Recent advances in post-quantum cryptography for networks: A survey

E Zeydan, Y Turk, B Aksoy… - … Conference On Mobile …, 2022 - ieeexplore.ieee.org
The development of quantum computers poses a new security threat to network
infrastructures and services, as they will be powerful enough to break the most common …

Efficient number theoretic transform implementation on GPU for homomorphic encryption

Ö Özerk, C Elgezen, AC Mert, E Öztürk… - The Journal of …, 2022 - Springer
Lattice-based cryptography forms the mathematical basis for current homomorphic
encryption schemes, which allows computation directly on encrypted data. Homomorphic …

Kyber on ARM64: Compact implementations of Kyber on 64-bit ARM Cortex-A processors

P Sanal, E Karagoz, H Seo, R Azarderakhsh… - … Conference on Security …, 2021 - Springer
Public-key cryptography based on the lattice problem is efficient and believed to be secure
in a post-quantum era. In this paper, we introduce carefully-optimized implementations of …

Accelerating falcon on ARMv8

Y Kim, J Song, SC Seo - IEEE Access, 2022 - ieeexplore.ieee.org
Falcon is one of the promising digital-signature algorithms in NIST's ongoing Post-Quantum
Cryptography (PQC) standardization finalist. Computational efficiency regarding software …

TensorCrypto: High throughput acceleration of lattice-based cryptography using tensor core on GPU

WK Lee, H Seo, Z Zhang, SO Hwang - IEEE Access, 2022 - ieeexplore.ieee.org
Tensor core is a newly introduced hardware unit in NVIDIA GPU chips that allows matrix
multiplication to be computed much faster than in the integer and floating-point units. In this …

Efficient implementation of AES-CTR and AES-ECB on GPUs with applications for high-speed FrodoKEM and exhaustive key search

WK Lee, HJ Seo, SC Seo… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Advanced Encryption Standard (AES) is a standardized block cipher widely used to
protect data confidentiality. Besides that, it can be used to generate pseudo-random …

High throughput implementation of post-quantum key encapsulation and decapsulation on GPU for Internet of Things applications

WK Lee, SO Hwang - IEEE Transactions on Services …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) sensor nodes are placed ubiquitously to collect information, which is
then vulnerable to malicious attacks. For instance, adversaries can perform side channel …

cuNH: Efficient GPU implementations of post-quantum KEM NewHope

Y Gao, J Xu, H Wang - IEEE Transactions on Parallel and …, 2021 - ieeexplore.ieee.org
Post-quantum cryptography was proposed in the past years due to the foreseeable
emergence of quantum computers that are able to break the conventional public key …

A novel high-performance implementation of CRYSTALS-Kyber with AI accelerator

L Wan, F Zheng, G Fan, R Wei, L Gao, Y Wang… - … on Research in …, 2022 - Springer
Public-key cryptography, including conventional cryptosystems and post-quantum
cryptography, involves computation-intensive workloads. With noticing the extraordinary …

Cuzk: Accelerating zero-knowledge proof with a faster parallel multi-scalar multiplication algorithm on gpus

T Lu, C Wei, R Yu, C Chen, W Fang, L Wang… - Cryptology ePrint …, 2022 - eprint.iacr.org
Zero-knowledge proof is a critical cryptographic primitive. Its most practical type, called zero-
knowledge Succinct Non-interactive ARgument of Knowledge (zkSNARK), has been …