Post-quantum lattice-based cryptography implementations: A survey

H Nejatollahi, N Dutt, S Ray, F Regazzoni… - ACM Computing …, 2019 - dl.acm.org
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …

Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols

U Banerjee, TS Ukyab, AP Chandrakasan - arXiv preprint arXiv …, 2019 - arxiv.org
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be
rendered insecure by Shor's algorithm when large-scale quantum computers are built …

High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography

M Bisheh-Niasar, R Azarderakhsh… - 2021 IEEE 28th …, 2021 - ieeexplore.ieee.org
This paper demonstrates an architecture for accelerating the polynomial multiplication using
number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST …

Highly efficient architecture of NewHope-NIST on FPGA using low-complexity NTT/INTT

N Zhang, B Yang, C Chen, S Yin, S Wei… - IACR Transactions on …, 2020 - tches.iacr.org
NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum
cryptography (PQC) for key encapsulation mechanisms. The performance on the field …

Instruction-set accelerated implementation of CRYSTALS-Kyber

M Bisheh-Niasar, R Azarderakhsh… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Large scale quantum computers will break classical public-key cryptography protocols by
quantum algorithms such as Shor's algorithm. Hence, designing quantum-safe …

High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber

VB Dang, K Mohajerani, K Gaj - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …

Lattice-based key-sharing schemes: A survey

P Ravi, J Howe, A Chattopadhyay… - ACM Computing Surveys …, 2021 - dl.acm.org
Public-key cryptography is an indispensable component used in almost all of our present-
day digital infrastructure. However, most if not all of it is predominantly built upon hardness …

ISA Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on RISC-V.

E Alkim, H Evkan, N Lahr… - IACR Transactions …, 2020 - portal.findresearcher.sdu.dk
We present and evaluate a custom extension to the RISC-V instruction setfor finite field
arithmetic. The result serves as a very compact approach to software-hardware co-design of …

NTT architecture for a Linux-ready RISC-V fully-homomorphic encryption accelerator

R Paludo, L Sousa - … Transactions on Circuits and Systems I …, 2022 - ieeexplore.ieee.org
This paper proposes two architectures for the acceleration of Number Theoretic Transforms
(NTTs) using a novel Montgomery-based butterfly. We first design a custom NTT hardware …

Cryptographic keys exchange model for smart city applications

M Saračević, S Adamović, N Maček… - IET Intelligent …, 2020 - Wiley Online Library
This study presents a secret key sharing protocol that establishes cryptographically secured
communication between two entities. A new symmetric key exchange scenario for smart city …