1 |
NIST. "Post-Quantum Cryptography," (https://cs rc.nist.gov/Projects/Post-Quantum-Cryptography).
|
2 |
M. Kannwischer, J. Rijneveld, P. Schwabe, K. Stoffelen, "PQM4: Post-quantum crypto library for the ARM Cortex-M4," 2018.
|
3 |
P. Schwabe, K. Stoffelen, "All the AES you need on Cortex-M3 and M4," In International Conference on Selected Areas in Cryptography, pp. 180-194, 2016.
|
4 |
J. Bos, S. Friedberger, M. Martinoli, E. Oswald, M. Stam, "Fly, you fool! Faster Frodo for the ARM Cortex-M4," IACR Cryptology ePrint Archive, 2018.
|
5 |
J. Howe, T. Oder, M. Krausz, T. Guneysu, "Standard lattice-based key encapsulation on embedded devices," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 372-393, 2018.
|
6 |
L. Botros, M. Kannwischer, P. Schwabe, "Memory-efficient high-speed implementation of Kyber on Cortex-M4," In International Conference on Cryptology in Africa pp. 209-228, 2019.
|
7 |
T. Guneysu, M. Krausz, T. Oder, J. Speith, "Evaluation of lattice-based signature schemes in embedded systems," In 2018 25th IEEE International Conference on Electronics, Circuits and Systems, pp. 385-388, 2018.
|
8 |
M. Kannwischer, J. Rijneveld, P. Schwabe, "Faster multiplication in Z2m [x] on Cortex-M4 to speed up NIST PQC candidates," Cryptology ePrint Archive, Report 2018/1018, 2018.
|
9 |
A. Karmakar, I. Verbauwhede, "Saber on ARM. CCA-secure module lattice-based key encapsulation on ARM," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 243-266, 2018.
|
10 |
T. Oder, J. Speith, K. Holtgen, T. Guneysu, "Towards Practical Microcontroller Implementation of the Signature Scheme Falcon," In International Conference on Post Quantum Cryptography, pp. 1-17, 2019.
|
11 |
J. Lablanche, L. Mortajine, O. Benchaalal, P. Cayrel, & N. El Mrabet, "Optimized implementation of the NIST PQC submission ROLLO on microcontroller," Cryptology ePrint Archive, Report 2019/787, 2019.
|
12 |
H. Seo, A. Jalali, R. Azarderakhsh, "SIKE round 2 speed record on ARM Cortex-M4," In International Conference on Cryptology and Network Security, pp. 39-60, 2019.
|