NIST Post-Quantum Cryptography- A Hardware Evaluation Study
暂无分享,去创建一个
Ramesh Karri | Mohammed Nabeel | Deepraj Soni | Kanad Basu | R. Karri | K. Basu | Deepraj Soni | M. Nabeel
[1] Christian Hanser,et al. Implementing RLWE-based Schemes Using an RSA Co-Processor , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[2] Florian Mendel,et al. Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications , 2017, IACR Trans. Symmetric Cryptol..
[3] Emanuele Bellini,et al. DRANKULA: A McEliece-like Rank Metric based Cryptosystem Implementation , 2018, ICETE.
[4] Kazumaro Aoki,et al. Fast Implementations of AES Candidates , 2000, AES Candidate Conference.
[5] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[6] Tanja Lange,et al. Attacking and defending the McEliece cryptosystem , 2008, IACR Cryptol. ePrint Arch..
[7] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[8] Nikil D. Dutt,et al. Post-Quantum Lattice-Based Cryptography Implementations , 2019, ACM Comput. Surv..
[9] Jason Helge Anderson,et al. LegUp: high-level synthesis for FPGA-based processor/accelerator systems , 2011, FPGA '11.
[10] Jacques Stern,et al. Practical Cryptanalysis of SFLASH , 2007, CRYPTO.
[11] Alessandro Barenghi,et al. LEDAkem: a post-quantum key encapsulation mechanism based on QC-LDPC codes , 2018, PQCrypto.
[12] Gustavo Marrero Callicó,et al. High-level design using Intel FPGA OpenCL: A hyperspectral imaging spatial-spectral classifier , 2017, 2017 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC).
[13] FrodoKEM Learning With Errors Key Encapsulation Algorithm , 2017 .
[14] Damien Stehlé,et al. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM , 2017, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[15] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[16] Adi Shamir,et al. Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.
[17] David Jao,et al. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies , 2011, J. Math. Cryptol..
[18] Alain Couvreur,et al. BIG QUAKE BInary Goppa QUAsi–cyclic Key Encapsulation , 2017 .
[19] Nikil D. Dutt,et al. Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols , 2018, IACR Cryptol. ePrint Arch..
[20] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[21] Jianwen Zhu,et al. A unified formal model of ISA and FSMD , 1999, CODES '99.
[22] Frederik Vercauteren,et al. Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM , 2018, IACR Cryptol. ePrint Arch..
[23] Pierre Loidreau,et al. A New Rank Metric Codes Based Encryption Scheme , 2017, PQCrypto.
[24] Peter Schwabe,et al. From 5-Pass MQ -Based Identification to MQ -Based Signatures , 2016, ASIACRYPT.
[25] Jakub Szefer,et al. FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes , 2018, IACR Cryptol. ePrint Arch..
[26] Damien Stehlé,et al. CRYSTALS - Dilithium: Digital Signatures from Module Lattices , 2017, IACR Cryptol. ePrint Arch..
[27] Hwajeong Seo,et al. Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor , 2018, Secur. Commun. Networks.
[28] Daniele Micciancio. Lattice-Based Cryptography , 2011, Encyclopedia of Cryptography and Security.
[29] Kris Gaj,et al. Toward a new HLS-based methodology for FPGA benchmarking of candidates in cryptographic competitions: The CAESAR contest case study , 2017, 2017 International Conference on Field Programmable Technology (ICFPT).
[30] Julian Wälde,et al. XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V , 2018, IACR Cryptol. ePrint Arch..
[31] Ronald Cramer,et al. Short Stickelberger Class Relations and Application to Ideal-SVP , 2016, EUROCRYPT.
[32] Nikil Dutt,et al. Special session: trends, challenges and needs for lattice-based cryptography implementations , 2017, 2017 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).