A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Error detection architectures for hardware/software co-design approaches of number-theoretic transform

A Sarker, AC Canto, MM Kermani… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Number-theoretic transform (NTT) is an efficient polynomial multiplication technique of lattice-
based post-quantum cryptography including Kyber which is standardized as the NIST key …

Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …

VB Dang, F Farahmand, M Andrzejczak… - … ePrint Archive: Report …, 2020 - par.nsf.gov
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …

Special session: The recent advance in hardware implementation of post-quantum cryptography

J Xie, K Basu, K Gaj, U Guin - 2020 IEEE 38th VLSI Test …, 2020 - ieeexplore.ieee.org
The recent advancement in quantum technology has initiated a new round of cryptosystem
innovation, ie, the emergence of Post-Quantum Cryptography (PQC). This new class of …

Hls-based hw/sw co-design of the post-quantum classic mceliece cryptosystem

V Kostalabros, J Ribes-González… - … Conference on Field …, 2021 - ieeexplore.ieee.org
While quantum computers are rapidly becoming more powerful, the current cryptographic
infrastructure is imminently threatened. In a preventive manner, the US National Institute of …

A compact full hardware implementation of PQC algorithm NTRU

Z Qin, R Tong, X Wu, G Bai, L Wu… - … , Information System and …, 2021 - ieeexplore.ieee.org
With the emergence and development of quantum computers, the traditional public-key
cryptography (PKC) is facing the risk of being cracked. In order to resist quantum attacks and …

High Throughput Acceleration of Scabbard Key Exchange and Key Encapsulation Mechanism Using Tensor Core on GPU for IoT Applications

MA Hafeez, WK Lee, A Karmakar… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
High throughput key encapsulations and decapsulations are needed by Internet of Things
(IoT) applications in order to simultaneously process a multitude of small data in secure …

[图书][B] Statistical trend analysis of physically unclonable functions: An approach via text mining

B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra - 2021 - taylorfrancis.com
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain
parameters of materials, waves, or devices into random and unique signals. They have …

Timing-optimized hardware implementation to accelerate polynomial multiplication in the ntru algorithm

E Camacho-Ruiz, S Sánchez-Solano, P Brox… - ACM Journal on …, 2021 - dl.acm.org
Post-quantum cryptographic algorithms have emerged to secure communication channels
between electronic devices faced with the advent of quantum computers. The performance …

Timing-attack-resistant acceleration of ntru round 3 encryption on resource-constrained embedded systems

E Camacho-Ruiz, MC Martínez-Rodríguez… - Cryptography, 2023 - mdpi.com
The advent of quantum computing with high processing capabilities will enable brute force
attacks in short periods of time, threatening current secure communication channels. To …