A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
Error detection architectures for hardware/software co-design approaches of number-theoretic transform
Number-theoretic transform (NTT) is an efficient polynomial multiplication technique of lattice-
based post-quantum cryptography including Kyber which is standardized as the NIST key …
based post-quantum cryptography including Kyber which is standardized as the NIST key …
Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …
Special session: The recent advance in hardware implementation of post-quantum cryptography
The recent advancement in quantum technology has initiated a new round of cryptosystem
innovation, ie, the emergence of Post-Quantum Cryptography (PQC). This new class of …
innovation, ie, the emergence of Post-Quantum Cryptography (PQC). This new class of …
Hls-based hw/sw co-design of the post-quantum classic mceliece cryptosystem
V Kostalabros, J Ribes-González… - … Conference on Field …, 2021 - ieeexplore.ieee.org
While quantum computers are rapidly becoming more powerful, the current cryptographic
infrastructure is imminently threatened. In a preventive manner, the US National Institute of …
infrastructure is imminently threatened. In a preventive manner, the US National Institute of …
A compact full hardware implementation of PQC algorithm NTRU
Z Qin, R Tong, X Wu, G Bai, L Wu… - … , Information System and …, 2021 - ieeexplore.ieee.org
With the emergence and development of quantum computers, the traditional public-key
cryptography (PKC) is facing the risk of being cracked. In order to resist quantum attacks and …
cryptography (PKC) is facing the risk of being cracked. In order to resist quantum attacks and …
High Throughput Acceleration of Scabbard Key Exchange and Key Encapsulation Mechanism Using Tensor Core on GPU for IoT Applications
High throughput key encapsulations and decapsulations are needed by Internet of Things
(IoT) applications in order to simultaneously process a multitude of small data in secure …
(IoT) applications in order to simultaneously process a multitude of small data in secure …
[图书][B] Statistical trend analysis of physically unclonable functions: An approach via text mining
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain
parameters of materials, waves, or devices into random and unique signals. They have …
parameters of materials, waves, or devices into random and unique signals. They have …
Timing-optimized hardware implementation to accelerate polynomial multiplication in the ntru algorithm
Post-quantum cryptographic algorithms have emerged to secure communication channels
between electronic devices faced with the advent of quantum computers. The performance …
between electronic devices faced with the advent of quantum computers. The performance …
Timing-attack-resistant acceleration of ntru round 3 encryption on resource-constrained embedded systems
E Camacho-Ruiz, MC Martínez-Rodríguez… - Cryptography, 2023 - mdpi.com
The advent of quantum computing with high processing capabilities will enable brute force
attacks in short periods of time, threatening current secure communication channels. To …
attacks in short periods of time, threatening current secure communication channels. To …