-
1
-
2
-
3
-
4
Accelerating Post-Quantum Cryptography using an Energy-Efficient TLS Crypto-Processor
Published 2020“…Post-quantum cryptography (PQC) is currently a growing area of research and NIST PQC Round 2 schemes are being actively analyzed and optimized for both security and efficiency. …”
Get full text
Article -
5
Lightweight key encapsulation using LDPC codes on FPGAs
Published 2021Subjects: Get full text
Journal Article -
6
-
7
Cryptanalysis of NTRU: a post quantum algorithm
Published 2024Subjects: Get full text
Final Year Project (FYP) -
8
Secure computing systems using emerging technologies
Published 2025Subjects: Get full text
Thesis-Doctor of Philosophy -
9
Developing secure, ultra-low power RISC processor
Published 2023“…This project aims to develop a hybrid implementation of the firmware over-the-air update process, incorporating both classical and post-quantum cryptography. The project was successful in developing a hybrid implementation that is able to verify digital signatures from both a classical and a post quantum cryptography algorithm. …”
Get full text
Final Year Project (FYP) -
10
Evaluating software packages for attacks against elliptic curve cryptography
Published 2016“…Until the coming of quantum computers and post-quantum cryptography, elliptic curve cryptography seems to be a prime candidate for modern encryption systems. …”
Report -
11
Novel forgery mechanisms in multivariate signature schemes
Published 2023“…Multivariate cryptography is listed among the promising candidates for post-quantum cryptography primitives. Its hard problem depends on the difficulty of solving m multivariate quadratic equations in n variables over a finite field, hence the name Multivariate Quadratic Problem (MQP). …”
Article -
12
New and improved zero-knowledge argument systems for code-based cryptography
Published 2022“…To this end, NIST proposed Post-Quantum Cryptography Standardization process to solicit, evaluate, and standardize quantum-resistant cryptographic algorithms. …”
Get full text
Thesis-Doctor of Philosophy -
13
Verifying Correctness of the Number Theoretic Transform and Fast Number Theoretic Transform in F⋆
Published 2024“…The Number Theoretic Transform (NTT) is an algorithm that enables efficient polynomial multiplication and has recently gained importance in post-quantum cryptography. This thesis presents a proof of correctness of the NTT in F⋆ , a proof-oriented programming language that extracts to OCaml, and shows that we can use the NTT to perform polynomial multiplications. …”
Get full text
Thesis -
14
On the Security of Supersingular Isogeny Cryptosystems
Published 2016“…This is an active area of research in post-quantum cryptography. Our first contribution is to give a very powerful active attack on the supersingular isogeny encryption scheme. …”
Conference item -
15
The do's and don'ts of quantum memory in cryptanalysis
Published 2023“…This algorithm can attack “CSIDH”, a type of post-quantum cryptography. Again QRAM is an effective tool: huge classical co-processing costs offset the expense of each quantum memory access. …”
Thesis -
16
Lattice-based cryptography: the dots that provide information security
Published 2023“…Since the novel discovery of Shor’s quantum algorithm, current interest in cryptography is moving towards a new direction called Post-Quantum Cryptography. Once quantum computing technology is ready to be deployed effectively, the Shor’s quantum algorithm would become a major threat on number-theoretical based cryptosystems that are widely used today such as the RSA, ElGamal, and Elliptic Curve cryptosystems. …”
Get full text
Get full text
Proceedings -
17
Efficient Algorithms, Protocols and Hardware Architectures for Next-Generation Cryptography in Embedded Systems
Published 2022“…Using circuit, architecture and algorithm techniques, efficient hardware-accelerated implementations of elliptic curve cryptography, pairing-based cryptography, lattice-based cryptography and other post-quantum cryptography algorithms are demonstrated with up to two orders of magnitude energy savings compared to state-of-the-art software and hardware. …”
Get full text
Get full text
Thesis -
18
Machine learning and hardware security : challenges and opportunities
Published 2021“…This paper first highlights novel applications of machine learning for hardware security, such as evaluation of post quantum cryptography hardware and extraction of physically unclonable functions from neural networks. …”
Get full text
Journal Article -
19
On configurable SCA countermeasures against single trace attacks for the NTT
Published 2021“…The Number Theoretic Transform (NTT) is a critical subblock used in several structured lattice-based schemes, including Kyber and Dilithium, which are finalist candidates in the NIST’s standardization process for post-quantum cryptography. The NTT was shown to be susceptible to single trace side-channel attacks by Primas et al. in CHES 2017 and Pessl et al. in Latincrypt 2019 who demonstrated full key recovery from single traces on the ARM Cortex-M4 microcontroller. …”
Get full text
Conference Paper -
20
Review and comparison of US, EU, and UK regulations on cyber risk/security of the current Blockchain Technologies - viewpoint from 2023
Published 2023“…This article starts with a comparison of existing cybersecurity standards and regulations from the National Institute of Standards and Technology (NIST) and the International Organisation for Standardisation (ISO)—ISO27001, followed by a discussion on more specific and recent standards and regulations, such as the Markets in Crypto-Assets Regulation (MiCA), Committee on Payments and Market Infrastructures and the International Organisation of Securities Commissions (CPMI-IOSCO), and more general cryptography (and post-quantum cryptography), in the context of cybersecurity. …”
Journal article