{"id":"https://openalex.org/W4408161394","doi":"https://doi.org/10.46586/tches.v2025.i2.647-680","title":"Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism","display_name":"Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism","publication_year":2025,"publication_date":"2025-03-04","ids":{"openalex":"https://openalex.org/W4408161394","doi":"https://doi.org/10.46586/tches.v2025.i2.647-680"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2025.i2.647-680","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i2.647-680","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/12060/11905","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/12060/11905","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076712304","display_name":"Suparna Kundu","orcid":"https://orcid.org/0000-0003-4354-852X"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Suparna Kundu","raw_affiliation_strings":["COSIC, KU Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"COSIC, KU Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101969784","display_name":"Archisman Ghosh","orcid":"https://orcid.org/0000-0002-0264-6687"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Archisman Ghosh","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044163841","display_name":"Angshuman Karmakar","orcid":"https://orcid.org/0000-0003-2594-588X"},"institutions":[{"id":"https://openalex.org/I94234084","display_name":"Indian Institute of Technology Kanpur","ror":"https://ror.org/05pjsgx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I94234084"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Angshuman Karmakar","raw_affiliation_strings":["Indian Institute of Technology Kanpur, Kanpur, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kanpur, Kanpur, India","institution_ids":["https://openalex.org/I94234084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056832262","display_name":"Shreyas Sen","orcid":"https://orcid.org/0000-0001-5566-8946"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shreyas Sen","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082347771","display_name":"Ingrid Verbauwhede","orcid":"https://orcid.org/0000-0002-0879-076X"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Ingrid Verbauwhede","raw_affiliation_strings":["COSIC, KU Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"COSIC, KU Leuven, Belgium","institution_ids":["https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5076712304"],"corresponding_institution_ids":["https://openalex.org/I99464096"],"apc_list":null,"apc_paid":null,"fwci":11.8029,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.98424649,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"2025","issue":"2","first_page":"647","last_page":"680"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13182","display_name":"Quantum-Dot Cellular Automata","score":0.9663000106811523,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13182","display_name":"Quantum-Dot Cellular Automata","score":0.9663000106811523,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9538999795913696,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9513999819755554,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encapsulation","display_name":"Encapsulation (networking)","score":0.8276025056838989},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.710419774055481},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4532826542854309},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3775254487991333},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.36903703212738037},{"id":"https://openalex.org/keywords/nanotechnology","display_name":"Nanotechnology","score":0.3626437783241272},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.3342564105987549},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25243842601776123},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.14180344343185425},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.0851563811302185},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.0704338550567627}],"concepts":[{"id":"https://openalex.org/C81147070","wikidata":"https://www.wikidata.org/wiki/Q1172449","display_name":"Encapsulation (networking)","level":2,"score":0.8276025056838989},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.710419774055481},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4532826542854309},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3775254487991333},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.36903703212738037},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.3626437783241272},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.3342564105987549},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25243842601776123},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.14180344343185425},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.0851563811302185},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0704338550567627}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.46586/tches.v2025.i2.647-680","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i2.647-680","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/12060/11905","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:lirias2repo.kuleuven.be:20.500.12942/774025","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/20.500.12942/774025","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2025 (2), (647-680)","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:cb4ce818b7cb4596ba1b8a6ecc24d87e","is_oa":true,"landing_page_url":"https://doaj.org/article/cb4ce818b7cb4596ba1b8a6ecc24d87e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 2 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2025.i2.647-680","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i2.647-680","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/12060/11905","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4408161394.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2216891170","https://openalex.org/W4401719154","https://openalex.org/W4401459825","https://openalex.org/W3020242443","https://openalex.org/W2913147969","https://openalex.org/W4240532262","https://openalex.org/W2806458879","https://openalex.org/W3094714434","https://openalex.org/W2025411550","https://openalex.org/W4246395789"],"abstract_inverted_index":{"Resource-constrained":[0],"devices":[1,11,20],"such":[2,106],"as":[3,107,167,169],"wireless":[4],"sensors":[5],"and":[6,22,46,97,100,115,117,156,185,252],"Internet":[7],"of":[8,27,37,75,102,120,130,152,193,216,221,229,239,262],"Things":[9],"(IoT)":[10],"have":[12,93,172],"become":[13],"ubiquitous":[14],"in":[15,188,227,265],"our":[16,28,41],"digital":[17,29],"ecosystem.":[18],"These":[19],"generate":[21],"handle":[23],"a":[24,83,95,131,224],"major":[25],"part":[26],"data.":[30],"However,":[31],"due":[32],"to":[33,57,81,127,158,234,249,257],"the":[34,47,72,128,159,189,194,209,213,230,235,258],"impending":[35],"threat":[36],"quantum":[38],"computers":[39],"on":[40,51],"existing":[42],"public-key":[43],"cryptographic":[44,61],"schemes":[45,63,80],"limited":[48],"resources":[49],"available":[50],"IoT":[52],"devices,":[53],"it":[54],"is":[55],"important":[56],"design":[58,73,82,104],"lightweight":[59,84,132,181,199],"post-quantum":[60,154],"(PQC)":[62],"suitable":[64,88],"for":[65,89,180,198],"these":[66],"devices.In":[67],"this":[68],"work,":[69],"we":[70],"explored":[71],"space":[74],"learning":[76],"with":[77,147,247],"error-based":[78],"PQC":[79,214],"key-encapsulation":[85],"mechanism":[86],"(KEM)":[87],"resourceconstrained":[90],"devices.":[91],"We":[92,171],"done":[94],"scrupulous":[96],"extensive":[98],"analysis":[99],"evaluation":[101],"different":[103],"elements,":[105],"polynomial":[108],"size,":[109],"field":[110],"modulus":[111],"structure,":[112],"reduction":[113],"algorithm,":[114],"secret":[116],"error":[118],"distribution":[119],"an":[121],"LWE-based":[122],"KEM.":[123],"Our":[124,138,201,219],"explorations":[125],"led":[126],"proposal":[129],"PQC-KEM,":[133],"Rudraksh,":[134],"without":[135],"compromising":[136],"security.":[137,218],"scheme":[139],"provides":[140,223],"security":[141,155,161,164],"against":[142],"chosen":[143],"ciphertext":[144],"attacks":[145],"(CCA)":[146],"more":[148],"than":[149],"100":[150],"bits":[151],"Core-SVP":[153],"belongs":[157],"NIST-level-I":[160],"category":[162],"(provide":[163],"at":[165,243],"least":[166,210],"much":[168],"AES-128).":[170],"also":[173],"shown":[174],"how":[175],"ASCON":[176],"can":[177,241],"be":[178],"used":[179,196],"pseudo-random":[182],"number":[183],"generation":[184],"hash":[186],"function":[187],"lattice-based":[190],"KEMs":[191,215],"instead":[192],"widely":[195],"Keccak":[197],"design.":[200],"FPGA":[202],"results":[203],"show":[204],"that":[205],"Rudraksh":[206,222],"currently":[207],"requires":[208],"area":[211,231],"among":[212],"similar":[217],"implementation":[220,238,261],"~3x":[225],"improvement":[226],"terms":[228],"requirement":[232],"compared":[233,256],"state-of-the-art":[236,259],"areaoptimized":[237],"Kyber,":[240,251],"operate":[242],"63%-76%":[244],"higher":[245],"frequency":[246],"respect":[248],"high-throughput":[250],"improves":[253],"time-area-product":[254],"~2x":[255],"compact":[260],"Kyber":[263],"published":[264],"HPEC":[266],"2022.":[267]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5}],"updated_date":"2026-03-08T08:50:53.379069","created_date":"2025-10-10T00:00:00"}
