2012
DOI: 10.1007/978-3-642-33027-8_22
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Implementations of MQPKS on Constrained Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(18 citation statements)
references
References 23 publications
0
18
0
Order By: Relevance
“…For instance, for the crypto part, we focused on the lattice-based approaches NewHope and Frodo, as they have recently gained a lot of attention. However, there exist other post-quantum security implementations targeted for IoT devices, including lattice-based crypto [12][13][14][15] and multivariate crypto [17,18]. Furthermore, the efficiency of the NIST candidate proposals for post-quantum cryptography needs to be addressed.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, for the crypto part, we focused on the lattice-based approaches NewHope and Frodo, as they have recently gained a lot of attention. However, there exist other post-quantum security implementations targeted for IoT devices, including lattice-based crypto [12][13][14][15] and multivariate crypto [17,18]. Furthermore, the efficiency of the NIST candidate proposals for post-quantum cryptography needs to be addressed.…”
Section: Discussionmentioning
confidence: 99%
“…Feasibility of the proposals has been validated by analysing the computational complexity of the algorithms and by evaluating the implementations experimentally (see e.g., [5,6,[12][13][14][15][16][17][18]). In this paper, we propose a simulation-based approach-based on the ABSOLUT tool [19]-for evaluating the energy efficiency of security algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…PKC is considered to be too computationally expensive for small devices if not accelerated by cryptographic hardware. Recent studies [1], [44], [45], [46] showed that it is feasible to apply PKCs to small wireless devices with very limited resources by choosing public-key cryptographic algorithms. We will discuss security goals and models for public-key encryption and public-key signature, public key infrastructure, and identity-based cryptography in the following subsections.…”
Section: A Pkc Vs Symmetric-key Cryptographymentioning
confidence: 99%
“…There are only very few exceptions like the signature schemes UOV and its layer based variants Rainbow.IMPLEMENTATIONS OF MQ-PKCS. At CHES 2012, Czypek et al[46] implemented the MQ-signature schemes, UOV, Rainbow and enTTS, on an 8-bit microcontroller with 32MHz. The parameter sets of UOV, 0/1-UOV, Rainbow and enTTS for several security levels and their implementation results are summarized inTable 14.…”
mentioning
confidence: 99%
“…Multivariate signatures are claimed to be one of the fastest signatures, in particular, Rainbow [4] and TTS [5]. Multiple methodologies for accelerating the implementation of multivariate cryptography have been proposed due to its applicability in the area of engineering [6][7][8][9][10][11][12][13][14]. Among these methodologies, optimization of finite field multiplication is playing a crucial role since it is the most fundamental arithmetic in multivariate cryptography.…”
Section: Introductionmentioning
confidence: 99%