{"id":"https://openalex.org/W7150996262","doi":"https://doi.org/10.1109/access.2026.3681219","title":"Offloading Post-Quantum Cryptography to Data Processing Units: A Performance Analysis of HQC Key Encapsulation","display_name":"Offloading Post-Quantum Cryptography to Data Processing Units: A Performance Analysis of HQC Key Encapsulation","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7150996262","doi":"https://doi.org/10.1109/access.2026.3681219"},"language":"en","primary_location":{"id":"doi:10.1109/access.2026.3681219","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3681219","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3681219","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133057648","display_name":"Joseph Meyer","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Joseph Meyer","raw_affiliation_strings":["Eindhoven University of Technology (TU/e), Eindhoven, The Netherlands"],"raw_orcid":"https://orcid.org/0009-0005-9209-5346","affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology (TU/e), Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077660918","display_name":"Elad Mentovich","orcid":null},"institutions":[{"id":"https://openalex.org/I1304085615","display_name":"Nvidia (United Kingdom)","ror":"https://ror.org/02kr42612","country_code":"GB","type":"company","lineage":["https://openalex.org/I1304085615","https://openalex.org/I4210127875"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Elad Mentovich","raw_affiliation_strings":["NVIDIA Corporation, Yokne&#x2019;am Illit, Israel"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"NVIDIA Corporation, Yokne&#x2019;am Illit, Israel","institution_ids":["https://openalex.org/I1304085615"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024064810","display_name":"Idelfonso Tafur Monroy","orcid":"https://orcid.org/0000-0002-2935-7682"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Idelfonso Tafur Monroy","raw_affiliation_strings":["Eindhoven University of Technology (TU/e), Eindhoven, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-2935-7682","affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology (TU/e), Eindhoven, The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5133023917","display_name":"J. J. Vegas Olmos","orcid":null},"institutions":[{"id":"https://openalex.org/I1304085615","display_name":"Nvidia (United Kingdom)","ror":"https://ror.org/02kr42612","country_code":"GB","type":"company","lineage":["https://openalex.org/I1304085615","https://openalex.org/I4210127875"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Juan Jose Vegas Olmos","raw_affiliation_strings":["NVIDIA Corporation, Yokne&#x2019;am Illit, Israel"],"raw_orcid":"https://orcid.org/0000-0002-6796-1602","affiliations":[{"raw_affiliation_string":"NVIDIA Corporation, Yokne&#x2019;am Illit, Israel","institution_ids":["https://openalex.org/I1304085615"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5133057648"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.70073307,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"53831","last_page":"53845"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.2619999945163727,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.2619999945163727,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.2362000048160553,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.14749999344348907,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encapsulation","display_name":"Encapsulation (networking)","score":0.8582000136375427},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6714000105857849},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.535099983215332},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4690000116825104},{"id":"https://openalex.org/keywords/data-processing","display_name":"Data processing","score":0.46149998903274536},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.34599998593330383}],"concepts":[{"id":"https://openalex.org/C81147070","wikidata":"https://www.wikidata.org/wiki/Q1172449","display_name":"Encapsulation (networking)","level":2,"score":0.8582000136375427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864000201225281},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6714000105857849},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.535099983215332},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4690000116825104},{"id":"https://openalex.org/C138827492","wikidata":"https://www.wikidata.org/wiki/Q6661985","display_name":"Data processing","level":2,"score":0.46149998903274536},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4219000041484833},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34599998593330383},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3402000069618225},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.3359000086784363},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32679998874664307},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.3000999987125397},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.28209999203681946},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2793999910354614},{"id":"https://openalex.org/C87868495","wikidata":"https://www.wikidata.org/wiki/Q750843","display_name":"Information processing","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2590000033378601},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2500999867916107}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2026.3681219","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3681219","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:pure.tue.nl:openaire/72d9a4a7-07bd-4bff-90ca-82bb1dcad87a","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/72d9a4a7-07bd-4bff-90ca-82bb1dcad87a","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Meyer, J G, Mentovich, E, Tafur Monroy, I & Vegas Olmos, J J 2026, 'Offloading Post-Quantum Cryptography to Data Processing Units : A Performance Analysis of HQC Key Encapsulation', IEEE Access, vol. 14, 11475462, pp. 53831-53845. https://doi.org/10.1109/ACCESS.2026.3681219","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:c302a930d81948af99bff9ebef948640","is_oa":true,"landing_page_url":"https://doaj.org/article/c302a930d81948af99bff9ebef948640","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 14, Pp 53831-53845 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3681219","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3681219","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G864933010","display_name":null,"funder_award_id":"101073355","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320329456","display_name":"Ministerie van Economische Zaken en Klimaat","ror":null},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"transition":[1],"to":[2,25,111,117,148],"post-quantum":[3,201],"cryptography":[4],"introduces":[5],"substantial":[6],"computational":[7,28],"overhead":[8],"that":[9,193],"can":[10],"degrade":[11],"application":[12],"performance":[13,203],"in":[14,204],"datacenter":[15,205],"environments,":[16],"particularly":[17],"under":[18,115,150,155,172],"system":[19,208],"contention":[20,209],"when":[21],"there":[22],"is":[23,210],"competition":[24],"access":[26],"shared":[27],"resources.":[29],"This":[30],"work":[31],"presents":[32],"the":[33,48,53,128,224],"first":[34],"experimental":[35],"evaluation":[36],"of":[37,52,56,183,223],"offloading":[38,162],"Hamming":[39],"Quasi-Cyclic":[40],"(HQC)":[41],"key":[42],"encapsulation\u2014a":[43],"code-based":[44],"algorithm":[45],"advancing":[46],"through":[47],"fourth":[49],"standardization":[50],"round":[51],"National":[54],"Institute":[55],"Standards":[57],"and":[58,86,94,142,153,220],"Technology":[59],"(NIST)\u2014to":[60],"high-capacity":[61],"Data":[62],"Processing":[63],"Units":[64],"(DPUs).":[65],"We":[66],"systematically":[67],"compare":[68],"host-based":[69,100,167],"execution":[70,76,101,109,122,165,177],"on":[71,77],"x86":[72],"processors":[73],"against":[74],"DPU-offloaded":[75,121],"NVIDIA":[78],"BlueField-3":[79],"400Gbit/s-capable":[80],"devices":[81],"across":[82],"three":[83],"security":[84,133],"levels":[85],"four":[87],"server":[88,119],"load":[89],"regimes,":[90],"evaluating":[91],"both":[92],"single-threaded":[93],"multi-threaded":[95,136],"workloads.":[96],"Under":[97,135],"idle":[98,151],"conditions,":[99],"achieves":[102,123],"approximately":[103],"22%":[104],"lower":[105,125],"latency":[106,168,218],"than":[107],"DPU":[108,138,161,176],"due":[110],"micro-architectural":[112],"advantages.":[113],"However,":[114],"moderate":[116],"heavy":[118,156,173],"contention,":[120],"31\u201334%":[124],"latency,":[126],"with":[127],"advantage":[129],"increasing":[130],"at":[131],"higher":[132],"levels.":[134],"operation,":[137],"throughput":[139,145],"scales":[140],"near-linearly":[141],"exceeds":[143,170],"host":[144,184],"by":[146,197,214],"up":[147],"2.9\u00d7":[149],"conditions":[152],"5.5\u00d7":[154],"load.":[157],"Beyond":[158],"absolute":[159],"performance,":[160],"dramatically":[163],"improves":[164],"determinism:":[166],"variance":[169,179],"34%":[171],"load,":[174],"while":[175],"maintains":[178],"below":[180],"0.1%":[181],"regardless":[182],"activity":[185],"or":[186],"DPU-local":[187],"background":[188],"traffic.":[189],"These":[190],"results":[191],"demonstrate":[192],"architectural":[194],"isolation":[195,226],"provided":[196],"DPUs":[198],"enables":[199],"predictable":[200],"cryptographic":[202],"environments":[206],"where":[207],"unavoidable\u2014a":[211],"finding":[212],"supported":[213],"cross-platform":[215],"validation,":[216],"analytical":[217],"decomposition,":[219],"first-principles":[221],"analysis":[222],"underlying":[225],"mechanism.":[227]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-04-07T00:00:00"}
