Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co …

VB Dang, F Farahmand, M Andrzejczak… - … ePrint Archive: Report …, 2020 - par.nsf.gov
Performance in hardware has typically played a major role in differentiating among leading
candidates in cryptographic standardization efforts. Winners of two past NIST cryptographic …

A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices

S Kumari, M Singh, R Singh, H Tewari - Computer Networks, 2022 - Elsevier
Abstract The Internet of Things (IoT) introduces an active connection between smart devices
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …

Efficient and scalable FPGA-oriented design of QC-LDPC bit-flipping decoders for post-quantum cryptography

D Zoni, A Galimberti, W Fornaciari - IEEE Access, 2020 - ieeexplore.ieee.org
Considering code-based cryptography, quasi-cyclic low-density parity-check (QC-LDPC)
codes are foreseen as one of the few solutions to design post-quantum cryptosystems. The …

Post-quantum cryptography for internet of things: a survey on performance and optimization

T Liu, G Ramachandran, R Jurdak - arXiv preprint arXiv:2401.17538, 2024 - arxiv.org
Due to recent development in quantum computing, the invention of a large quantum
computer is no longer a distant future. Quantum computing severely threatens modern …

Efficient and Scalable FPGA Design of GF() Inversion for Post-Quantum Cryptosystems

A Galimberti, G Montanaro… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Post-quantum cryptosystems based on QC-MDPC codes are designed to mitigate the
security threat posed by quantum computers to traditional public-key cryptography. The …

Efficient hardware implementation of the ledacrypt decoder

K Koleci, P Santini, M Baldi, F Chiaraluce… - IEEE …, 2021 - ieeexplore.ieee.org
This work describes an efficient implementation of the iterative decoder that is the main part
of the decryption stage in the LEDAcrypt cryptosystem, recently proposed for post-quantum …

Evaluation of performance, energy, and computation costs of quantum-attack resilient encryption algorithms for embedded devices

B Halak, T Gibson, M Henley, CB Botea, B Heath… - IEEE …, 2024 - ieeexplore.ieee.org
The accelerated development of quantum computers poses a direct threat to all current
standards of public key encryption, for example, the Shor algorithm exploits the …

[PDF][PDF] A Hardware Implementation for Code-based Post-quantum Asymmetric Cryptography.

K Koleci, M Baldi, M Martina, G Masera - ITASEC, 2020 - ceur-ws.org
This paper presents a dedicated hardware implementation of the LEDAcrypt cryptosystem,
which uses Quasi-Cyclic Low-Density Parity-Check codes and a decoding algorithm known …

Engineering Practical Rank-Code-Based Cryptographic Schemes on Embedded Hardware. A Case Study on ROLLO

J Hu, W Wang, K Gaj, L Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the practical performance of rank-code based cryptography on
FPGA platforms by presenting a case study on the quantum-safe KEM scheme based on …

Optimized IoT cryptoprocessor based on QC-MPDC key encapsulation mechanism

JH Phoon, WK Lee, DCK Wong, WS Yap… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The key encapsulation mechanism (KEM) is an important cryptographic tool to protect
communication in the Internet of Things (IoT). In the near future, classical algorithms used to …