Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor's algorithm when large-scale quantum computers are built …
This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST …
N Zhang, B Yang, C Chen, S Yin, S Wei… - IACR Transactions on …, 2020 - tches.iacr.org
NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum cryptography (PQC) for key encapsulation mechanisms. The performance on the field …
Large scale quantum computers will break classical public-key cryptography protocols by quantum algorithms such as Shor's algorithm. Hence, designing quantum-safe …
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic community to the danger of attacks performed using quantum computers. All PQC schemes …
Public-key cryptography is an indispensable component used in almost all of our present- day digital infrastructure. However, most if not all of it is predominantly built upon hardness …
E Alkim, H Evkan, N Lahr… - IACR Transactions …, 2020 - portal.findresearcher.sdu.dk
We present and evaluate a custom extension to the RISC-V instruction setfor finite field arithmetic. The result serves as a very compact approach to software-hardware co-design of …
R Paludo, L Sousa - … Transactions on Circuits and Systems I …, 2022 - ieeexplore.ieee.org
This paper proposes two architectures for the acceleration of Number Theoretic Transforms (NTTs) using a novel Montgomery-based butterfly. We first design a custom NTT hardware …
This study presents a secret key sharing protocol that establishes cryptographically secured communication between two entities. A new symmetric key exchange scenario for smart city …