Post-quantum security: Opportunities and challenges

S Li, Y Chen, L Chen, J Liao, C Kuang, K Li, W Liang… - Sensors, 2023 - mdpi.com
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …

A transformative shift toward blockchain‐based IoT environments: Consensus, smart contracts, and future directions

C Trivedi, UP Rao, K Parmar… - Security and …, 2023 - Wiley Online Library
Abstract Recently, Internet‐of‐Things (IoT) based applications have shifted from centralized
infrastructures to decentralized ecosystems, owing to user data's security and privacy …

High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography

M Bisheh-Niasar, R Azarderakhsh… - 2021 IEEE 28th …, 2021 - ieeexplore.ieee.org
This paper demonstrates an architecture for accelerating the polynomial multiplication using
number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST …

Fast strategies for the implementation of SIKE round 3 on ARM Cortex-M4

M Anastasova, R Azarderakhsh… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Supersingular Isogeny Key Encapsulation mechanism (SIKE) is the only post-quantum
key encapsulation protocol based on elliptic curves and isogeny maps between them …

[HTML][HTML] Post-quantum cryptography Algorithm's standardization and performance analysis

M Kumar - Array, 2022 - Elsevier
Quantum computer is no longer a hypothetical idea. It is the world's most important
technology and there is a race among countries to get supremacy in quantum technology. It …

Time-efficient finite field microarchitecture design for curve448 and ed448 on cortex-M4

M Anastasova, R Azarderakhsh, MM Kermani… - … on Information Security …, 2022 - Springer
The elliptic curve family of schemes has the lowest computational latency, memory use,
energy consumption, and bandwidth requirements, making it the most preferred public key …

Faster NTRU on ARM cortex-M4 with TMVP-based multiplication

IK Paksoy, M Cenk - … Transactions on Circuits and Systems I …, 2022 - ieeexplore.ieee.org
This paper focuses on speeding up NTRU-one of the lattice-based finalists of the NIST PQC
competition-by improving the ring multiplication. The Number Theoretic Transform (NTT) …

LELBC: A low energy lightweight block cipher for smart agriculture

Q Song, L Li, X Huang - Internet of Things, 2024 - Elsevier
The massive collection and transmission of various crop and livestock data in smart
agriculture leads to serious security concerns. Furthermore, many Internet of Things (IoT) …

Curve448 on 32-bit ARM Cortex-M4

H Seo, R Azarderakhsh - International Conference on Information Security …, 2020 - Springer
Public key cryptography is widely used in key exchange and digital signature protocols.
Public key cryptography requires expensive primitive operations, such as finite-field and …

Time-optimal design of finite field arithmetic for sike on cortex-m4

M Anastasova, R Azarderakhsh… - … Conference on Information …, 2022 - Springer
The advances in quantum technologies and the fast move toward quantum computing are
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …