A compact hardware implementation of CCA-secure key exchange mechanism CRYSTALS-KYBER on FPGA

Y Xing, S Li - IACR Transactions on Cryptographic Hardware and …, 2021 - tches.iacr.org
Post-quantum cryptosystems should be prepared before the advent of powerful quantum
computers to ensure information secure in our daily life. In 2016 a post-quantum …

Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols

U Banerjee, TS Ukyab, AP Chandrakasan - arXiv preprint arXiv …, 2019 - arxiv.org
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be
rendered insecure by Shor's algorithm when large-scale quantum computers are built …

Post-quantum security: Opportunities and challenges

S Li, Y Chen, L Chen, J Liao, C Kuang, K Li, W Liang… - Sensors, 2023 - mdpi.com
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …

Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs

P Ravi, SS Roy, A Chattopadhyay… - IACR transactions on …, 2020 - tches.iacr.org
In this work, we demonstrate generic and practical EM side-channel assisted chosen
ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key …

Lattice-based cryptography for IoT in a quantum world: Are we ready?

A Khalid, S McCarthy, M O'Neill… - 2019 IEEE 8th …, 2019 - ieeexplore.ieee.org
The impending realization of scalable quantum computers has led to active research in Post
Quantum Cryptography (PQC). The challenge is harder for embedded IoT (edge) devices …

High-speed instruction-set coprocessor for lattice-based key encapsulation mechanism: Saber in hardware

SS Roy, A Basso - IACR Transactions on Cryptographic Hardware …, 2020 - tches.iacr.org
In this paper, we present an instruction set coprocessor architecture for lattice-based
cryptography and implement the module lattice-based post-quantum key encapsulation …

Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication

C Mujdei, L Wouters, A Karmakar, A Beckers… - ACM Transactions on …, 2024 - dl.acm.org
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic
Transform are fundamental building blocks for lattice-based post-quantum cryptography. In …

[PDF][PDF] pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4

MJ Kannwischer, J Rijneveld, P Schwabe, K Stoffelen - 2019 - repository.ubn.ru.nl
This paper presents pqm4–a testing and benchmarking framework for the ARM Cortex-M4. It
makes use of a widely available discovery board with 196 KiB of memory and 1 MiB flash …

A side-channel-resistant implementation of SABER

MV Beirendonck, JP D'anvers, A Karmakar… - ACM Journal on …, 2021 - dl.acm.org
The candidates for the NIST Post-Quantum Cryptography standardization have undergone
extensive studies on efficiency and theoretical security, but research on their side-channel …

Nist post-quantum cryptography-a hardware evaluation study

K Basu, D Soni, M Nabeel, R Karri - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Experts forecast that quantum computers can break classical cryptographic algorithms.
Scientists are developing post quantum cryptographic (PQC) algorithms, that are …