Publicaties
A 334 - μW 0.158 - mm2 ASIC for Post-Quantum Key-Encapsulation Mechanism Saber With Low-Latency Striding Toom–Cook Multiplication KU Leuven
Lattice-based cryptography is a novel approach to public key cryptography (PKC), of which the mathematical investigation (so far) resists attacks from quantum computers. By choosing a module learning with errors (MLWE) algorithm as the next standard, the National Institute of Standards and Technology (NIST) follows this approach. The multiplication of polynomials is the central bottleneck in the computation of lattice-based cryptography. Because ...
Cache Side-Channel Attacks on Existing and Emerging Computing Platforms KU Leuven
The act of executing a program on a computing platform produces inadvertent side effects that depend on the data being processed. Microarchitectural side- channel attacks leverage the side effects stemming from interference in shared
hardware components to extract potentially sensitive data. Arguably the most important class of microarchitectural side-channel attacks are cache attacks, which target the shared cache hierarchy. This thesis ...
hardware components to extract potentially sensitive data. Arguably the most important class of microarchitectural side-channel attacks are cache attacks, which target the shared cache hierarchy. This thesis ...
Area-Time Efficient Implementation of NIST Lightweight Hash Functions Targeting IoT Applications KU Leuven
Implementation Aspects of Lattice-based Cryptography KU Leuven
In a modern world where our lives are all digital and connected, cryptography has become the fundamental pillar to guarantee our security. Over the coming decades, the impact of digital technologies in everyday life is going to increase even further. Cryptography protects the privacy and integrity of our data and communications in a hostile environment. The security of the cryptographic schemes depends on the computational intractability of ...
DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs KU Leuven
A 334uW 0.158mm2 Saber Learning with Rounding based Post-Quantum Crypto Accelerator KU Leuven
The arrival of large-scale quantum computers will break the security assurances of our current public-key cryptography. National Institute of Standard & Technology (NIST) is currently running a multi-year-long standardization procedure to select quantum-safe or postquantum cryptographic schemes to be used in the future. Energy efficiency is an important criterion in the selection process. This paper presents the first Silicon verified ASIC ...