[HTML][HTML] Post-quantum cryptosystems for Internet-of-Things: A survey on lattice-based algorithms

R Asif - IoT, 2021 - mdpi.com
The latest quantum computers have the ability to solve incredibly complex classical
cryptography equations particularly to decode the secret encrypted keys and making the …

A review of the present cryptographic arsenal to deal with post-quantum threats

G Yalamuri, P Honnavalli, S Eswaran - Procedia Computer Science, 2022 - Elsevier
The looming threat of quantum attacks on the digital infrastructure protected by conventional
cryptographic protocol has generated urgency in identifying and deploying …

Unif-NTT: A Unified Hardware Design of Forward and Inverse NTT for PQC Algorithms

AY Hummdi, A Aljaedi, Z Bassfar, SS Jamal… - IEEE …, 2024 - ieeexplore.ieee.org
Polynomial multiplications based on the number theoretic transform (NTT) are critical in
lattice-based post-quantum cryptography algorithms. Therefore, this paper presents a …

Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices

S Kumari, M Singh, R Singh, H Tewari - Knowledge-Based Systems, 2022 - Elsevier
Great extent of modernization in intelligent device automation and wireless sensor network
have encouraged the augmentation of IoTs to interconnect millions of actual devices to the …

A versatile and flexible multiplier generator for large integer polynomials

M Imran, ZU Abideen, S Pagliarini - Journal of Hardware and Systems …, 2023 - Springer
This work presents a versatile and flexible generator of various large integer polynomial
multipliers to be used in hardware cryptocores. Flexibility is offered by allowing circuit …

An open-source library of large integer polynomial multipliers

M Imran, ZU Abideen… - 2021 24th International …, 2021 - ieeexplore.ieee.org
Polynomial multiplication is a bottleneck in most of the public-key cryptography protocols,
including Elliptic-curve cryptography and several of the post-quantum cryptography …

Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications

A Aljaedi, SS Jamal, M Rashid, AR Alharbi, M Alotaibi… - Applied Sciences, 2023 - mdpi.com
This paper proposes a novel hardware design for a compact crypto processor devoted to
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …

Timing-attack-resistant acceleration of ntru round 3 encryption on resource-constrained embedded systems

E Camacho-Ruiz, MC Martínez-Rodríguez… - Cryptography, 2023 - mdpi.com
The advent of quantum computing with high processing capabilities will enable brute force
attacks in short periods of time, threatening current secure communication channels. To …

Evaluation of hardware and software implementations for NIST finalist and fourth-round post-quantum cryptography KEMs

M Bandaru, SE Mathe, C Wattanapanich - Computers and Electrical …, 2024 - Elsevier
Quantum computer attacks could easily jeopardize the total security of currently employed
encryption systems. As a result, there is an ongoing collaborative effort to design post …

A survey of software implementations for the number theoretic transform

AC Mert, F Yaman, E Karabulut, E Öztürk… - … on Embedded Computer …, 2023 - Springer
This survey summarizes the software implementation knowledge of the Number Theoretic
Transform (NTT)—a major subroutine of lattice-based cryptosystems. The NTT is a special …