Results 11 to 20 of about 7,503 (231)

Revisiting Keccak and Dilithium Implementations on ARMv7-M

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Keccak is widely used in lattice-based cryptography (LBC) and its impact to the overall running time in LBC scheme can be predominant on platforms lacking dedicated SHA-3 instructions. This holds true on embedded devices for Kyber and Dilithium, two LBC
Junhao Huang   +7 more
doaj   +2 more sources

PUF-Dilithium: Design of a PUF-Based Dilithium Architecture Benchmarked on ARM Processors

open access: yesACM Transactions on Embedded Computing Systems, 2023
<p>In this paper, by taking advantage of physical unclonable functions (PUFs), we introduce a novel design that provides physical security to CRYSTALS-Dilithium. After discussing the advantages of our design compared to the original design, we implemented it on two different architectures, ARMv7 and ARMv8.
Saeed Aghapour   +4 more
openaire   +2 more sources

Rejected Signatures’ Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Rejection sampling is a crucial security mechanism in lattice-based signature schemes that follow the Fiat-Shamir with aborts paradigm, such as MLDSA/ CRYSTALS-Dilithium.
Yuanyuan Zhou   +3 more
doaj   +2 more sources

From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
The post-quantum digital signature scheme CRYSTALS-Dilithium has been recently selected by the NIST for standardization. Implementing CRYSTALSDilithium, and other post-quantum cryptography schemes, on embedded devices raises a new set of challenges ...
Mohamed ElGhamrawy   +7 more
doaj   +2 more sources

Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
for Dilithium, the post-quantum signature scheme recently standardized by NIST. We improve the masked generation of the masking vector y, based on a fast Booleanto- arithmetic conversion modulo q.
Jean-Sébastien Coron   +4 more
doaj   +2 more sources

Correction Fault Attacks on Randomized CRYSTALS-Dilithium

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices.
Elisabeth Krahmer   +3 more
doaj   +2 more sources

Falcon/Kyber and Dilithium/Kyber Network Stack on Nvidia’s Data Processing Unit Platform

open access: yesIEEE Access
Commercially available quantum computers are expected to reshape the world in the near future. They are said to break conventional cryptographic security mechanisms that are deeply embedded in our today’s communication.
D. C. Lawo   +7 more
doaj   +2 more sources

Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Kyber and Dilithium are both lattice-based post-quantum cryptography (PQC) algorithms that have been selected for standardization by the American National Institute of Standards and Technology (NIST). NIST recommends them as two primary algorithms to be
Tengfei Wang   +4 more
doaj   +2 more sources

Exploiting Small-Norm Polynomial Multiplication with Physical Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
We present a set of physical profiled attacks against CRYSTALS-Dilithium that accumulate noisy knowledge on secret keys over multiple signatures, finally leading to a full key recovery attack. The methodology is composed of two steps.
Olivier Bronchain   +4 more
doaj   +2 more sources

High-Speed NTT Accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium

open access: yesIEEE Access
The efficiency of polynomial multiplication execution majorly impacts the performance of lattice-based post-quantum cryptosystems. In this research, we propose a high-speed hardware architecture to accelerate polynomial multiplication based on the Number
Trong-Hung Nguyen   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy