A survey of post-quantum cryptography: Start of a new race

DT Dam, TH Tran, VP Hoang, CK Pham, TT Hoang - Cryptography, 2023 - mdpi.com
Information security is a fundamental and urgent issue in the digital transformation era.
Cryptographic techniques and digital signatures have been applied to protect and …

Hardware Circuits and Systems Design for Post-Quantum Cryptography–A Tutorial Brief

J Xie, W Zhao, H Lee, DB Roy… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Due to the increasing threats from possible large-scale quantum computers, post-quantum
cryptography (PQC) has drawn significant attention from various communities recently. In …

[PDF][PDF] Novel Schoolbook-Originated Polynomial Multiplication Accelerators for NTRU-based PQC

Y Tu, S Bai, J Xiong, J Xie - 5th NIST PQC Standardization Conference, 2024 - csrc.nist.gov
NTRU (Number Theory Research Unit)-based postquantum cryptography (PQC) has
recently drawn significant attention from the research communities, eg, the National Institute …

Efficient hardware RNS decomposition for post-quantum signature scheme FALCON

S Coulon, P He, T Bao, J Xie - 2023 57th Asilomar Conference …, 2023 - ieeexplore.ieee.org
The recently announced National Institute of Standards and Technology (NIST) Post-
quantum cryptography (PQC) third-round standardization process has released its …

A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security

C Ma, A Shankar, S Kumari, CM Chen - Internet of Things, 2024 - Elsevier
The rapid advancement of quantum computing poses a significant threat to conventional
cryptographic systems, particularly in the context of Internet of Things (IoT) security. This …

HSPA: High-Throughput Sparse Polynomial Multiplication for Code-based Post-Quantum Cryptography

P He, Y Tu, T Bao, ÇÇ Koç, J Xie - ACM Transactions on Embedded …, 2024 - dl.acm.org
Increasing attention has been paid to code-based post-quantum cryptography (PQC)
schemes, eg, HQC (Hamming Quasi-Cyclic) and BIKE (Bit Flipping Key Encapsulation) …

APACHE: A Processing-Near-Memory Architecture for Multi-Scheme Fully Homomorphic Encryption

L Ding, S Bian, P He, Y Xu, G Qu, J Zhang - arXiv preprint arXiv …, 2024 - arxiv.org
Fully Homomorphic Encryption (FHE) allows one to outsource computation over encrypted
data to untrusted servers without worrying about data breaching. Since FHE is known to be …

[HTML][HTML] Integration in CNN and FIR filters for improved computational efficiency in signal processing

A Sridevi, A Sathiya - Ain Shams Engineering Journal, 2025 - Elsevier
This research paper explains the design process of the 8× 8 Vedic multipliers based on the
“UrdhvaTiryagbhyam” Sutra in combination with the “Nikhilam Sutra “and the Karatsuba …

KyberMat: Efficient Accelerator for Matrix-Vector Polynomial Multiplication in CRYSTALS-Kyber Scheme via NTT and Polyphase Decomposition

W Tan, Y Lao, KK Parhi - 2023 IEEE/ACM International …, 2023 - ieeexplore.ieee.org
CRYSTAL-Kyber (Kyber) is one of the post-quantum cryptography (PQC) key-encapsulation
mechanism (KEM) schemes selected during the standardization process. This paper …

HELP: Highly Efficient and Low-Latency Hardware Accelerator for Integer Polynomial Multiplication

P He, T Bao, ÇK Koç, J Xie - 2024 IEEE Computer Society …, 2024 - ieeexplore.ieee.org
Integer polynomial multiplication has been frequently used in post-quantum cryptography
(PQC) schemes. In particular, unequal-sized integer polynomial multiplication, ie, the …