Hardware Architectures for Post-Quantum Digital Signature Schemes

Hardware Architectures for Post-Quantum Digital Signature Schemes
Author: Deepraj Soni
Publisher: Springer Nature
Total Pages: 185
Release: 2020-10-27
Genre: Technology & Engineering
ISBN: 3030576825

This book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algorithms for signature generation and signature verification from a hardware implementation perspective, especially focusing on C-based design, power-performance-area-security (PPAS) trade-offs and design flows targeting FPGAs and ASICs. Describes a comprehensive set of synthesizable c code base as well as the hardware implementations for the different types of PQC algorithms including lattice-based, code-based, and multivariate-based; Demonstrates the hardware (FPGA and ASIC) and hardware-software optimizations and trade-offs of the NIST round 2 signature-based PQC algorithms; Enables designers to build hardware implementations that are resilient to a variety of side-channels.

Hardware Architectures for Post-Quantum Digital Signature Schemes

Hardware Architectures for Post-Quantum Digital Signature Schemes
Author: Deepraj Soni
Publisher:
Total Pages: 0
Release: 2021
Genre:
ISBN: 9783030576837

This book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algorithms for signature generation and signature verification from a hardware implementation perspective, especially focusing on C-based design, power-performance-area-security (PPAS) trade-offs and design flows targeting FPGAs and ASICs. Describes a comprehensive set of synthesizable c code base as well as the hardware implementations for the different types of PQC algorithms including lattice-based, code-based, and multivariate-based; Demonstrates the hardware (FPGA and ASIC) and hardware-software optimizations and trade-offs of the NIST round 2 signature-based PQC algorithms; Enables designers to build hardware implementations that are resilient to a variety of side-channels.

Codes, Cryptology and Information Security

Codes, Cryptology and Information Security
Author: Said El Hajji
Publisher: Springer Nature
Total Pages: 415
Release: 2023-05-18
Genre: Computers
ISBN: 303133017X

This book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, held in Rabat, Morocco, during May 29–31, 2023. The 21 full papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: Invited Papers, Cryptography, Information Security, Discrete Mathematics, Coding Theory.

Post-Quantum Cryptography

Post-Quantum Cryptography
Author: Thomas Johansson
Publisher: Springer Nature
Total Pages: 715
Release: 2023-08-09
Genre: Computers
ISBN: 3031400038

This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park, MD, USA, in August 14–18, 2023. The 25 full papers presented in this book were carefully reviewed and selected from 51 submissions. They are categorized in the following topical sections: code-based cryptography; group-action-based cryptography; isogenye-based cryptography; lattice-based cryptography; multivariate cryptography; quantum algorithms, cryptanalysis and models; post-quantum protocols; side channel cryptanalysis and countermeasures.

Advancing Cyber Security Through Quantum Cryptography

Advancing Cyber Security Through Quantum Cryptography
Author: Chaubey, Nirbhay Kumar
Publisher: IGI Global
Total Pages: 596
Release: 2024-10-23
Genre: Computers
ISBN:

With the increasing power of computing, cybersecurity faces mounting threats, making digital systems more vulnerable to attacks. While modern cryptography used to be compelling, it now shows vulnerabilities against rapidly growing computational capabilities. Therefore, robust security solutions have become urgent in this precarious landscape. Advancing Cyber Security Through Quantum Cryptography is a book that can guide us through the turbulent waters of cybersecurity and quantum cryptography. It offers a panoramic view of current affairs, insightful analyses, illuminating case studies, and meticulous exploration of challenges and opportunities. Through this book, readers can gain knowledge and navigate this complex terrain. It delves into critical areas where quantum cryptography can fortify cybersecurity defenses, such as secure communications, e-commerce, and quantum internet.

Selected Areas in Cryptography – SAC 2019

Selected Areas in Cryptography – SAC 2019
Author: Kenneth G. Paterson
Publisher: Springer Nature
Total Pages: 716
Release: 2020-01-09
Genre: Computers
ISBN: 3030384713

This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 full papers presented in this volume were carefully reviewed and selected from 74 submissions. They cover the following research areas: Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.

Principles and Practice of Blockchains

Principles and Practice of Blockchains
Author: Kevin Daimi
Publisher: Springer Nature
Total Pages: 398
Release: 2022-11-21
Genre: Technology & Engineering
ISBN: 3031105079

This book provides an essential compilation of relevant and cutting edge academic and industry work on key Blockchain topics. This book concentrates on a wide range of advances related to Blockchains which include, among others, Blockchain principles, architecture and concepts with emphasis on key and innovative theories, methodologies, schemes and technologies of Blockchain, Blockchain platforms and architecture, Blockchain protocols, sensors and devices for Blockchain, Blockchain foundations, and reliability analysis of Blockchain-based systems. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity application experts in the listed fields and edited by prominent cybersecurity applications researchers and specialists.

Smart Card Research and Advanced Applications

Smart Card Research and Advanced Applications
Author: Vincent Grosso
Publisher: Springer Nature
Total Pages: 315
Release: 2022-03-08
Genre: Computers
ISBN: 3030973484

This book constitutes the proceedings of the 20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021, which took place in November 2021. The conference took place in Lübeck, Germany, and changed to a hybrid format due to the COVID-19 pandemic. The 16 full papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named Side-Channel Attacks, Fault Attacks, Public Key and Secure Implementations.

Lattice-Based Public-Key Cryptography in Hardware

Lattice-Based Public-Key Cryptography in Hardware
Author: Sujoy Sinha Roy
Publisher: Springer Nature
Total Pages: 109
Release: 2019-11-12
Genre: Technology & Engineering
ISBN: 9813299940

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.