A unified cryptoprocessor for lattice-based signature and key-exchange
We propose design methodologies for building a compact, unified and programmable
cryptoprocessor architecture that computes post-quantum key agreement and digital …
cryptoprocessor architecture that computes post-quantum key agreement and digital …
High-speed design of post quantum cryptography with optimized hashing and multiplication
In this brief, we realize different architectural techniques for improving the performance of
post-quantum cryptography (PQC) algorithms when implemented as hardware accelerators …
post-quantum cryptography (PQC) algorithms when implemented as hardware accelerators …
Scabbard: An exploratory study on hardware aware design choices of learning with rounding-based key encapsulation mechanisms
Recently, the construction of cryptographic schemes based on hard lattice problems has
gained immense popularity. Apart from being quantum resistant, lattice-based cryptography …
gained immense popularity. Apart from being quantum resistant, lattice-based cryptography …
TCPM: A reconfigurable and efficient Toom-Cook-based polynomial multiplier over rings using a novel compressed postprocessing algorithm
J Wang, C Yang, F Zhang, Y Meng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Polynomial multiplication over rings is a significant bottleneck of ring learning with error
(RLWE)-based encryption. To speed it up, three algorithms are widely used, ie, number …
(RLWE)-based encryption. To speed it up, three algorithms are widely used, ie, number …
A high-throughput Toom-Cook-4 polynomial multiplier for lattice-based cryptography using a novel winograd-schoolbook algorithm
J Wang, C Yang, F Zhang, Y Meng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Polynomial multiplication over rings is a significant bottleneck of ring learning with error
(RLWE)-based encryption. To speed it up, the number theoretic transform (NTT) and Toom …
(RLWE)-based encryption. To speed it up, the number theoretic transform (NTT) and Toom …
A flexible and high-performance lattice-based post-quantum crypto secure coprocessor
A Li, D Liu, C Zhang, X Li, S Yang, X Liu… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Progress of quantum computing technology seriously threaten the industrial information
security based on traditional public-key cryptosystem. Thus, the cryptosystem with anti …
security based on traditional public-key cryptosystem. Thus, the cryptosystem with anti …
A flexible instruction-based post-quantum cryptographic processor with modulus reconfigurable arithmetic unit for module LWR&E
A Li, D Liu, X Li, T Huang, S Yang… - 2022 IEEE Asian Solid …, 2022 - ieeexplore.ieee.org
Post-quantum cryptography (PQC) uses novel difficult mathematical principles to defend the
cracking of quantum computers which threaten the traditional crypto system such as Rivest …
cracking of quantum computers which threaten the traditional crypto system such as Rivest …
Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications
This paper proposes a novel hardware design for a compact crypto processor devoted to
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …
Saber with Hybrid Striding Toom Cook-based Multiplier: Implementation Using Open-Source Tool Flow and Industry Standard Chip Design Tools
Quantum computers are a significant threat to the existing cryptography algorithms. The
Saber is a lattice-based post-quantum cryptographic or quantum-safe algorithm designed as …
Saber is a lattice-based post-quantum cryptographic or quantum-safe algorithm designed as …
MBSNTT: A Highly Parallel Digital In-Memory Bit-Serial Number Theoretic Transform Accelerator
Conventional cryptographic systems protect the data security during communication but give
third-party cloud operators complete access to compute decrypted user data. Homomorphic …
third-party cloud operators complete access to compute decrypted user data. Homomorphic …