Strategies and their evaluations play important roles in speeding up the computation of large smooth-degree isogenies. The concept of optimal strategies for such computation was …
Since the introduction of the Supersingular isogeny Diffie–Hellman (SIDH) key exchange protocol by Jao and de Feo in 2011, it and its variation (SIKE) have gained significant …
Transient execution attacks have been one of the widely explored microarchitectural side channels since the discovery of Spectre and Meltdown. However, much of the research has …
J Bradbury, B Hess - Proceedings of the 3rd NIST PQC Standardization …, 2021 - csrc.nist.rip
Performance of software implementations on today's available hardware architectures plays a crucial role in the adoption of quantum-safe cryptography. An important target for quantum …
J Bradbury, N Drucker, M Hillenbrand - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Software implementations of the number-theoretic transform (NTT) method often leverage Harvey's butterfly to gain speedups. This is the case in cryptographic libraries such as IBM's …
P Ren, R Suda… - 2023 IEEE 30th …, 2023 - ieeexplore.ieee.org
This paper presents efficient algorithms, designed to leverage SIMD for performing additions and Montgomery reductions on integers larger than 512 bits. The existing algorithms …
P Ren, R Suda… - 2022 Tenth International …, 2022 - ieeexplore.ieee.org
We present the first implementation of Supersingular Isogeny Key Encapsulation (SIKE) using ARM's Scalable Vector Extension (SVE), aiming to maximize throughput. Large …
The rapid development of emerging information technologies, such as quantum computing and the Internet of Things (IoT), will have or have already had a huge impact on the world …