Post-quantum lattice-based cryptography implementations: A survey
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …
schemes, leading to innovations in public key cryptography that focus on post-quantum …
F1: A fast and programmable accelerator for fully homomorphic encryption
Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure
offloading of computation to untrusted servers. Though it provides ideal security, FHE is …
offloading of computation to untrusted servers. Though it provides ideal security, FHE is …
Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
A compact hardware implementation of CCA-secure key exchange mechanism CRYSTALS-KYBER on FPGA
Y **ng, S Li - IACR Transactions on Cryptographic Hardware and …, 2021 - tches.iacr.org
Post-quantum cryptosystems should be prepared before the advent of powerful quantum
computers to ensure information secure in our daily life. In 2016 a post-quantum …
computers to ensure information secure in our daily life. In 2016 a post-quantum …
From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things
TM Fernández-Caramés - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Although quantum computing is still in its nascent age, its evolution threatens the most
popular public-key encryption systems. Such systems are essential for today's Internet …
popular public-key encryption systems. Such systems are essential for today's Internet …
RISQ-V: Tightly coupled RISC-V accelerators for post-quantum cryptography
Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a
challenging task. PQC introduces new mathematical elements and operations which are …
challenging task. PQC introduces new mathematical elements and operations which are …
Highly efficient architecture of NewHope-NIST on FPGA using low-complexity NTT/INTT
NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum
cryptography (PQC) for key encapsulation mechanisms. The performance on the field …
cryptography (PQC) for key encapsulation mechanisms. The performance on the field …
Speeding up the number theoretic transform for faster ideal lattice-based cryptography
Abstract The Number Theoretic Transform (NTT) provides efficient algorithms for cyclic and
nega-cyclic convolutions, which have many applications in computer arithmetic, eg, for …
nega-cyclic convolutions, which have many applications in computer arithmetic, eg, for …
Masked accelerators and instruction set extensions for post-quantum cryptography
Side-channel attacks can break mathematically secure cryptographic systems leading to a
major concern in applied cryptography. While the cryptanalysis and security evaluation of …
major concern in applied cryptography. While the cryptanalysis and security evaluation of …
Securing the Internet of Things in a quantum world
Currently, we rely on cryptographic algorithms such as elliptic curve cryptosystems (ECCs)
as basic building blocks to secure the communication in the IoT. However, public key …
as basic building blocks to secure the communication in the IoT. However, public key …