Field programmable gate array applications—A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, R Khanna - Computation, 2019 - mdpi.com
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …

Comparative study of Keccak SHA-3 implementations

A Dolmeta, M Martina, G Masera - Cryptography, 2023 - mdpi.com
This paper conducts an extensive comparative study of state-of-the-art solutions for
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …

High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber

VB Dang, K Mohajerani, K Gaj - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …

[KSIĄŻKA][B] About cryptographic engineering

ÇK Koç - 2009 - Springer
Cryptographic engineering is the name we have coined to refer to the theory and practice of
engineering of cryptographic systems, ie, encryption and decryption engines, digital …

Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …

VB Dang, F Farahmand, M Andrzejczak… - … ePrint Archive: Report …, 2020 - par.nsf.gov
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …

Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software/hardware codesign

VB Dang, F Farahmand… - … Conference on Field …, 2019 - ieeexplore.ieee.org
It has been predicted that within the next tenfifteen years, quantum computers will have
computational power sufficient to break current public-key cryptography schemes. When that …

[HTML][HTML] Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT)

A Alfrhan, T Moulahi, A Alabdulatif - Blockchain: Research and Applications, 2021 - Elsevier
Over the last few years, there has been a great interest in the Internet of Things (IoT). This is
mainly because the IoT interacts directly with people's everyday lives in critical applications …

The hash function BLAKE

JP Aumasson, W Meier, RCW Phan, L Henzen - 2014 - Springer
This book is about the cryptographic hash function BLAKE, one of the five final contenders in
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …

Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using **linx and Altera FPGAs

K Gaj, E Homsirikamol, M Rogawski… - Cryptology ePrint …, 2012 - eprint.iacr.org
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and
the current standard SHA-2 from the point of view of hardware performance in modern …

Lattice PUF: A strong physical unclonable function provably secure against machine learning attacks

Y Wang, X **, M Orshansky - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
We propose a strong physical unclonable function (PUF) provably secure against machine
learning (ML) attacks with both classical and quantum computers. Its security is derived from …