2020
DOI: 10.1109/tcsi.2019.2956651
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Implementation of the NewHope Key Exchange on FPGAs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
2

Relationship

2
8

Authors

Journals

citations
Cited by 37 publications
(11 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…With more butterfly cores, the number of reduction units, located behind multiplier in butterfly units should also be increased accordingly. Besides, RAM structure should be modified elaborately to ensure enough data bandwidth [BUC19] [XL20]. Similarly, bandwidth of Keccak core needs to be tuned accordingly, which is relatively easy as data input/output and round function are conducted separately.…”
Section: Discussion About Performance and Resource Utilizationmentioning
confidence: 99%
“…With more butterfly cores, the number of reduction units, located behind multiplier in butterfly units should also be increased accordingly. Besides, RAM structure should be modified elaborately to ensure enough data bandwidth [BUC19] [XL20]. Similarly, bandwidth of Keccak core needs to be tuned accordingly, which is relatively easy as data input/output and round function are conducted separately.…”
Section: Discussion About Performance and Resource Utilizationmentioning
confidence: 99%
“…The random number is generated through a 128-bit Trivium PRNG [33] due to its reasonable throughput and small hardware resource consumption. Previously, Trivium was also used to generate random samples in cryptoprocessor [38], signifying that this is a reasonable choice of implementing PRNG. The Gimli hash generates 256-bit output, while Gimli AE generates 256-bit encryption output, which corresponds to the encryption input in this protocol.…”
Section: Application Of Gimli To Rfid Authenticationmentioning
confidence: 99%
“…Modular Reduction [9] propose K-RED and K-RED-2x functions to calculate the modular reduction, but the result is incomplete. For a specific prime, such as p = 3 × 2 12 + 1 used in NewHop [10], p = (2 32 − 1) × 2 32 + 1 used in [4] [11] [12], they further design the modular reduction unit to achieve constant time calculation. In this paper we specificaly consider p = (2 32 − 1) × 2 32 + 1, but this method is also useful for other prime numbers that have the form k • 2 m ± l.…”
Section: A Number Theoretic Transformmentioning
confidence: 99%