2020 57th ACM/IEEE Design Automation Conference (DAC) 2020
DOI: 10.1109/dac18072.2020.9218727
|View full text |Cite
|
Sign up to set email alerts
|

Compact domain-specific co-processor for accelerating module lattice-based KEM

Abstract: We present a domain-specific co-processor to speed up Saber, a post-quantum key encapsulation mechanism competing on the NIST Post-Quantum Cryptography standardization process. Contrary to most lattice-based schemes, Saber doesn't use NTT-based polynomial multiplication. We follow a hardwaresoftware co-design approach: the execution is performed on an ARM core and only the most computationally expensive operation, i.e., polynomial multiplication, is offloaded to the coprocessor to obtain a compact design. We e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…We consume 2× more area compared to [21] and deliver 3.5× better performance. Our unified cryptoprocessor outperforms [8], [9] and shows a similar performance compared to the architectures in [6], [7].…”
Section: Comparisons With Dilithium-only Implementationsmentioning
confidence: 97%
See 2 more Smart Citations
“…We consume 2× more area compared to [21] and deliver 3.5× better performance. Our unified cryptoprocessor outperforms [8], [9] and shows a similar performance compared to the architectures in [6], [7].…”
Section: Comparisons With Dilithium-only Implementationsmentioning
confidence: 97%
“…Our implementation is 2× slower but consumes 1.5× less area and provides the flexibility to do the operations in parallel or sequentially. Comparisons with Saber-only implementations: There are several works in the literature implementing Saber in hardware, e.g., [5], [6], [7], [8], [9], [24] on FPGA and [10], [11], [21], [23] on ASIC platforms. Their area and performance results along with our work are presented in Table 6.…”
Section: Comparisons With Dilithium-only Implementationsmentioning
confidence: 99%
See 1 more Smart Citation
“…A comparison of the time and power consumption of the back-end design completed using the TSMC 65 nm process with other post-quantum cryptographic algorithm hardware implementations is shown in Table 4. Study [10], study [11], and the current design all involve software/hardware implementations of the Saber algorithm. With the same flow of the algorithm, the comparison focuses on the power consumption and area of the algorithm implementation.…”
Section: Comparison With Related Literaturementioning
confidence: 99%
“…To further optimize the Saber algorithm, Sujoy et al [9] used vector processing instructions to process the algorithm operations in parallel, resulting in a nearly 1.5-fold increase in throughput, while increasing the latency of individual operations by a factor of about 3. In terms of hardware-software co-design, Mera et al [10] and Dang et al [11] used a hardware-software co-design strategy to allocate hardware-software resources for cryptographic algorithms through software algorithms, which can achieve high-speed and flexible cryptographic algorithms. Although hardware-software co-design has obvious advantages in terms of flexibility in algorithm implementation, there are still shortcomings in terms of latency and throughput, so hardware implementation of algorithms has become a research trend.…”
Section: Introductionmentioning
confidence: 99%