This paper explores the challenges and potential solutions of implementing the recommended upcoming post-quantum cryptography standards (the CRYSTALS-Dilithium and CRYSTALS-Kyber algorithms) on resource constrained devices. The high computational cost of polynomial operations, fundamental to cryptography based on ideal lattices, presents significant challenges in an efficient implementation. This paper proposes a hardware/software co-design strategy using RISC-V extensions to optimize resource utilization and speed up the number-theoretic transformations (NTTs). The primary contributions include a lightweight custom arithmetic logic unit (ALU), integrated into a 4-stage pipeline 32-bit RISC-V processor. This ALU is tailored towards the NTT ...
peer reviewedThe dawning era of quantum computing has initiated various initiatives for the standard...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
With the advance of quantum computers, there is an urgent need to find replacements for public-key c...
This paper explores the challenges and potential solutions of implementing the recommended upcoming ...
In recent years, public-key cryptography has become a fundamental component of digital infrastructur...
The objective of this thesis is to design and implement a hardware accelerator for the CRYSTALS post...
In the last years a digitalization process is going on in a lot of different areas like industry 4.0...
Quantum computers pose a threat to the security of communications over the internet. This imminent r...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a challenging task. PQC ...
The lattice-based CRYSTALS-Dilithium scheme is one of the three thirdround digital signature finalis...
CRYSTALS-Dilithium as a lattice-based digital signature scheme has been selected as a finalist in th...
The security of public-key cryptography depends on the computational intractability of some hard pro...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
peer reviewedThe dawning era of quantum computing has initiated various initiatives for the standard...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
With the advance of quantum computers, there is an urgent need to find replacements for public-key c...
This paper explores the challenges and potential solutions of implementing the recommended upcoming ...
In recent years, public-key cryptography has become a fundamental component of digital infrastructur...
The objective of this thesis is to design and implement a hardware accelerator for the CRYSTALS post...
In the last years a digitalization process is going on in a lot of different areas like industry 4.0...
Quantum computers pose a threat to the security of communications over the internet. This imminent r...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a challenging task. PQC ...
The lattice-based CRYSTALS-Dilithium scheme is one of the three thirdround digital signature finalis...
CRYSTALS-Dilithium as a lattice-based digital signature scheme has been selected as a finalist in th...
The security of public-key cryptography depends on the computational intractability of some hard pro...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
peer reviewedThe dawning era of quantum computing has initiated various initiatives for the standard...
Rapid advances in quantum computing, together with the announcement by the National Institute of Sta...
With the advance of quantum computers, there is an urgent need to find replacements for public-key c...