{"id":"https://openalex.org/W7124692153","doi":"https://doi.org/10.3390/cryptography10010006","title":"Secure Implementation of RISC-V\u2019s Scalar Cryptography Extension Set","display_name":"Secure Implementation of RISC-V\u2019s Scalar Cryptography Extension Set","publication_year":2026,"publication_date":"2026-01-17","ids":{"openalex":"https://openalex.org/W7124692153","doi":"https://doi.org/10.3390/cryptography10010006"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography10010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010006","pdf_url":"https://www.mdpi.com/2410-387X/10/1/6/pdf?version=1768649852","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/10/1/6/pdf?version=1768649852","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123310779","display_name":"Asmaa Kassimi","orcid":null},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Asmaa Kassimi","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands"],"raw_orcid":"https://orcid.org/0009-0004-9851-2123","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018816896","display_name":"Abdullah Aljuffri","orcid":"https://orcid.org/0000-0002-2333-4754"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Abdullah Aljuffri","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-2333-4754","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123336922","display_name":"Christian Larmann","orcid":null},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Christian Larmann","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands"],"raw_orcid":"https://orcid.org/0009-0005-3845-7510","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005739146","display_name":"Said Hamdioui","orcid":"https://orcid.org/0000-0002-8961-0387"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Said Hamdioui","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-8961-0387","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042250419","display_name":"Mottaqiallah Taouil","orcid":"https://orcid.org/0000-0002-9911-4846"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Mottaqiallah Taouil","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-9911-4846","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5042250419","https://openalex.org/A5123310779"],"corresponding_institution_ids":["https://openalex.org/I98358874"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1055971,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"1","first_page":"6","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.004999999888241291,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6065999865531921},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.545799970626831},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.42820000648498535},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4269999861717224},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.39890000224113464},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.3926999866962433},{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.3625999987125397},{"id":"https://openalex.org/keywords/microarchitecture","display_name":"Microarchitecture","score":0.3540000021457672},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.35370001196861267}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7365999817848206},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6065999865531921},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5738000273704529},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.545799970626831},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.42820000648498535},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4269999861717224},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.39890000224113464},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.3926999866962433},{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.3625999987125397},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.3540000021457672},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.35370001196861267},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33649998903274536},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.335999995470047},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.33379998803138733},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33340001106262207},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.32600000500679016},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.3140000104904175},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.30889999866485596},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.3052999973297119},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.3046000003814697},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.3034000098705292},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.28929999470710754},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.28459998965263367},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.2766000032424927},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.27459999918937683},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.27309998869895935},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.26460000872612},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.25760000944137573},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography10010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010006","pdf_url":"https://www.mdpi.com/2410-387X/10/1/6/pdf?version=1768649852","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:837b50ff76cc4a6c9a747ced86d27d19","is_oa":false,"landing_page_url":"https://doaj.org/article/837b50ff76cc4a6c9a747ced86d27d19","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 10, Iss 1, p 6 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography10010006","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10010006","pdf_url":"https://www.mdpi.com/2410-387X/10/1/6/pdf?version=1768649852","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7662901878356934,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320314237","display_name":"Rijksdienst voor Ondernemend Nederland","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7124692153.pdf","grobid_xml":"https://content.openalex.org/works/W7124692153.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Instruction":[0],"Set":[1],"Architecture":[2],"(ISA)":[3],"extensions,":[4],"particularly":[5],"scalar":[6,64,112],"cryptography":[7,65],"extensions":[8],"(Zk),":[9],"combine":[10],"the":[11,17,22,31,37,92,97,110,145,150,154,177,184,190],"performance":[12,148,185],"advantages":[13],"of":[14,19,27,96,109,149,174],"hardware":[15,50,98],"with":[16,41,59],"adaptability":[18],"software,":[20],"enabling":[21],"direct":[23],"and":[24,49,106,136,147],"efficient":[25],"execution":[26],"cryptographic":[28],"functions":[29],"within":[30],"processor":[32],"pipeline.":[33],"This":[34,101],"integration":[35],"eliminates":[36],"need":[38],"to":[39,70,82,123,176],"communicate":[40],"external":[42],"cores,":[43],"substantially":[44],"reducing":[45],"latency,":[46],"power":[47,74,93],"consumption,":[48],"overhead,":[51],"making":[52],"it":[53],"especially":[54],"suitable":[55],"for":[56,133],"embedded":[57],"systems":[58],"constrained":[60],"resources.":[61],"However,":[62],"current":[63],"extension":[66,117],"implementations":[67,132],"remain":[68],"vulnerable":[69],"physical":[71],"threats,":[72],"notably":[73],"side-channel":[75],"attacks":[76,79],"(PSCAs).":[77],"These":[78],"allow":[80],"adversaries":[81],"extract":[83],"confidential":[84],"information,":[85],"such":[86],"as":[87],"secret":[88],"keys,":[89],"by":[90],"analyzing":[91],"consumption":[94],"patterns":[95],"during":[99],"operation.":[100],"paper":[102],"presents":[103],"an":[104],"optimized":[105,130],"secure":[107],"implementation":[108],"RISC-V":[111,181],"Advanced":[113],"Encryption":[114],"Standard":[115],"(AES)":[116],"(Zkne/Zknd)":[118],"using":[119,153],"Domain-Oriented":[120],"Masking":[121],"(DOM)":[122],"mitigate":[124],"first-order":[125],"PSCAs.":[126],"Our":[127],"approach":[128],"features":[129],"assembly":[131],"partial":[134],"rounds":[135],"key":[137],"scheduling":[138],"alongside":[139],"pipeline-aware":[140],"microarchitecture":[141],"optimizations.":[142],"We":[143],"evaluated":[144],"security":[146],"proposed":[151],"design":[152,164],"Xilinx":[155],"Artix7":[156],"FPGA":[157],"platform.":[158],"The":[159],"results":[160],"indicate":[161],"that":[162],"our":[163],"is":[165,187],"side-channel-resistant":[166],"while":[167],"adding":[168],"a":[169],"very":[170],"low":[171],"area":[172],"overhead":[173,186],"0.39%":[175],"full":[178],"32-bit":[179],"CV32E40S":[180],"processor.":[182],"Moreover,":[183],"zero":[188],"when":[189],"extension-related":[191],"instructions":[192],"are":[193],"properly":[194],"scheduled.":[195]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-01-20T00:00:00"}
