A survey of post-quantum cryptography: Start of a new race
Information security is a fundamental and urgent issue in the digital transformation era.
Cryptographic techniques and digital signatures have been applied to protect and …
Cryptographic techniques and digital signatures have been applied to protect and …
Hardware Circuits and Systems Design for Post-Quantum Cryptography–A Tutorial Brief
Due to the increasing threats from possible large-scale quantum computers, post-quantum
cryptography (PQC) has drawn significant attention from various communities recently. In …
cryptography (PQC) has drawn significant attention from various communities recently. In …
[PDF][PDF] Novel Schoolbook-Originated Polynomial Multiplication Accelerators for NTRU-based PQC
NTRU (Number Theory Research Unit)-based postquantum cryptography (PQC) has
recently drawn significant attention from the research communities, eg, the National Institute …
recently drawn significant attention from the research communities, eg, the National Institute …
Efficient hardware RNS decomposition for post-quantum signature scheme FALCON
The recently announced National Institute of Standards and Technology (NIST) Post-
quantum cryptography (PQC) third-round standardization process has released its …
quantum cryptography (PQC) third-round standardization process has released its …
A lightweight BRLWE-based post-quantum cryptosystem with side-channel resilience for IoT security
The rapid advancement of quantum computing poses a significant threat to conventional
cryptographic systems, particularly in the context of Internet of Things (IoT) security. This …
cryptographic systems, particularly in the context of Internet of Things (IoT) security. This …
HSPA: High-Throughput Sparse Polynomial Multiplication for Code-based Post-Quantum Cryptography
Increasing attention has been paid to code-based post-quantum cryptography (PQC)
schemes, eg, HQC (Hamming Quasi-Cyclic) and BIKE (Bit Flipping Key Encapsulation) …
schemes, eg, HQC (Hamming Quasi-Cyclic) and BIKE (Bit Flipping Key Encapsulation) …
APACHE: A Processing-Near-Memory Architecture for Multi-Scheme Fully Homomorphic Encryption
Fully Homomorphic Encryption (FHE) allows one to outsource computation over encrypted
data to untrusted servers without worrying about data breaching. Since FHE is known to be …
data to untrusted servers without worrying about data breaching. Since FHE is known to be …
[HTML][HTML] Integration in CNN and FIR filters for improved computational efficiency in signal processing
A Sridevi, A Sathiya - Ain Shams Engineering Journal, 2025 - Elsevier
This research paper explains the design process of the 8× 8 Vedic multipliers based on the
“UrdhvaTiryagbhyam” Sutra in combination with the “Nikhilam Sutra “and the Karatsuba …
“UrdhvaTiryagbhyam” Sutra in combination with the “Nikhilam Sutra “and the Karatsuba …
KyberMat: Efficient Accelerator for Matrix-Vector Polynomial Multiplication in CRYSTALS-Kyber Scheme via NTT and Polyphase Decomposition
CRYSTAL-Kyber (Kyber) is one of the post-quantum cryptography (PQC) key-encapsulation
mechanism (KEM) schemes selected during the standardization process. This paper …
mechanism (KEM) schemes selected during the standardization process. This paper …
HELP: Highly Efficient and Low-Latency Hardware Accelerator for Integer Polynomial Multiplication
Integer polynomial multiplication has been frequently used in post-quantum cryptography
(PQC) schemes. In particular, unequal-sized integer polynomial multiplication, ie, the …
(PQC) schemes. In particular, unequal-sized integer polynomial multiplication, ie, the …