Field programmable gate array applications—A scientometric review
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …
that can be configured by a customer after manufacturing to perform from a simple logic gate …
Comparative study of Keccak SHA-3 implementations
This paper conducts an extensive comparative study of state-of-the-art solutions for
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …
High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …
community to the danger of attacks performed using quantum computers. All PQC schemes …
[KSIĄŻKA][B] About cryptographic engineering
ÇK Koç - 2009 - Springer
Cryptographic engineering is the name we have coined to refer to the theory and practice of
engineering of cryptographic systems, ie, encryption and decryption engines, digital …
engineering of cryptographic systems, ie, encryption and decryption engines, digital …
Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …
Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software/hardware codesign
It has been predicted that within the next tenfifteen years, quantum computers will have
computational power sufficient to break current public-key cryptography schemes. When that …
computational power sufficient to break current public-key cryptography schemes. When that …
[HTML][HTML] Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT)
Over the last few years, there has been a great interest in the Internet of Things (IoT). This is
mainly because the IoT interacts directly with people's everyday lives in critical applications …
mainly because the IoT interacts directly with people's everyday lives in critical applications …
The hash function BLAKE
This book is about the cryptographic hash function BLAKE, one of the five final contenders in
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …
Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using **linx and Altera FPGAs
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and
the current standard SHA-2 from the point of view of hardware performance in modern …
the current standard SHA-2 from the point of view of hardware performance in modern …
Lattice PUF: A strong physical unclonable function provably secure against machine learning attacks
We propose a strong physical unclonable function (PUF) provably secure against machine
learning (ML) attacks with both classical and quantum computers. Its security is derived from …
learning (ML) attacks with both classical and quantum computers. Its security is derived from …