2024
DOI: 10.1109/mdat.2023.3305156
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Accelerators for Digital Signature Algorithms Dilithium and FALCON

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The next step is to separately calculate the hash of the signed file using a known hash function (5). Then, these two hashes must be compared (6). If they are equal, this confirms the non-repudiation and integrity of the signed data.…”
Section: Modern Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…The next step is to separately calculate the hash of the signed file using a known hash function (5). Then, these two hashes must be compared (6). If they are equal, this confirms the non-repudiation and integrity of the signed data.…”
Section: Modern Cryptographymentioning
confidence: 99%
“…The exploration and implementation of these algorithms, particularly in the context of digital signatures, is the focus of this paper [2]. It is worth mentioning that hardware acceleration of postquantum cryptography can improve the performance; however, the speed factor strongly depends on the family of the algorithm [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%