Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Ruben Niederhagen"'
Autor:
Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 3 (2022)
We present the first specification-compliant constant-time FPGA implementation of the Classic McEliece cryptosystem from the third-round of NIST’s Post-Quantum Cryptography standardization process. In particular, we present the first complete imple
Externí odkaz:
https://doaj.org/article/0b036a4f504746a7a2b86afcddb072b9
Autor:
Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 1 (2020)
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) propose
Externí odkaz:
https://doaj.org/article/fb164585af0447278192b10d67273ab2
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
We present and evaluate a custom extension to the RISC-V instruction set for finite field arithmetic. The result serves as a very compact approach to software-hardware co-design of PQC implementations in the context of small embedded processors such
Externí odkaz:
https://doaj.org/article/749d4bd2dd6946869efe9c001bf71e48
Autor:
Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031334900
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::91c357700d2c351bee13662cf2e2ef65
https://doi.org/10.1007/978-3-031-33491-7_4
https://doi.org/10.1007/978-3-031-33491-7_4
Publikováno v:
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security.
Publikováno v:
Progress in Cryptology-AFRICACRYPT 2022 ISBN: 9783031174322
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6edef2e3430d992904a50792e9563c9b
https://doi.org/10.1007/978-3-031-17433-9_12
https://doi.org/10.1007/978-3-031-17433-9_12
Publikováno v:
AsiaCCS
We present our integration of post-quantum cryptography (PQC), more specifically of the post-quantum KEM scheme Kyber for key establishment and the post-quantum signature scheme SPHINCS+, into the embedded TLS library mbed TLS. We measure the perform
Publikováno v:
ICCD
This paper presents the first 28 nm ASIC implementation of an accelerator for the post-quantum digital signature scheme XMSS. In particular, this paper presents an architecture for a novel, pipelined XMSS Leaf accelerator for accelerating the most co
Autor:
Vinay B. Y. Kumar, Ruben Niederhagen, Naina Gupta, Michael Kaspert, Anupam Chattopadhyay, Christoph Krauß
Publikováno v:
DATE
A secure boot protocol is fundamental to ensuring the integrity of the trusted computing base of a secure system. The use of digital signature algorithms (DSAs) based on traditional asymmetric cryptography, particularly for secure boot, leaves such s
We present and evaluate a custom extension to the RISC-V instruction set for finite field arithmetic. The result serves as a very compact approach to software-hardware co-design of PQC implementations in the context of small embedded processors such
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7797a98f461d1e00bc597e55531c4a91
https://publica.fraunhofer.de/handle/publica/263223
https://publica.fraunhofer.de/handle/publica/263223