{"id":"https://openalex.org/W4409895216","doi":"https://doi.org/10.1007/s13389-025-00369-5","title":"Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform","display_name":"Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform","publication_year":2025,"publication_date":"2025-04-28","ids":{"openalex":"https://openalex.org/W4409895216","doi":"https://doi.org/10.1007/s13389-025-00369-5"},"language":"en","primary_location":{"id":"doi:10.1007/s13389-025-00369-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-025-00369-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-025-00369-5.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s13389-025-00369-5.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050779972","display_name":"Tobias Stelzer","orcid":"https://orcid.org/0009-0007-0058-1107"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Tobias Stelzer","raw_affiliation_strings":["Fraunhofer AISEC, Garching, Germany"],"raw_orcid":"https://orcid.org/0009-0007-0058-1107","affiliations":[{"raw_affiliation_string":"Fraunhofer AISEC, Garching, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004911712","display_name":"Felix Oberhansl","orcid":"https://orcid.org/0000-0002-7822-2880"},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Felix Oberhansl","raw_affiliation_strings":["Fraunhofer AISEC, Garching, Germany"],"raw_orcid":"https://orcid.org/0000-0002-7822-2880","affiliations":[{"raw_affiliation_string":"Fraunhofer AISEC, Garching, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102735008","display_name":"Jonas Schupp","orcid":"https://orcid.org/0000-0002-4171-1656"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jonas Schupp","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0002-4171-1656","affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037163073","display_name":"Patrick Karl","orcid":"https://orcid.org/0000-0001-9476-9651"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Patrick Karl","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0001-9476-9651","affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5117364200","display_name":"Horia Turcuman","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Horia Turcuman","raw_affiliation_strings":["TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5050779972"],"corresponding_institution_ids":["https://openalex.org/I4210136922"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":6.0982,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.95680387,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"15","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6707597374916077},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based cryptography","score":0.6564300656318665},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6029708385467529},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.5411270260810852},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4911617934703827},{"id":"https://openalex.org/keywords/lattice","display_name":"Lattice (music)","score":0.4873724579811096},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.41217103600502014},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.4051287770271301},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2807005047798157},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.20887824892997742},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20490580797195435},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1913139820098877},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.09504282474517822},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09285777807235718},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.08351844549179077}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6707597374916077},{"id":"https://openalex.org/C137660015","wikidata":"https://www.wikidata.org/wiki/Q6497083","display_name":"Lattice-based cryptography","level":5,"score":0.6564300656318665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6029708385467529},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.5411270260810852},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4911617934703827},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.4873724579811096},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.41217103600502014},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.4051287770271301},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2807005047798157},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20887824892997742},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20490580797195435},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1913139820098877},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.09504282474517822},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09285777807235718},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.08351844549179077},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s13389-025-00369-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-025-00369-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-025-00369-5.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1781384","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1781384","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1792005","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1792005","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/489342","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/489342","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"journal article"}],"best_oa_location":{"id":"doi:10.1007/s13389-025-00369-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-025-00369-5","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-025-00369-5.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G241743678","display_name":null,"funder_award_id":"16KIS1390","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4409895216.pdf","grobid_xml":"https://content.openalex.org/works/W4409895216.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W1482543270","https://openalex.org/W1669999576","https://openalex.org/W1985439922","https://openalex.org/W2004814164","https://openalex.org/W2007466965","https://openalex.org/W2061171222","https://openalex.org/W2069441027","https://openalex.org/W2098290658","https://openalex.org/W2142048307","https://openalex.org/W2610744771","https://openalex.org/W2612903716","https://openalex.org/W2619630761","https://openalex.org/W2903457367","https://openalex.org/W2926259481","https://openalex.org/W2952334088","https://openalex.org/W2968786179","https://openalex.org/W3003875353","https://openalex.org/W3023478445","https://openalex.org/W3082903256","https://openalex.org/W3095245686","https://openalex.org/W3110442239","https://openalex.org/W3135053459","https://openalex.org/W3159034445","https://openalex.org/W3159164431","https://openalex.org/W3159258450","https://openalex.org/W3168016193","https://openalex.org/W3195434025","https://openalex.org/W3212142976","https://openalex.org/W3213547738","https://openalex.org/W3216234213","https://openalex.org/W4225986329","https://openalex.org/W4231286867","https://openalex.org/W4239141340","https://openalex.org/W4255893443","https://openalex.org/W4285302767","https://openalex.org/W4313645570","https://openalex.org/W4391473781","https://openalex.org/W4392754361","https://openalex.org/W4401568278","https://openalex.org/W6885400785","https://openalex.org/W6922644948"],"related_works":["https://openalex.org/W2315723423","https://openalex.org/W4385627932","https://openalex.org/W2411027466","https://openalex.org/W3194469932","https://openalex.org/W2295565109","https://openalex.org/W4235564189","https://openalex.org/W2591713603","https://openalex.org/W3201289751","https://openalex.org/W2945072089","https://openalex.org/W4389982864"],"abstract_inverted_index":{"Abstract":[0],"The":[1,23,68],"first":[2],"generation":[3],"of":[4,13,42,50,106,119,122,158,163,186,198],"post-quantum":[5],"cryptography":[6],"(PQC)":[7],"standards":[8],"by":[9,227],"the":[10,21,40,53,96,104,117,123,154,199,218,223,228],"National":[11],"Institute":[12],"Standards":[14],"and":[15,38,75,109,128,140,220],"Technology":[16],"(NIST)":[17],"is":[18,28],"just":[19],"around":[20],"corner.":[22],"need":[24,37,62],"for":[25,86,95,138,143,153,176],"secure":[26],"implementations":[27],"therefore":[29],"increasing.":[30],"In":[31,161],"this":[32,36,147,166],"work,":[33],"we":[34,90,115],"address":[35],"investigate":[39],"integration":[41],"lattice-based":[43,87],"PQC":[44],"into":[45],"an":[46,184],"open-source":[47],"silicon":[48],"root":[49],"trust":[51],"(RoT),":[52],"OpenTitan.":[54],"RoTs":[55],"are":[56,214],"important":[57],"security":[58],"building":[59],"blocks":[60],"that":[61],"to":[63,102],"be":[64,169],"future-proofed":[65],"with":[66,208,222],"PQC.":[67,88],"OpenTitan":[69,97,229],"features":[70],"multiple":[71],"cryptographic":[72],"hardware":[73,173,190],"accelerators":[74],"countermeasures":[76,209],"against":[77,210],"physical":[78,211],"attacks,":[79],"but":[80],"does":[81],"not":[82,168],"offer":[83],"dedicated":[84],"support":[85],"Thus,":[89],"propose":[91],"instruction":[92],"set":[93],"extensions":[94,191,205],"Big":[98],"Number":[99],"Accelerator":[100],"(OTBN)":[101],"improve":[103],"efficiency":[105],"polynomial":[107],"arithmetic":[108],"sampling.":[110],"As":[111],"a":[112],"case":[113,162],"study":[114],"analyze":[116],"performance":[118],"signature":[120,125],"verification":[121],"digital":[124],"schemes":[126],"Dilithium":[127],"Falcon":[129],".":[130],"Our":[131],"implementation":[132,178],"verifies":[133],"signatures":[134],"within":[135,217],"911,366":[136],"cycles":[137,142],"Dilithium-II":[139,164],"759,779":[141],"Falcon-512":[144],",":[145,165],"pushing":[146],"RoT":[148,201],"functionality":[149],"below":[150],"10":[151],"ms":[152],"OpenTitan\u2019s":[155],"target":[156],"frequency":[157],"100":[159],"MHz.":[160],"can":[167],"achieved":[170],"without":[171],"these":[172],"extensions,":[174],"even":[175],"advanced":[177],"techniques":[179],"such":[180],"as":[181],"Kronecker+.":[182],"With":[183],"overhead":[185],"437,665.00":[187],"kGE,":[188],"our":[189,204],"make":[192],"up":[193],"only":[194],"about":[195],"2.93":[196],"%":[197],"total":[200],"area.":[202],"All":[203],"integrate":[206],"seamlessly":[207],"attacks":[212],"which":[213],"already":[215],"available":[216],"OTBN":[219],"comply":[221],"adversary":[224],"model":[225],"chosen":[226],"project.":[230]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-09T13:55:54.758798","created_date":"2025-10-10T00:00:00"}
