2023
DOI: 10.48550/arxiv.2301.04888
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Code-based Cryptography in IoT: A HW/SW Co-Design of HQC

Abstract: Recent advances in quantum computing pose a serious threat on the security of widely used public-key cryptosystems. Thus, new post-quantum cryptographic algorithms have been proposed as part of the associated US NIST process to enable secure, encrypted communication in the age of quantum computing. Many hardware accelerators for structured latticebased algorithms have already been published to meet the strict power, area and latency requirements of low-power IoT edge devices. However, the security of these alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
0
0
Order By: Relevance
“…The target code-based algorithms use arithmetic with bit polynomials over the finite field GF 2 [x], whose coefficients are either 0 or 1. Bit polynomial multiplication is a performance bottleneck in these algorithms [36,37]. In Classic McEliece and HQC, bit polynomial inversion over the finite field involves finite-field arithmetic, including repetitive multiplication and square operations.…”
Section: -Point Ct Butterfly-based Nttmentioning
confidence: 99%
“…The target code-based algorithms use arithmetic with bit polynomials over the finite field GF 2 [x], whose coefficients are either 0 or 1. Bit polynomial multiplication is a performance bottleneck in these algorithms [36,37]. In Classic McEliece and HQC, bit polynomial inversion over the finite field involves finite-field arithmetic, including repetitive multiplication and square operations.…”
Section: -Point Ct Butterfly-based Nttmentioning
confidence: 99%
“…Our approach differs, aiming to implement an efficient NTRU-KEM algorithm with full functionality, including KEYGEN. We adopt a hardware and software co-design methodology, a well-established platform for PQC algorithm accelerators [16,17], proven effective in addressing challenges associated with NTRU-KEM. This approach combines the strengths of both hardware and software components.…”
Section: Introductionmentioning
confidence: 99%