid":"https://orcid.org/0000-0003-4664-5237"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Debapriya Basu Roy","raw_affiliation_strings":["Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037163073","display_name":"Patrick Karl","orcid":"https://orcid.org/0000-0001-9476-9651"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Patrick Karl","raw_affiliation_strings":["Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048580096","display_name":"Thomas Schamberger","orcid":"https://orcid.org/0000-0002-6553-958X"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Schamberger","raw_affiliation_strings":["Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082347771","display_name":"Ingrid Verbauwhede","orcid":"https://orcid.org/0000-0002-0879-076X"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Ingrid Verbauwhede","raw_affiliation_strings":["imec-COSIC KU Leuven Kasteelpark Arenberg 10 - bus 2452, 3001 Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"imec-COSIC KU Leuven Kasteelpark Arenberg 10 - bus 2452, 3001 Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026512033","display_name":"Georg Sigl","orcid":"https://orcid.org/0000-0003-3152-941X"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Georg Sigl","raw_affiliation_strings":["Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany; Fraunhofer Institute for Applied and Integrated Security, Garching, Germany","Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany","Fraunhofer Institute for Applied and Integrated Security, Garching, Germany"],"affiliations":[{"raw_affiliation_string":"Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany; Fraunhofer Institute for Applied and Integrated Security, Garching, Germany","institution_ids":["https://openalex.org/I4210136922"]},{"raw_affiliation_string":"Technical University of Munich, TUM Department of Electrical and Computer Engineering, Chair of Security in Information Technology, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Fraunhofer Institute for Applied and Integrated Security, Garching, Germany","institution_ids":["https://openalex.org/I4210136922"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5047790485"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":8.6792,"has_fulltext":true,"cited_by_count":82,"citation_normalized_percentile":{"value":0.98117667,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"414","last_page":"460"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7370306253433228},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6798206567764282},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6105198860168457},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5809827446937561},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5276433825492859},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4320327341556549},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39877381920814514},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.39492860436439514},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2967812418937683},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.21249157190322876},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.13356953859329224}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7370306253433228},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6798206567764282},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6105198860168457},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5809827446937561},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5276433825492859},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4320327341556549},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39877381920814514},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.39492860436439514},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2967812418937683},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.21249157190322876},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.13356953859329224},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.46586/tches.v2022.i1.414-460","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2022.i1.414-460","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9303/8869","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/692677","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/692677","pdf_url":null,"source":{"id":"https://openalex.org/S7407055369","display_name":"Lirias","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2022 (1), (414-460)","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:3cfe8bdcb938402d9db6c5b9b93e3636","is_oa":true,"landing_page_url":"https://doaj.org/article/3cfe8bdcb938402d9db6c5b9b93e3636","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 1 (2021)","raw_type":"article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1637718","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1637718","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/504440","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/504440","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"journal article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2022.i1.414-460","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2022.i1.414-460","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9303/8869","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2111387299","display_name":null,"funder_award_id":"PhD fellowship","funder_id":"https://openalex.org/F4320321730","funder_display_name":"Fonds Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G3460248328","display_name":null,"funder_award_id":"C16/15/058","funder_id":"https://openalex.org/F4320321730","funder_display_name":"Fonds Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G4009224933","display_name":null,"funder_award_id":"C16/15/058","funder_id":"https://openalex.org/F4320322308","funder_display_name":"KU Leuven"},{"id":"https://openalex.org/G4435414571","display_name":null,"funder_award_id":"VR20192203","funder_id":"https://openalex.org/F4320327336","funder_display_name":"Vlaamse regering"},{"id":"https://openalex.org/G5242932065","display_name":null,"funder_award_id":"PhD fellow","funder_id":"https://openalex.org/F4320321730","funder_display_name":"Fonds Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G5388806002","display_name":null,"funder_award_id":"unknown","funder_id":"https://openalex.org/F4320321730","funder_display_name":"Fonds Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G7977722673","display_name":null,"funder_award_id":"VR20192203","funder_id":"https://openalex.org/F4320322308","funder_display_name":"KU Leuven"}],"funders":[{"id":"https://openalex.org/F4320321730","display_name":"Fonds Wetenschappelijk Onderzoek","ror":"https://ror.org/03qtxy027"},{"id":"https://openalex.org/F4320322308","display_name":"KU Leuven","ror":"https://ror.org/05f950310"},{"id":"https://openalex.org/F4320327336","display_name":"Vlaamse regering","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3159164431.pdf","grobid_xml":"https://content.openalex.org/works/W3159164431.grobid-xml"},"referenced_works_count":75,"referenced_works":["https://openalex.org/W96383189","https://openalex.org/W101112147","https://openalex.org/W802019357","https://openalex.org/W1592811212","https://openalex.org/W1669999576","https://openalex.org/W1736874106","https://openalex.org/W1820473293","https://openalex.org/W1873852107","https://openalex.org/W1897761346","https://openalex.org/W1906729804","https://openalex.org/W2028426157","https://openalex.org/W2061171222","https://openalex.org/W2071825329","https://openalex.org/W2098290658","https://openalex.org/W2114286085","https://openalex.org/W2132250906","https://openalex.org/W2154909745","https://openalex.org/W2261293451","https://openalex.org/W2284081067","https://openalex.org/W2293214346","https://openalex.org/W2294130056","https://openalex.org/W2466176639","https://openalex.org/W2525265324","https://openalex.org/W2571657973","https://openalex.org/W2575714403","https://openalex.org/W2612018177","https://openalex.org/W2740580365","https://openalex.org/W2757042018","https://openalex.org/W2794781100","https://openalex.org/W2805201253","https://openalex.org/W2806649078","https://openalex.org/W2935641643","https://openalex.org/W2947163592","https://openalex.org/W2951963551","https://openalex.org/W2952334088","https://openalex.org/W2953434341","https://openalex.org/W2953524555","https://openalex.org/W2961927607","https://openalex.org/W2968786179","https://openalex.org/W2970990324","https://openalex.org/W2972972326","https://openalex.org/W2995101712","https://openalex.org/W3003271350","https://openalex.org/W3011152855","https://openalex.org/W3013348637","https://openalex.org/W3016085798","https://openalex.org/W3021991761","https://openalex.org/W3023641472","https://openalex.org/W3036016265","https://openalex.org/W3038049909","https://openalex.org/W3046675985","https://openalex.org/W3089741621","https://openalex.org/W3090401323","https://openalex.org/W3092489368","https://openalex.org/W3107240409","https://openalex.org/W3115321329","https://openalex.org/W3121146673","https://openalex.org/W3126636527","https://openalex.org/W3128458782","https://openalex.org/W3135898413","https://openalex.org/W3153574097","https://openalex.org/W3159164431","https://openalex.org/W3159559383","https://openalex.org/W3178862870","https://openalex.org/W3202360051","https://openalex.org/W4206155091","https://openalex.org/W4230142583","https://openalex.org/W4233570908","https://openalex.org/W4235846187","https://openalex.org/W4238796697","https://openalex.org/W4240339612","https://openalex.org/W4246927843","https://openalex.org/W4250492047","https://openalex.org/W4254706618","https://openalex.org/W4389043045"],"related_works":["https://openalex.org/W4288754535","https://openalex.org/W2036444025","https://openalex.org/W4292072120","https://openalex.org/W2967063418","https://openalex.org/W4361230189","https://openalex.org/W3164127932","https://openalex.org/W2261986858","https://openalex.org/W4382536798","https://openalex.org/W2140348370","https://openalex.org/W3159164431"],"abstract_inverted_index":{"Side-channel":[0],"attacks":[1],"can":[2],"break":[3],"mathematically":[4],"secure":[5,122,163],"cryptographic":[6],"systems":[7],"leading":[8],"to":[9,95],"a":[10,33,48,69,85,121,135,170],"major":[11],"concern":[12],"in":[13,93],"applied":[14],"cryptography.":[15],"While":[16],"the":[17,53,111,130,153,157,161],"cryptanalysis":[18],"and":[19,58,102,142],"security":[20],"evaluation":[21],"of":[22,36,52,138,172],"Post-Quantum":[23],"Cryptography":[24],"(PQC)":[25],"have":[26],"already":[27],"received":[28],"an":[29],"increasing":[30],"research":[31],"effort,":[32],"cost":[34],"analysis":[35],"efficient":[37,101],"side-channel":[38],"countermeasures":[39],"is":[40,99,169],"still":[41],"lacking.":[42],"In":[43],"this":[44],"work,":[45],"we":[46,67,83,133],"propose":[47],"masked":[49,71,115],"HW/SW":[50],"codesign":[51],"NIST":[54,147],"PQC":[55],"finalists":[56],"Kyber":[57,141,175],"Saber,":[59],"suitable":[60,103],"for":[61,75,104,140,144,160,174,178],"their":[62],"different":[63],"characteristics.":[64],"Among":[65],"others,":[66],"present":[68],"novel":[70],"ciphertext":[72],"compression":[73],"algorithm":[74],"non-power-of-two":[76],"moduli.":[77],"To":[78],"accelerate":[79],"linear":[80],"performance":[81],"bottlenecks,":[82],"developed":[84],"generic":[86],"Number":[87],"Theoretic":[88],"Transform":[89],"(NTT)":[90],"multiplier,":[91],"which,":[92],"contrast":[94],"previously":[96],"published":[97],"accelerators,":[98],"also":[100],"schemes":[105],"not":[106],"based":[107],"on":[108],"NTT.":[109],"For":[110,152],"critical":[112],"non-linear":[113],"operations,":[114],"HW":[116],"accelerators":[117],"were":[118],"developed,":[119],"allowing":[120],"execution":[123],"using":[124],"RISC-V":[125],"instruction":[126],"set":[127],"extensions.":[128],"With":[129],"proposed":[131],"design,":[132],"achieved":[134],"cycle":[136],"count":[137],"K:214k/E:298k/D:313k":[139],"K:233k/E:312k/D:351k":[143],"Saber":[145,179],"with":[146],"Level":[148],"III":[149],"parameter":[150,155],"sets.":[151],"same":[154],"sets,":[156],"masking":[158],"overhead":[159],"first-order":[162],"decapsulation":[164],"operation":[165],"including":[166],"randomness":[167],"generation":[168],"factor":[171],"4.48":[173],"(D:1403k)and":[176],"2.60":[177],"(D:915k).":[180]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":22},{"year":2022,"cited_by_count":20},{"year":2021,"cited_by_count":5}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
