Filters








128 Hits in 5.9 sec

Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware [chapter]

Thomas Pöppelmann, Tim Güneysu
2012 Lecture Notes in Computer Science  
In this work we make a first step towards efficient FFT-based arithmetic for lattice-based cryptography and show that the FFT can be implemented efficiently on reconfigurable hardware.  ...  In recent years lattice-based cryptography has emerged as quantum secure and theoretically elegant alternative to classical cryptographic schemes (like ECC or RSA).  ...  NTT Polynomial Multiplier on Reconfigurable Hardware In this section we deal with the overall design of a polynomial multiplier for lattice-based cryptography.  ... 
doi:10.1007/978-3-642-33481-8_8 fatcat:53fo5qtatbe4nifvlaku7nxlvm

Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware [chapter]

Thomas Pöppelmann, Tim Güneysu
2014 Lecture Notes in Computer Science  
In this work, we present an efficient and scalable micro-code engine for Ring-LWE encryption that combines polynomial multiplication based on the Number Theoretic Transform (NTT), polynomial addition,  ...  We hope that this contribution helps to pave the way for the deployment of ideal lattice-based encryption in future real-world systems.  ...  However, the biggest practical problem of lattice-based cryptography are huge key sizes and also quite inefficient matrix-vector and matrix-matrix arithmetic.  ... 
doi:10.1007/978-3-662-43414-7_4 fatcat:2zkqm5obynehvomvienyqizocm

Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design

Davide Bellizia, Nadia El Mrabet, Apostolos P. Fournaris, Simon Pontie, Francesco Regazzoni, Francois-Xavier Standaert, Elise Tasso, Emanuele Valea
2021 2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)  
In this paper, we introduce the fundamentals of PQC, with a focus on lattice-based cryptography and its hardware security issues, namely side-channel and fault-based attacks.  ...  Then, we focus on isogeny-based cryptography and the SIKE algorithm.  ...  Resistance against fault sensitivity analysis of arithmetic operators used in lattice based cryptography has also been explored [30] .  ... 
doi:10.1109/dft52944.2021.9568301 fatcat:n5dg4bfffvhh7msczlqcel7wiq

2018 Index IEEE Transactions on Computers Vol. 67

2019 IEEE transactions on computers  
., þ, TC March 2018 335-347 On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography.  ...  ., þ, TC July 2018 934-948 On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography.  ... 
doi:10.1109/tc.2018.2882120 fatcat:j2j7yw42hnghjoik2ghvqab6ti

Architectures of flexible symmetric key crypto engines—a survey

Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat
2013 ACM Computing Surveys  
Nevertheless, a few authors propose original processor architectures based on multi-crypto-processor structures and reconfigurable cryptographic arrays.  ...  For more than ten years, many studies in the field of cryptographic engineering have focused on the design of optimized high-throughput hardware cryptographic cores (e.g., symmetric and asymmetric key  ...  Lattice-based cryptography, multivariable public key cryptography, and code-based cryptography are possible solutions to post-quantum cryptography.  ... 
doi:10.1145/2501654.2501655 fatcat:h5pccigb35hfvinkrpn7s75gl4

Efficient implementation of ideal lattice-based cryptography

Thomas Pöppelmann
2017 it - Information Technology  
One alternative is lattice-based cryptography which allows the construction of asymmetric public-key encryption and signature schemes that offer a good balance between security, performance, and key as  ...  However, both problems could be solved efficiently on a large enough quantum computer.  ...  Chapter 7 Lattice-Based Signatures on Reconfigurable Hardware In this chapter we investigate the efficiency of two post-quantum signature schemes on reconfigurable hardware.  ... 
doi:10.1515/itit-2017-0030 fatcat:mpmamskk25h3lbyshy4rfd4y4y

The Italian research on HPC key technologies across EuroHPC

Marco Aldinucci, Giovanni Agosta, Antonio Andreini, Claudio A. Ardagna, Andrea Bartolini, Alessandro Cilardo, Biagio Cosenza, Marco Danelutto, Roberto Esposito, William Fornaciari, Roberto Giorgi, Davide Lengani (+5 others)
2021 Proceedings of the 18th ACM International Conference on Computing Frontiers  
High-Performance Computing (HPC) is one of the strategic priorities for research and innovation worldwide due to its relevance for industrial and scientific applications.  ...  The library includes the support also of new Lattice-based schemes being ready for post-quantum cryptography applications.  ...  Further possibilities include the support of reduced precision arithmetic and the hardware support for resilience to faulty bits, the latter being based on innovative resilience simulation integrated in  ... 
doi:10.1145/3457388.3458508 fatcat:nbnzfa2frvbpflj6tcbsk4bwcq

A Practical View of the State-of-the-Art of Lattice-Based Cryptanalysis

Artur Mariano, Thijs Laarhoven, Fabio Correia, Manuel Rodrigues, Gabriel Falcao
2017 IEEE Access  
ACKNOWLEDGMENTS Artur Mariano thanks HiPEAC network for a collaboration grant awarded to visit Gabriel Falcão in late 2016, when the write up of this paper started.  ...  RECONFIGURABLE HARDWARE Reconfigurable hardware has in fact been less explored in the context of lattice-based cryptanalysis.  ...  We are walking toward a generation of devices that include reconfigurable and non-reconfigurable hardware physically close to each other, e.g. [39] .  ... 
doi:10.1109/access.2017.2748179 fatcat:4duwvkbsc5cndecry6y2zynvvm

An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms

Malik Imran, Zain Ul Abideen, Samuel Pagliarini
2020 Electronics  
In this work, we have investigated how lattice-based candidate algorithms fare when implemented in hardware.  ...  To achieve this, we have assessed 12 lattice-based algorithms in order to identify their basic building blocks.  ...  Include only algorithms that are built on the security problems of lattice-based cryptography. • Security levels.  ... 
doi:10.3390/electronics9111953 fatcat:vhy3rkjlq5cqvodm74jvtnaawq

Quantum Computing: A Taxonomy, Systematic Review and Future Directions [article]

Sukhpal Singh Gill, Adarsh Kumar, Harvinder Singh, Manmeet Singh, Kamalpreet Kaur, Muhammad Usman, Rajkumar Buyya
2021 arXiv   pre-print
A detailed overview of quantum software tools and technologies, post-quantum cryptography and quantum computer hardware development to document the current state-of-the-art in the respective areas.  ...  We finish the article by highlighting various open challenges and promising future directions for research.  ...  [19] proposed a survey on post-quantum lattice-based cryptography implementations, which is just one type of post-quantum cryptography.  ... 
arXiv:2010.15559v4 fatcat:y6cuttww5fd5jdmvcer352lh4e

LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier
2021 Transactions on Cryptographic Hardware and Embedded Systems  
Based on our primitives, we design and implement LifeLine, a hardware design protection mechanism for FPGAs using hardware/software co-obfuscated cryptography.  ...  We then describe the design and implementation of novel hardware obfuscation primitives based on the intrinsic structure of FPGAs.  ...  Based on the foundation of our primitives, we designed and implemented LifeLine a hardware design protection for FPGAs using hardware/software co-obfuscated cryptography.  ... 
doi:10.46586/tches.v2021.i4.412-446 fatcat:tvapiwiqojhq7hbecgzgk7at5y

Virtual memory window for application-specific reconfigurable coprocessors

Miljan Vuletić, Laura Pozzi, Paolo Ienne
2004 Proceedings of the 41st annual conference on Design automation - DAC '04  
Reconfigurable Systems-on-Chip (SoCs) on the market consist of full-fledged processors and large Field-Programmable Gate-Arrays (FPGAs).  ...  A reconfigurable SoC running Linux is used to prove the viability of the concept.  ...  Finally, in [13] , an OS for reconfigurable platforms is proposed that suggests a task communication scheme based on message passing.  ... 
doi:10.1145/996566.996818 dblp:conf/dac/VuleticPI04 fatcat:uazhshlnhrhyhmsovjuutn4ilm

Virtual memory window for application-specific reconfigurable coprocessors

M. Vuletic, L. Pozzi, P. Ienne
2006 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
Reconfigurable Systems-on-Chip (SoCs) on the market consist of full-fledged processors and large Field-Programmable Gate-Arrays (FPGAs).  ...  A reconfigurable SoC running Linux is used to prove the viability of the concept.  ...  Finally, in [13] , an OS for reconfigurable platforms is proposed that suggests a task communication scheme based on message passing.  ... 
doi:10.1109/tvlsi.2006.878481 fatcat:u66nglhinza3rmlcgppohxxyfy

Sensor Systems Based on FPGAs and Their Applications: A Survey

Antonio de la Piedra, An Braeken, Abdellah Touhafi
2012 Sensors  
We show that architectures based on the combination of microcontrollers and FPGA can play a key role in the future of sensor networks, in fields where processing capabilities such as strong cryptography  ...  In this manuscript, we present a survey of designs and implementations of research sensor nodes that rely on FPGAs, either based upon standalone platforms or as a combination of microcontroller and FPGA  ...  The system is based on a strategy called ECfEE (Energy Efficient and Computation Efficient with Frequency Adaptation).  ... 
doi:10.3390/s120912235 fatcat:q7i7qblyffhvhkfpiedllhahs4

Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems [chapter]

Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann
2012 Lecture Notes in Computer Science  
It is based on recent theoretical advances in lattice-based cryptography and is highly optimized for practicability and use in embedded systems.  ...  The implementation results on reconfigurable hardware (Spartan/Virtex 6) are very promising and show that the scheme is scalable, has low area consumption, and even outperforms some classical schemes.  ...  Conclusion In this paper we presented a provably secure lattice based digital signature scheme and its implementation on a wide scale of reconfigurable hardware.  ... 
doi:10.1007/978-3-642-33027-8_31 fatcat:n3yz2nugjzgp7forwqzkmkcvua
« Previous Showing results 1 — 15 out of 128 results