Instruction-set accelerated implementation of CRYSTALS-Kyber

M Bisheh-Niasar, R Azarderakhsh… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Large scale quantum computers will break classical public-key cryptography protocols by
quantum algorithms such as Shor's algorithm. Hence, designing quantum-safe …

Comparative study of Keccak SHA-3 implementations

A Dolmeta, M Martina, G Masera - Cryptography, 2023 - mdpi.com
This paper conducts an extensive comparative study of state-of-the-art solutions for
implementing the SHA-3 hash function. SHA-3, a pivotal component in modern …

FPGA-based SPHINCS+ Implementations: Mind the Glitch

D Amiet, L Leuenberger, A Curiger… - 2020 23rd Euromicro …, 2020 - ieeexplore.ieee.org
The digital signature scheme SPHINCS+ is a candidate in the NIST post-quantum project,
whose aim is to standardize cryptographic systems that are secure against attacks …

Efficient FPGA implementation of the SHA-3 hash function

M Sundal, R Chaves - 2017 IEEE Computer Society Annual …, 2017 - ieeexplore.ieee.org
In this paper, three different approaches are considered for FPGA based implementations of
the SHA-3 hash functions. While the performance of proposed unfolded and pipelined …

Serialized lightweight SHA-3 FPGA implementations

B Jungk, M Stöttinger - Microprocessors and Microsystems, 2019 - Elsevier
In this article, we extend our study of lightweight FPGA implementations of SHA-3 published
at ReConFig 2016. We use the shallow pipeline optimization technique for the slice-oriented …

Hardware architecture for CRYSTALS-Kyber post-quantum cryptographic SHA-3 primitives

A Dolmeta, M Martina, G Masera - 2023 18th Conference on Ph …, 2023 - ieeexplore.ieee.org
Once powerful enough quantum computers become feasible, many of the regularly used
cryptosystems will be completely useless. Thus, designing quantum-safe cryptosystems to …

A fast Keccak hardware design for high performance hashing system

D Van Hieu, LD Khai - 2021 15th International Conference on …, 2021 - ieeexplore.ieee.org
The growth of cryptocurrencies has attracted much attention from a variety of fields,
especially in academic research. Their protocol is built and developed on blockchain …

Multi-core dataflow design and implementation of secure hash algorithm-3

A Alzahrani, F Gebali - IEEE Access, 2018 - ieeexplore.ieee.org
Embedded multi-core systems are implemented as systems-on-chip that rely on packet
storeand-forward networks-on-chip for communications. These systems do not use buses or …

Beyond the limits: SHA-3 in just 49 slices

V Arribas - 2019 29th International Conference on Field …, 2019 - ieeexplore.ieee.org
The National Institute of Standards and Technology (NIST) chose in 2012 the winner of the
third competition to decide a new hashing standard, establishing the new Secure Hash …

Hardware architecture for CRYSTALS-Kyber cryptographic primitives

A Dolmeta - 2022 - webthesis.biblio.polito.it
In the modern era, cryptography is essential for online communication security. It plays a
crucial role for information reliability, and it is based on encryption and authentication …