Full hardware implementation of the Post-Quantum Public-Key Cryptography Scheme Round5.
Michal AndrzejczakFarnoud FarahmandKris GajPublished in: ReConFig (2019)
Keyphrases
- hardware implementation
- public key cryptography
- public key
- elliptic curve
- provably secure
- elliptic curve cryptography
- security model
- signal processing
- efficient implementation
- field programmable gate array
- authentication and key agreement
- digital signature
- security analysis
- image processing algorithms
- security services
- authentication scheme
- image processing
- standard model
- diffie hellman
- bilinear pairings
- access control
- computer vision
- general purpose processors
- neural network