Instruction-set accelerated implementation of CRYSTALS-Kyber
M Bisheh-Niasar, R Azarderakhsh… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Large scale quantum computers will break classical public-key cryptography protocols by
quantum algorithms such as Shor's algorithm. Hence, designing quantum-safe …
quantum algorithms such as Shor's algorithm. Hence, designing quantum-safe …
ISA Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on RISC-V.
We present and evaluate a custom extension to the RISC-V instruction setfor finite field
arithmetic. The result serves as a very compact approach to software-hardware co-design of …
arithmetic. The result serves as a very compact approach to software-hardware co-design of …
Fixslicing AES-like ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V
A Adomnicai, T Peyrin - IACR Transactions on …, 2021 - ojs.ub.ruhr-uni-bochum.de
The fixslicing implementation strategy was originally introduced as a new representation for
the hardware-oriented GIFT block cipher to achieve very efficient software constant-time …
the hardware-oriented GIFT block cipher to achieve very efficient software constant-time …
Tornado: Automatic generation of probing-secure masked bitsliced implementations
Cryptographic implementations deployed in real world devices often aim at (provable)
security against the powerful class of side-channel attacks while keeping reasonable …
security against the powerful class of side-channel attacks while keeping reasonable …
The design of scalar AES instruction set extensions for RISC-V
B Marshall, GR Newell, D Page… - IACR …, 2021 - moving-the-social.ub.rub.de
Secure, efficient execution of AES is an essential requirement on most computing platforms.
Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a …
Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a …
Symmetric cryptography on risc-v: Performance evaluation of standardized algorithms
G Nişancı, PG Flikkema, T Yalçın - Cryptography, 2022 - mdpi.com
The ever-increasing need for securing computing systems using cryptographic algorithms is
spurring interest in the efficient implementation of common algorithms. While the algorithms …
spurring interest in the efficient implementation of common algorithms. While the algorithms …
A survey on risc-v security: Hardware and architecture
T Lu - arXiv preprint arXiv:2107.04175, 2021 - arxiv.org
The Internet of Things (IoT) is an ongoing technological revolution. Embedded processors
are the processing engines of smart IoT devices. For decades, these processors were …
are the processing engines of smart IoT devices. For decades, these processors were …
VLSI design of Advanced-Features AES CryptoProcessor in the framework of the European Processor Initiative
P Nannipieri, S Di Matteo, L Baldanzi… - … Transactions on Very …, 2021 - ieeexplore.ieee.org
This article presents a cryptographic hardware (HW) accelerator supporting multiple
advanced encryption standard (AES)-based block cipher modes, including the more …
advanced encryption standard (AES)-based block cipher modes, including the more …
Accelerated risc-v for sike
R Elkhatib, R Azarderakhsh… - 2021 IEEE 28th …, 2021 - ieeexplore.ieee.org
Software implementations of cryptographic algorithms are slow but highly flexible and
relatively easy to implement. On the other hand, hardware implementations are usually …
relatively easy to implement. On the other hand, hardware implementations are usually …
RISC-V Galois field ISA extension for non-binary error-correction codes and classical and post-quantum cryptography
Due to the recent advances in new communication standards, such as 5G New Radio and
beyond 5G, and in quantum computing and communications, new requirements for …
beyond 5G, and in quantum computing and communications, new requirements for …