Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic
Transform are fundamental building blocks for lattice-based post-quantum cryptography. In …
Transform are fundamental building blocks for lattice-based post-quantum cryptography. In …
High-speed design of post quantum cryptography with optimized hashing and multiplication
In this brief, we realize different architectural techniques for improving the performance of
post-quantum cryptography (PQC) algorithms when implemented as hardware accelerators …
post-quantum cryptography (PQC) algorithms when implemented as hardware accelerators …
Roulette: A diverse family of feasible fault attacks on masked kyber
J Delvaux - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Abstract At Indocrypt 2021, Hermelink, Pessl, and Pöppelmann presented a fault attack
against Kyber in which a system of linear inequalities over the private key is generated and …
against Kyber in which a system of linear inequalities over the private key is generated and …
Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms
Recently, the construction of cryptographic schemes based on hard lattice problems has
gained immense popularity. Apart from being quantum resistant, lattice-based cryptography …
gained immense popularity. Apart from being quantum resistant, lattice-based cryptography …
DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication
We propose a hardware-optimized design that implements a Montgomery Elliptic-curve
point multiplication Algorithm over using Lopez-Dahab projective coordinates. Moreover, we …
point multiplication Algorithm over using Lopez-Dahab projective coordinates. Moreover, we …
Performance Analysis of Postquantum Cryptographic Schemes for Securing Large-Scale Wireless Sensor Networks
J Señor, J Portilla… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Wireless sensor networks aim to collect environmental data for monitoring and decision-
making purposes, often relying on low-power sensor nodes with limited computational …
making purposes, often relying on low-power sensor nodes with limited computational …
Time-memory trade-offs for Saber+ on memory-constrained RISC-V platform
Saber is a module-lattice-based key encapsulation scheme that has been selected as a
finalist in the NIST Post-Quantum Cryptography standardization project. As Saber computes …
finalist in the NIST Post-Quantum Cryptography standardization project. As Saber computes …
Polynomial multiplication on embedded vector architectures
H Becker, JMB Mera, A Karmakar, J Yiu… - Cryptology ePrint …, 2021 - eprint.iacr.org
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive
underlying structured lattice based cryptography. Its algorithmic properties and suitability for …
underlying structured lattice based cryptography. Its algorithmic properties and suitability for …
A mathematical perspective on post-quantum cryptography
In 2016, the National Institute of Standards and Technology (NIST) announced an open
competition with the goal of finding and standardizing suitable algorithms for quantum …
competition with the goal of finding and standardizing suitable algorithms for quantum …
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices
have become ubiquitous in our digital ecosystem. These devices generate and handle a …
have become ubiquitous in our digital ecosystem. These devices generate and handle a …