[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

RISQ-V: Tightly coupled RISC-V accelerators for post-quantum cryptography

T Fritzmann, G Sigl, J Sepúlveda - IACR Transactions on …, 2020 - tches.iacr.org
Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a
challenging task. PQC introduces new mathematical elements and operations which are …

Masked accelerators and instruction set extensions for post-quantum cryptography

T Fritzmann, M Van Beirendonck… - IACR Transactions …, 2021 - lirias.kuleuven.be
Side-channel attacks can break mathematically secure cryptographic systems leading to a
major concern in applied cryptography. While the cryptanalysis and security evaluation of …

High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber

VB Dang, K Mohajerani, K Gaj - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …

Lattice-based key-sharing schemes: A survey

P Ravi, J Howe, A Chattopadhyay… - ACM Computing Surveys …, 2021 - dl.acm.org
Public-key cryptography is an indispensable component used in almost all of our present-
day digital infrastructure. However, most if not all of it is predominantly built upon hardness …

Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …

VB Dang, F Farahmand, M Andrzejczak… - … ePrint Archive: Report …, 2020 - par.nsf.gov
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …

Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software/hardware codesign

VB Dang, F Farahmand… - … Conference on Field …, 2019 - ieeexplore.ieee.org
It has been predicted that within the next tenfifteen years, quantum computers will have
computational power sufficient to break current public-key cryptography schemes. When that …

A high-level synthesis approach to the software/hardware codesign of NTT-based post-quantum cryptography algorithms

DT Nguyen, VB Dang, K Gaj - 2019 International Conference …, 2019 - ieeexplore.ieee.org
Due to an emerging threat of quantum computing, one of the major challenges facing the
cryptographic community is a timely transition from traditional public-key cryptosystems …

Special session: The recent advance in hardware implementation of post-quantum cryptography

J Xie, K Basu, K Gaj, U Guin - 2020 IEEE 38th VLSI Test …, 2020 - ieeexplore.ieee.org
The recent advancement in quantum technology has initiated a new round of cryptosystem
innovation, ie, the emergence of Post-Quantum Cryptography (PQC). This new class of …

High-level synthesis in implementing and benchmarking number theoretic transform in lattice-based post-quantum cryptography using software/hardware codesign

DT Nguyen, VB Dang, K Gaj - … Symposium, ARC 2020, Toledo, Spain, April …, 2020 - Springer
Compared to traditional hardware development methodologies, High-Level Synthesis (HLS)
offers a faster time-to-market and lower design cost at the expense of implementation …