Field programmable gate array applications—A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, R Khanna - Computation, 2019 - mdpi.com
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …

High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber

VB Dang, K Mohajerani, K Gaj - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …

Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …

VB Dang, F Farahmand, M Andrzejczak… - … ePrint Archive: Report …, 2020 - par.nsf.gov
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …

Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software/hardware codesign

VB Dang, F Farahmand… - … Conference on Field …, 2019 - ieeexplore.ieee.org
It has been predicted that within the next tenfifteen years, quantum computers will have
computational power sufficient to break current public-key cryptography schemes. When that …

Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm

S Bayat-Sarmadi, M Mozaffari-Kermani… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
The secure hash algorithm (SHA)-3 has been selected in 2012 and will be used to provide
security to any application which requires hashing, pseudo-random number generation, and …

Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA

A Sideris, T Sanida, M Dasygenis - Journal of Cryptographic Engineering, 2024 - Springer
In sensitive communications, the cryptographic hash function plays a crucial role, including
in the military, healthcare, and banking, ensuring secure transmission by verifying data …

Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using **linx and Altera FPGAs

K Gaj, E Homsirikamol, M Rogawski… - Cryptology ePrint …, 2012 - eprint.iacr.org
In this paper we present a comprehensive comparison of all Round 3 SHA-3 candidates and
the current standard SHA-2 from the point of view of hardware performance in modern …

On efficiency enhancement of SHA-3 for FPGA-based multimodal biometric authentication

MM Sravani, SA Durai - IEEE Transactions on Very Large Scale …, 2022 - ieeexplore.ieee.org
Synchronized padder block and a compact-dynamic round constant (RC) generator to
achieve highly efficient Keccak architecture are proposed in this work. The proposed design …

[PDF][PDF] Hardware api for lightweight cryptography

JP Kaps, W Diehl, M Tempelmeier… - … . gmu. edu/athena …, 2019 - cryptography.gmu.edu
In this paper, we define the Lightweight Cryptography (LWC) Hardware Application
Programming Interface (API) for the implementations of lightweight authenticated ciphers …

[PDF][PDF] High-speed hardware architectures and fair FPGA benchmarking of CRYSTALS-kyber NTRU and saber

V Dang, K Mohajerani, K Gaj - The NIST Third Standardization …, 2021 - csrc.nist.rip
Performance in hardware has typically played a significant role in differentiating among
leading candidates in cryptographic standardization efforts. Winners of two past NIST …