About 2,630,000 results
Open links in new tab
  1. A Survey of Post-Quantum Cryptography Support in Cryptographic

    Aug 22, 2025 · This research study examines the state of post-quantum algorithm support in widely used open-source cryptographic libraries, with the main focus on implementations of the NIST PQC …

  2. In this work we present a flexible hardware architecture for selected algorithms, Kyber and Dilithium. Our architecture includes separate instances optimized for either Kyber and Dilithium as well as a …

  3. Adams Bridge: An Accelerator for Post-Quantum Resilient Cryptography

    Oct 15, 2024 · To accelerate the adoption of these quantum resilient algorithms and to increase trustworthiness of hardware security, Microsoft is open sourcing our new Adams Bridge Accelerator …

  4. Optimized Hardware-Software Co-Design for Kyber and Dilithium on …

    Jul 18, 2024 · In this work, we present an optimized hardware-software co-design for Kyber and Dilithium on the industry’s first RISC-V System-on-Chip (SoC) Field Programmable Gate Array …

  5. In this work, we focus on designing high-throughput FPGA hardware accelerators for the lattice-based CRYSTALS-Kyber and CRYSTALS-Dilithium (from now on, just Kyber and Dilithium) using High …

  6. Acceleration of Core Post-quantum Cryptography Primitive on Open-Source ...

    Oct 2, 2024 · Our target platform is the OpenTitan Big Number Accelerator (OTBN), part of the first open-source silicon root-of-trust chip. We implemented the Kyber NTT in OTBN assembly, using …

  7. Performance and Storage Analysis of CRYSTALS-Kyber (ML-KEM) as a …

    Aug 7, 2025 · Our findings demonstrate that Kyber provides robust security guarantees against quantum attacks while maintaining acceptable performance profiles for most contemporary applications, …

  8. High-Throughput Post-Quantum Cryptographic System: CRYSTALS-Kyber

    Jul 24, 2025 · To meet the growing demand for secure high-throughput data transmission in cloud services, we propose an optimized CRYSTALS-Kyber hardware design that parallelizes NTT, SHA …

  9. GitHub - ingonyama-zk/icicle: A hardware acceleration library for ...

    ICICLE is a high-performance cryptographic acceleration library designed to optimize cryptographic computations across various hardware platforms, including CPUs, GPUs, and other accelerators. …

  10. We also use AES and SHA2 hardware primitives to substitute SHA3 computations and accelerate lattice-based Kyber, Frodo and ThreeBears key encapsulation and hash-based SPHINCS+ signatures.