A compact hardware implementation of CCA-secure key exchange mechanism CRYSTALS-KYBER on FPGA
Y Xing, S Li - IACR Transactions on Cryptographic Hardware and …, 2021 - tches.iacr.org
Post-quantum cryptosystems should be prepared before the advent of powerful quantum
computers to ensure information secure in our daily life. In 2016 a post-quantum …
computers to ensure information secure in our daily life. In 2016 a post-quantum …
Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols
U Banerjee, TS Ukyab, AP Chandrakasan - arXiv preprint arXiv …, 2019 - arxiv.org
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be
rendered insecure by Shor's algorithm when large-scale quantum computers are built …
rendered insecure by Shor's algorithm when large-scale quantum computers are built …
Post-quantum security: Opportunities and challenges
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …
also for information integrity verification, non-repudiation, authentication, and other aspects …
Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs
In this work, we demonstrate generic and practical EM side-channel assisted chosen
ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key …
ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key …
Lattice-based cryptography for IoT in a quantum world: Are we ready?
A Khalid, S McCarthy, M O'Neill… - 2019 IEEE 8th …, 2019 - ieeexplore.ieee.org
The impending realization of scalable quantum computers has led to active research in Post
Quantum Cryptography (PQC). The challenge is harder for embedded IoT (edge) devices …
Quantum Cryptography (PQC). The challenge is harder for embedded IoT (edge) devices …
High-speed instruction-set coprocessor for lattice-based key encapsulation mechanism: Saber in hardware
In this paper, we present an instruction set coprocessor architecture for lattice-based
cryptography and implement the module lattice-based post-quantum key encapsulation …
cryptography and implement the module lattice-based post-quantum key encapsulation …
Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic
Transform are fundamental building blocks for lattice-based post-quantum cryptography. In …
Transform are fundamental building blocks for lattice-based post-quantum cryptography. In …
[PDF][PDF] pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4
This paper presents pqm4–a testing and benchmarking framework for the ARM Cortex-M4. It
makes use of a widely available discovery board with 196 KiB of memory and 1 MiB flash …
makes use of a widely available discovery board with 196 KiB of memory and 1 MiB flash …
A side-channel-resistant implementation of SABER
The candidates for the NIST Post-Quantum Cryptography standardization have undergone
extensive studies on efficiency and theoretical security, but research on their side-channel …
extensive studies on efficiency and theoretical security, but research on their side-channel …
Nist post-quantum cryptography-a hardware evaluation study
Experts forecast that quantum computers can break classical cryptographic algorithms.
Scientists are developing post quantum cryptographic (PQC) algorithms, that are …
Scientists are developing post quantum cryptographic (PQC) algorithms, that are …