Paper 2021/1648
A Scalable SIMD RISC-V based Processor with Customized Vector Extensions for CRYSTALS-Kyber
Abstract
SHA-3 is considered to be one of the most secure standardized hash functions. It relies on the Keccak-f[1,600] permutation, which operates on an internal state of 1,600 bits, mostly represented as a
Metadata
- Available format(s)
-
PDF
- Category
- Implementation
- Publication info
- Preprint.
- Keywords
- Lattice-based Cryptography Polynomial Operation Vector Instruction SIMD Processor RISC-V ISA Extension
- Contact author(s)
-
H Li-7 @ tudelft nl
nele mentens @ kuleuven be
s picek @ tudelft nl - History
- 2022-09-28: last of 4 revisions
- 2021-12-17: received
- See all versions
- Short URL
- https://ia.cr/2021/1648
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/1648, author = {Huimin Li and Nele Mentens and Stjepan Picek}, title = {A Scalable {SIMD} {RISC}-V based Processor with Customized Vector Extensions for {CRYSTALS}-Kyber}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/1648}, year = {2021}, url = {https://eprint.iacr.org/2021/1648} }