Hardware circuits and systems design for post-quantum cryptography—A tutorial brief

J ** key encapsulation
N Aragon, P Barreto, S Bettaieb, L Bidoux, O Blazy… - 2022 - inria.hal.science
4 Design Rationale and Considerations (2. B. 6) 11 4.1 What is BIKE and how should it be
used?............... 11 4.1. 1 What is BIKE in one sentence?................. 11 4.1. 2 How many …

High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber

VB Dang, K Mohajerani, K Gaj - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …

Fast and efficient hardware implementation of HQC

S Deshpande, C Xu, M Nawan, K Nawaz… - … Conference on Selected …, 2023 - Springer
This work presents a hardware design for constant-time implementation of the HQC
(Hamming Quasi-Cyclic) code-based key encapsulation mechanism. HQC has been …

LEAP: Lightweight and efficient accelerator for sparse polynomial multiplication of HQC

Y Tu, P He, ÇK Koç, J **e - IEEE Transactions on Very Large …, 2023 - ieeexplore.ieee.org
The Hamming quasi-cyclic (HQC) code-based encryption scheme is one of the fourth-round
algorithms selected by the National Institute of Standards and Technology (NIST) …

Efficiently masking polynomial inversion at arbitrary order

M Krausz, G Land, J Richter-Brockmann… - … Conference on Post …, 2022 - Springer
Physical side-channel analysis poses a huge threat to post-quantum cryptographic schemes
implemented on embedded devices. Still, secure implementations are missing for many …

Bike key-recovery: Combining power consumption analysis and information-set decoding

A Cheriere, N Aragon, T Richmond… - … Conference on Applied …, 2023 - Springer
In this paper, we present a single-trace attack on a BIKE Cortex-M4 implementation
proposed by Chen et al. at CHES 2021. BIKE is a key-encapsulation mechanism, candidate …

[PDF][PDF] On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.

L Malina, S Ricci, P Dobias, P Jedlicka, J Hajny… - SECRYPT, 2022 - scitepress.org
The importance of designing efficient and secure post-quantum cryptographic algorithms is
reinforced in the recent National Institute of Standards and Technology (NIST)'s Post …

Evaluation of hardware and software implementations for NIST finalist and fourth-round post-quantum cryptography KEMs

M Bandaru, SE Mathe, C Wattanapanich - Computers and Electrical …, 2024 - Elsevier
Quantum computer attacks could easily jeopardize the total security of currently employed
encryption systems. As a result, there is an ongoing collaborative effort to design post …