{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:57:41Z","timestamp":1743011861864,"version":"3.37.3"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1661557"],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000161","name":"NIST","doi-asserted-by":"crossref","award":["60NANB16D246"],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2019,9,1]]},"DOI":"10.1109\/tdsc.2017.2723891","type":"journal-article","created":{"date-parts":[[2017,7,6]],"date-time":"2017-07-06T18:08:55Z","timestamp":1499364535000},"page":"902-912","source":"Crossref","is-referenced-by-count":65,"title":["Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6715-2477","authenticated-orcid":false,"given":"Amir","family":"Jalali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6921-6868","authenticated-orcid":false,"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4513-3109","authenticated-orcid":false,"given":"Mehran Mozaffari","family":"Kermani","sequence":"additional","affiliation":[]},{"given":"David","family":"Jao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Post-quantum key exchange-a new hope","author":"alkim","year":"2015","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.40"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0090-x"},{"key":"ref32","first-page":"311","article-title":"Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor","author":"barrett","year":"1986","journal-title":"Proc Proc Int Conf Theory Appl Cryptographic Techn"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_18"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_5"},{"key":"ref36","first-page":"104","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Proc Annu Int Cryptology Conf"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0084-8"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_16"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13039-2_25"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11533719_44"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.08.030"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2898420.2898421"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9002-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2012-0015"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_21"},{"article-title":"Efficient implementations of a quantum-resistant key-exchange protocol on embedded systems","year":"2014","author":"azarderakhsh","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_6"},{"year":"2016","key":"ref19","article-title":"ARM — Q2 2016 Earnings Release"},{"key":"ref28","first-page":"328","article-title":"Montgomery modular multiplication on ARM-NEON revisited","author":"seo","year":"2014","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_4"},{"year":"2016","key":"ref27","article-title":"Cortex-A57 Software Optimization Guide"},{"key":"ref3","first-page":"114","article-title":"A public-key cryptosystem based on algebraic","volume":"4244","author":"mceliece","year":"1978","journal-title":"Coding Theory"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref29","article-title":"Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation","author":"seo","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"article-title":"Secrecy, authentication, and public key systems","year":"1979","author":"merkle","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"ref7","article-title":"Public-key cryptosystem based on isogenies","volume":"2006","author":"rostovtsev","year":"2006","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-0010-1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09494-6"},{"key":"ref22","first-page":"269","article-title":"Constructing supersingular elliptic curves","volume":"1","author":"br\u00f6ker","year":"2009","journal-title":"Electron J Combin Number Theory"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF01404549"},{"key":"ref42","article-title":"Post-quantum key exchange for the internet and the open quantum safe project","author":"stebila","year":"2016","journal-title":"Cryptology ePrint Archive Report 2016\/1017 Tech Rep"},{"key":"ref24","article-title":"Fast arithmetic modulo $2^xp^y\\pm 1$2xpy±1","author":"bos","year":"2016","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978425"},{"key":"ref23","first-page":"238a","article-title":"Isogénies entre courbes elliptiques","volume":"273","author":"v\u00e9lu","year":"1971","journal-title":"CR Acad Sci Paris Sér AB"},{"year":"2016","key":"ref26","article-title":"ARMv8 library for compressing and decompressing SIDH keys"},{"year":"2017","key":"ref25","article-title":"Supersingular Isogeny-based Diffie-Hellman Key Exchange (SIDH) software v2.2"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/8821488\/07970184.pdf?arnumber=7970184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:48:35Z","timestamp":1657745315000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7970184\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,1]]},"references-count":42,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2017.2723891","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2019,9,1]]}}}