Highly vectorized SIKE for AVX-512

H Cheng, G Fotiadis, J Großschädl… - IACR Transactions on …, 2022 - tosc.iacr.org
It is generally accepted that a large-scale quantum computer would be capable to break any
public-key cryptosystem used today, thereby posing a serious threat to the security of the …

Vectorized and parallel computation of large smooth-Degree isogenies using precedence-constrained scheduling

K Phalakarn, V Suppakitpaisarn… - Cryptology ePrint …, 2023 - eprint.iacr.org
Strategies and their evaluations play important roles in speeding up the computation of large
smooth-degree isogenies. The concept of optimal strategies for such computation was …

SIKE on GPU: Accelerating supersingular isogeny-based key encapsulation mechanism on graphic processing units

SC Seo - Ieee Access, 2021 - ieeexplore.ieee.org
Since the introduction of the Supersingular isogeny Diffie–Hellman (SIDH) key exchange
protocol by Jao and de Feo in 2011, it and its variation (SIKE) have gained significant …

Shesha: Multi-head Microarchitectural Leakage Discovery in new-generation Intel Processors

A Chakraborty, N Mishra, D Mukhopadhyay - arXiv preprint arXiv …, 2024 - arxiv.org
Transient execution attacks have been one of the widely explored microarchitectural side
channels since the discovery of Spectre and Meltdown. However, much of the research has …

[PDF][PDF] Fast quantum-safe cryptography on IBM Z

J Bradbury, B Hess - Proceedings of the 3rd NIST PQC Standardization …, 2021 - csrc.nist.rip
Performance of software implementations on today's available hardware architectures plays
a crucial role in the adoption of quantum-safe cryptography. An important target for quantum …

NTT software optimization using an extended Harvey butterfly

J Bradbury, N Drucker, M Hillenbrand - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Software implementations of the number-theoretic transform (NTT) method often leverage
Harvey's butterfly to gain speedups. This is the case in cryptographic libraries such as IBM's …

Efficient Additions and Montgomery Reductions of Large Integers for SIMD

P Ren, R Suda… - 2023 IEEE 30th …, 2023 - ieeexplore.ieee.org
This paper presents efficient algorithms, designed to leverage SIMD for performing additions
and Montgomery reductions on integers larger than 512 bits. The existing algorithms …

Throughput-optimized implementation of isogeny-based cryptography on vectorized ARM SVE processor

P Ren, R Suda… - 2022 Tenth International …, 2022 - ieeexplore.ieee.org
We present the first implementation of Supersingular Isogeny Key Encapsulation (SIKE)
using ARM's Scalable Vector Extension (SVE), aiming to maximize throughput. Large …

Efficient and Side-Channel Resistant Implementations of Next-Generation Cryptography

H CHENG - 2023 - orbilu.uni.lu
The rapid development of emerging information technologies, such as quantum computing
and the Internet of Things (IoT), will have or have already had a huge impact on the world …

사물인터넷장비상에서의양자내성암호구현동향

HD Kwon, S Eum, MJ Sim, H Seo - Review of KIISC, 2022 - koreascience.kr
양자컴퓨터의 발전에 따라 양자알고리즘에 대한 보안성을 보장하는 양자내성암호의 중요성이
대두되고 있다. 미국 국립표준기술연구소 (NIST, National Institute of Standards and …