Document Open Access Logo

Secure and Efficient Post-Quantum Cryptography in Hardware and Software (Dagstuhl Seminar 23152)

Authors Thomas Pöppelmann, Sujoy Sinha Roy, Ingrid Verbauwhede and all authors of the abstracts in this report



PDF
Thumbnail PDF

File

DagRep.13.4.24.pdf
  • Filesize: 2.14 MB
  • 16 pages

Document Identifiers

Author Details

Thomas Pöppelmann
  • Infineon Technologies AG - Neubiberg, DE
Sujoy Sinha Roy
  • TU Graz, AT
Ingrid Verbauwhede
  • KU Leuven, BE
and all authors of the abstracts in this report

Cite AsGet BibTex

Thomas Pöppelmann, Sujoy Sinha Roy, and Ingrid Verbauwhede. Secure and Efficient Post-Quantum Cryptography in Hardware and Software (Dagstuhl Seminar 23152). In Dagstuhl Reports, Volume 13, Issue 4, pp. 24-39, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2023)
https://doi.org/10.4230/DagRep.13.4.24

Abstract

NIST recently announced the winners of its post-quantum cryptography (PQC) standardization process and outlined the next steps in its ongoing standardization efforts. With fewer algorithms now in the focus of the cryptographic community, the time has come to intensify the investigation of efficiency and physical security aspects of PQC algorithms. This is required to enable PQC in real-life applications and to provide feedback to NIST and submitters before final standardization. To allow widespread adoption, the implementation of PQC in current microchip technologies must be possible within application- or platform-specific constraints such as area, memory, time, power, and energy budgets. Furthermore, more and more PQC use-cases require resistance to physical attacks like power analysis. The primary aim of this Dagstuhl Seminar was to initiate deeper investigations into secure and efficient implementations of PQC on hardware and hardware/software codesign platforms. In this direction, the seminar brought together researchers in theoretical cryptology, applied cryptography, cryptographic hardware and software systems, and physical security. During the seminar, participants identified new challenges and research directions in PQC, exchanged thoughts and ideas, and initiated collaborations on researching secured and efficient design methodologies for PQC.

Subject Classification

ACM Subject Classification
  • Security and privacy → Public key (asymmetric) techniques
  • Security and privacy → Hardware security implementation
  • Security and privacy → Hardware attacks and countermeasures
Keywords
  • Post-quantum cryptography
  • secure hardware and software
  • cryptographic implementations
  • side-channel attacks
  • fault attacks
  • countermeasures against attacks

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail