CRC-oriented error detection architectures of post-quantum cryptography niederreiter key generator on FPGA

A Cintas-Canto, M Mozaffari-Kermani… - 2022 IEEE Nordic …, 2022 - ieeexplore.ieee.org
Providing error detection constructions for Internet of nano-Things in constrained
applications is of prominent importance. The Niederreiter cryptosystem falls into the category …

Reliable constructions for the key generator of code-based post-quantum cryptosystems on FPGA

AC Canto, MM Kermani, R Azarderakhsh - ACM Journal on Emerging …, 2022 - dl.acm.org
Advances in quantum computing have urged the need for cryptographic algorithms that are
low-power, low-energy, and secure against attacks that can be potentially enabled. For this …

CRC-Based Error Detection Constructions for FLT and ITA Finite Field Inversions Over GF(2m)

AC Canto, MM Kermani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Binary extension finite fields GF (2 m) have received prominent attention in the literature due
to their application in many modern public-key cryptosystems and error-correcting codes. In …

Complexity analysis and efficient implementations of bit parallel finite field multipliers based on Karatsuba-Ofman algorithm on FPGAs

G Zhou, H Michalik… - IEEE Transactions on Very …, 2009 - ieeexplore.ieee.org
This paper presents complexity analysis [both in application-specific integrated circuits
(ASICs) and on field-programmable gate arrays (FPGAs)] and efficient FPGA …

Efficient and Scalable FPGA Design of GF() Inversion for Post-Quantum Cryptosystems

A Galimberti, G Montanaro… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Post-quantum cryptosystems based on QC-MDPC codes are designed to mitigate the
security threat posed by quantum computers to traditional public-key cryptography. The …

Parallel Itoh–Tsujii multiplicative inversion algorithm for a special class of trinomials

F Rodríguez-Henríquez, G Morales-Luna… - Designs, Codes and …, 2007 - Springer
In this contribution, we derive a novel parallel formulation of the standard Itoh–Tsujii
algorithm for multiplicative inverse computation over the field GF (2 m). The main building …

Revisiting the Itoh-Tsujii inversion algorithm for FPGA platforms

C Rebeiro, SS Roy, DS Reddy… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The Itoh-Tsujii multiplicative inverse algorithm (ITA) forms an integral component of several
cryptographic implementations such as elliptic curve cryptography. For binary fields …

High‐performance and high‐speed implementation of polynomial basis Itoh–Tsujii inversion algorithm over GF(2m)

B Rashidi, R Rezaeian Farashahi… - IET Information …, 2017 - Wiley Online Library
In this study high‐performance and high‐speed field‐programmable gate array (FPGA)
implementations of polynomial basis Itoh–Tsujii inversion algorithm (ITA) over GF (2m) …

Reconfigurable hardware architecture for authenticated key agreement protocol over binary edwards curve

NN Anandakumar, MPL Das, SK Sanadhya… - ACM Transactions on …, 2018 - dl.acm.org
In this article, we present a high-performance hardware architecture for Elliptic curve based
(authenticated) key agreement protocol “Elliptic Curve Menezes, Qu and …

Concrete quantum cryptanalysis of binary elliptic curves via addition chain

R Taguchi, A Takayasu - Cryptographers' Track at the RSA Conference, 2023 - Springer
Thus far, several papers reported concrete resource estimates of Shor's quantum algorithm
for solving the elliptic curve discrete logarithm problem (ECDLP). In this paper, we study …