[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
RISQ-V: Tightly coupled RISC-V accelerators for post-quantum cryptography
T Fritzmann, G Sigl, J Sepúlveda - IACR Transactions on …, 2020 - tches.iacr.org
Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a
challenging task. PQC introduces new mathematical elements and operations which are …
challenging task. PQC introduces new mathematical elements and operations which are …
Masked accelerators and instruction set extensions for post-quantum cryptography
T Fritzmann, M Van Beirendonck… - IACR Transactions …, 2021 - lirias.kuleuven.be
Side-channel attacks can break mathematically secure cryptographic systems leading to a
major concern in applied cryptography. While the cryptanalysis and security evaluation of …
major concern in applied cryptography. While the cryptanalysis and security evaluation of …
High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …
community to the danger of attacks performed using quantum computers. All PQC schemes …
Lattice-based key-sharing schemes: A survey
Public-key cryptography is an indispensable component used in almost all of our present-
day digital infrastructure. However, most if not all of it is predominantly built upon hardness …
day digital infrastructure. However, most if not all of it is predominantly built upon hardness …
Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …
Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software/hardware codesign
VB Dang, F Farahmand… - … Conference on Field …, 2019 - ieeexplore.ieee.org
It has been predicted that within the next tenfifteen years, quantum computers will have
computational power sufficient to break current public-key cryptography schemes. When that …
computational power sufficient to break current public-key cryptography schemes. When that …
A high-level synthesis approach to the software/hardware codesign of NTT-based post-quantum cryptography algorithms
Due to an emerging threat of quantum computing, one of the major challenges facing the
cryptographic community is a timely transition from traditional public-key cryptosystems …
cryptographic community is a timely transition from traditional public-key cryptosystems …
Special session: The recent advance in hardware implementation of post-quantum cryptography
The recent advancement in quantum technology has initiated a new round of cryptosystem
innovation, ie, the emergence of Post-Quantum Cryptography (PQC). This new class of …
innovation, ie, the emergence of Post-Quantum Cryptography (PQC). This new class of …
High-level synthesis in implementing and benchmarking number theoretic transform in lattice-based post-quantum cryptography using software/hardware codesign
Compared to traditional hardware development methodologies, High-Level Synthesis (HLS)
offers a faster time-to-market and lower design cost at the expense of implementation …
offers a faster time-to-market and lower design cost at the expense of implementation …