2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2022
DOI: 10.1109/host54066.2022.9839742
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Side-Channel Resistant Design of High-Security Ed448 on ARM Cortex-M4

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 17 publications
0
1
0
Order By: Relevance
“…However, the design, standardization, and deployment of such a mechanism take a considerable amount of time. Or using post-quantum cryptography [28]- [30] to protect the security of RPKI. Prior to the deployment of other effective mitigation measures, it is recommended to use the issuance policy of ROA with a single prefix.…”
Section: Discussionmentioning
confidence: 99%
“…However, the design, standardization, and deployment of such a mechanism take a considerable amount of time. Or using post-quantum cryptography [28]- [30] to protect the security of RPKI. Prior to the deployment of other effective mitigation measures, it is recommended to use the issuance policy of ROA with a single prefix.…”
Section: Discussionmentioning
confidence: 99%
“…• Curve448 and Ed448 on Cortex-M4 (Anastasova et al, 2022b): The authors explore the implementation of postquantum cryptographic algorithms on low-power devices such as Cortex-M4. They presents an efficient design for both Curve448 and Ed448 protocols based on Montgomery curve Curve448 and its birationally equivalent Edwards curve.…”
Section: Overview For Post-quantum Cryptographymentioning
confidence: 99%
“…Ref. [100] have concentrated their efforts on the creation and research of PQC implementations on ARM processors, more notably the Cortex-M4 and Cortex-A processors. The authors go over the specifics of how the Curve448 and Ed448 algorithms were ported to the Cortex-M4 microcontroller.…”
Section: Implementations Of Fault Detection and Pqcmentioning
confidence: 99%
“…Based on the findings, a novel cryptographic accelerator using Ed25519 was proposed for use with digital signatures. Secure communication is provided by the Supersingular isogeny key encapsulation (SIKE) protocol, which employs the Diffie-Hellman key exchange protocol based on elliptic curve arithmetic and isogeny maps [100]. Constant-time and constant-memory algorithms, which stop information from escaping through side channels, are the primary emphasis of the implementation, which is designed to make the system more secure and private.…”
Section: Implementations Of Fault Detection and Pqcmentioning
confidence: 99%
See 1 more Smart Citation