A unified cryptoprocessor for lattice-based signature and key-exchange

A Aikata, AC Mert, D Jacquemin, A Das… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
We propose design methodologies for building a compact, unified and programmable
cryptoprocessor architecture that computes post-quantum key agreement and digital …

High-speed design of post quantum cryptography with optimized hashing and multiplication

M Imran, A Aikata, SS Roy… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this brief, we realize different architectural techniques for improving the performance of
post-quantum cryptography (PQC) algorithms when implemented as hardware accelerators …

Scabbard: An exploratory study on hardware aware design choices of learning with rounding-based key encapsulation mechanisms

S Kundu, Q Norga, A Karmakar… - ACM Transactions on …, 2024 - dl.acm.org
Recently, the construction of cryptographic schemes based on hard lattice problems has
gained immense popularity. Apart from being quantum resistant, lattice-based cryptography …

TCPM: A reconfigurable and efficient Toom-Cook-based polynomial multiplier over rings using a novel compressed postprocessing algorithm

J Wang, C Yang, F Zhang, Y Meng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Polynomial multiplication over rings is a significant bottleneck of ring learning with error
(RLWE)-based encryption. To speed it up, three algorithms are widely used, ie, number …

A high-throughput Toom-Cook-4 polynomial multiplier for lattice-based cryptography using a novel winograd-schoolbook algorithm

J Wang, C Yang, F Zhang, Y Meng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Polynomial multiplication over rings is a significant bottleneck of ring learning with error
(RLWE)-based encryption. To speed it up, the number theoretic transform (NTT) and Toom …

A flexible and high-performance lattice-based post-quantum crypto secure coprocessor

A Li, D Liu, C Zhang, X Li, S Yang, X Liu… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Progress of quantum computing technology seriously threaten the industrial information
security based on traditional public-key cryptosystem. Thus, the cryptosystem with anti …

A flexible instruction-based post-quantum cryptographic processor with modulus reconfigurable arithmetic unit for module LWR&E

A Li, D Liu, X Li, T Huang, S Yang… - 2022 IEEE Asian Solid …, 2022 - ieeexplore.ieee.org
Post-quantum cryptography (PQC) uses novel difficult mathematical principles to defend the
cracking of quantum computers which threaten the traditional crypto system such as Rivest …

Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications

A Aljaedi, SS Jamal, M Rashid, AR Alharbi, M Alotaibi… - Applied Sciences, 2023 - mdpi.com
This paper proposes a novel hardware design for a compact crypto processor devoted to
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …

Saber with Hybrid Striding Toom Cook-based Multiplier: Implementation Using Open-Source Tool Flow and Industry Standard Chip Design Tools

MN Abbasi, AR Aslam, MAB Altaf, W Saadeh - IEEE Access, 2024 - ieeexplore.ieee.org
Quantum computers are a significant threat to the existing cryptography algorithms. The
Saber is a lattice-based post-quantum cryptographic or quantum-safe algorithm designed as …

MBSNTT: A Highly Parallel Digital In-Memory Bit-Serial Number Theoretic Transform Accelerator

A Pakala, Z Chen, K Yang - IEEE Transactions on Very Large …, 2024 - ieeexplore.ieee.org
Conventional cryptographic systems protect the data security during communication but give
third-party cloud operators complete access to compute decrypted user data. Homomorphic …