Hardware Circuits and Systems Design for Post-Quantum Cryptography–A Tutorial Brief

J Xie, W Zhao, H Lee, DB Roy… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Due to the increasing threats from possible large-scale quantum computers, post-quantum
cryptography (PQC) has drawn significant attention from various communities recently. In …

Profiled side-channel attack on cryptosystems based on the binary syndrome decoding problem

B Colombier, VF Drăgoi, PL Cayrel… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The NIST standardization process for post-quantum cryptography has been drawing the
attention of researchers to the submitted candidates. One direction of research consists in …

High Throughput Acceleration of Scabbard Key Exchange and Key Encapsulation Mechanism Using Tensor Core on GPU for IoT Applications

MA Hafeez, WK Lee, A Karmakar… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
High throughput key encapsulations and decapsulations are needed by Internet of Things
(IoT) applications in order to simultaneously process a multitude of small data in secure …

[PDF][PDF] Message-recovery Profiled Side-channel Attack on the Classic McEliece Cryptosystem.

B Colombier, VF Dragoi, PL Cayrel… - IACR Cryptol. ePrint …, 2022 - researchgate.net
The NIST standardization process for post-quantum cryptography has been drawing the
attention of researchers to the submitted candidates. One direction of research consists in …

[PDF][PDF] On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.

L Malina, S Ricci, P Dobias, P Jedlicka, J Hajny… - SECRYPT, 2022 - scitepress.org
The importance of designing efficient and secure post-quantum cryptographic algorithms is
reinforced in the recent National Institute of Standards and Technology (NIST)'s Post …

Hardware-software co-design of bike with hls-generated accelerators

G Montanaro, A Galimberti, E Colizzi… - 2022 29th IEEE …, 2022 - ieeexplore.ieee.org
In order to mitigate the security threat of quantum computers, NIST is undertaking a process
to standardize post-quantum cryptosystems, aiming to assess their security and speed up …

Hardware security for IoT in the quantum era: Survey and challenges

D Dione, B Seck, I Diop, PL Cayrel, D Faye… - Journal of Information …, 2023 - scirp.org
The Internet of Things (IoT) has become a reality: Healthcare, smart cities, intelligent
manufacturing, e-agriculture, real-time traffic controls, environment monitoring, camera …

Timing-attack-resistant acceleration of ntru round 3 encryption on resource-constrained embedded systems

E Camacho-Ruiz, MC Martínez-Rodríguez… - Cryptography, 2023 - mdpi.com
The advent of quantum computing with high processing capabilities will enable brute force
attacks in short periods of time, threatening current secure communication channels. To …

Mckeycutter: A high-throughput key generator of classic mceliece on hardware

Y Zhu, W Zhu, C Chen, M Zhu, Z Li… - 2023 60th ACM/IEEE …, 2023 - ieeexplore.ieee.org
Classic McEliece is a code-based quantum-resistant public-key scheme characterized with
relative high encapsulation/decapsulation speed and small ciphertexts, with an in-depth …

Leveraging HLS to Design a Versatile & High-Performance Classic McEliece Accelerator

IV Kostalabros, J Ribes, X Carril, O Farras… - ACM Transactions on …, 2024 - dl.acm.org
By harnessing fundamental quantum properties, a large-scale quantum computer could
undermine currently deployed public-key algorithms. The post-quantum, code-based …