- Cryptographic Implementations and Security
- Cryptography and Data Security
- Quantum Computing Algorithms and Architecture
- Coding theory and cryptography
- Parallel Computing and Optimization Techniques
- Chaos-based Image/Signal Encryption
- stochastic dynamics and bifurcation
- Quantum-Dot Cellular Automata
- Embedded Systems Design Techniques
- Interconnection Networks and Systems
- Nonlinear Dynamics and Pattern Formation
- Neural Networks Stability and Synchronization
- Dark Matter and Cosmic Phenomena
- Advanced Memory and Neural Computing
- Particle physics theoretical and experimental studies
- Acoustic Wave Resonator Technologies
- Cryptography and Residue Arithmetic
- Computational Physics and Python Applications
- Network Packet Processing and Optimization
- Security and Verification in Computing
- Quantum Information and Cryptography
- Particle Accelerators and Free-Electron Lasers
- Distributed systems and fault tolerance
- Neural dynamics and brain function
- Microwave Engineering and Waveguides
Huazhong University of Science and Technology
2022-2025
Nanyang Technological University
2024
Tiangong University
2023
Le Quy Don Technical University
2023
Crystals-Dilithium is a post-quantum cryptography digital signature scheme with quantum attack resistance. In this brief, high speed processor towards Dilithium represented. An architecture based on multiple instruction parallel execution proposed to reduce operation cycles. The pseudo random number extension generator designed byte absorption precision adapt practical application scenarios. addition, three-stage pipelined modular multiplier optimized Karatsuba algorithm, increasing the...
Security systems based on traditional cryptography mechanisms are at risk of being cracked by quantum computers in the future. CRYSTALS-KYBER (Kyber) as NIST finalized lattice-based post-quantum (PQC) algorithm, will be widely used public-key encryption scenarios. Although quantum-difficulty assumptions lattice math problems make Kyber quantum-resistant, how to effectively implement it into with different security needs remains a challenge. This work presents dual-issue superscalar processor...
In this article, a mode-switching oscillator using multi-magnetic-coupling and active-source-degenerating techniques is proposed to achieve wide frequency tuning low phase noise. The multi-magnetic coupled resonator can realize two switchable resonant frequencies perform active source degeneration. Two main coils are developed switch between the modes, thereby doubling range (TR) without degrading noise performance. effective power from device suppressed by an additional coupling primary...
Progress of quantum computing technology seriously threaten the industrial information security based on traditional public-key cryptosystem. Thus, cryptosystem with anti-quantum attack characteristics is gradually becoming a significant research in field. In this article, flexible and high-performance secure coprocessor designed for processes, which can execute post-quantum cryptographic algorithm Saber efficiently. Custom instruction set arithmetic accelerators are proposed to effectively...
Post-quantum cryptography (PQC) uses novel difficult mathematical principles to defend the cracking of quantum computers which threaten traditional crypto system such as Rivest–Shamir– Adleman (RSA) and elliptic curves (ECC). The lattice-based PQC schemes are currently most potential candidates. software methods these usually low speed, optimized dedicated hardware design can accelerate algorithms. Saber Kyber two algorithms based on lattice problems "Module Learning with Rounding" (M-LWR)...
In this paper, the network models of coupled delayed memristive neural networks (CDMNNs) without and with coupling are studied respectively. Firstly, according to definitions ψ-type stability ψ -type function, notion general decay anti-synchronization (GDAS) is introduced. Secondly, by constructing Lyapunov functional, designing controller using inequality techniques, corresponding sufficient conditions that reaching GDAS for CDMNNs deduced. Thirdly, validity results proved proper numerical...
The migration to post-quantum cryptography (PQC) is accelerating with the release of three drafts 2023 PQC federal information processing standard (FIPS), which Kyber only officially selected key encapsulation mechanism (KEM) as Figure 1. However, from traditional still faces following challenges: 1) significant increase in size and encryption/decryption latency leads performance degradation resource overhead existing devices. Moreover, unauthorized access also raises privacy concerns. 2)...
Dark matter makes up approximately 85% of total in our universe, yet it has never been directly observed any laboratory on Earth. The origin dark is one the most important questions contemporary physics, and a convincing detection would be Nobel-Prize-level breakthrough fundamental science. ABRACADABRA experiment was specifically designed to search for matter. Although not made discovery, produced several results widely endorsed by physics community. generates ultra-long time-series data at...
Post-quantum cryptography (PQC) is proposed to resist the attack of quantum computer. Among various PQC schemes, lattice-based depended on learning with errors (LWE) problem has attracted much attention. As one number theory research unit (NTRU) algorithm flexible, simple and fast. In this paper, we propose a high-performance cryptographic processor towards NTRU. processor, optimize instruction set architecture, which also saves memories. Three-level Karatsuba method utilized accelerate...
With the development of quantum computer, security traditional public key encryption algorithm cannot meet demand, and post cryptography that can resist attack computer is needed. The Classic McEliece based on coding has maintained strongest record for more than 40 years. This paper designs a generation system Goppa binary code PQCRYPTO recommended parameters: m=13, t=119, n=6960. Through fixed circuit structure, clock cycle consumption caused by multi parameter configuration be reduced....
Pseudo-random number extension and hashing limit the time for encryption decryption in multiple lattice-based post-quantum cryptography (PQC). Keccak is a crucial part pseudo-random hashing, being most restrictive module. With requirement of high-performance, it important to implement configurable core with flexibility high throughput. In this paper, novel structure throughput generator proposed. The method utilizes two-stage series round function circuits reduce cycles half. And benefiting...
Most information is transmitted through untrusted channels, and people use traditional asymmetric encryption methods/algorithms to prevent leakage. Post-quantum cryptography (PQC) alternatives are refining counter the possibility of brute-forcing in finite time with progressively feasible quantum computers. As winner NIST PQC project global competition, CRYSTALS-KYBER (Kyber) has a balance security efficiency. This paper proposes an efficient ASIC for chip-level applications Kyber....
With the development of quantum computers in recent years, security traditional public-key encryption algorithms is facing serious threats, and post-quantum cryptography (PQC) that can resist computer attacks are urgently needed. CRYSTALS-KYBER as finalized NIST key-encapsulation scheme, continuously advancing standardization process. The existing hardware implementations Kyber mostly use compact architectures to pursue high speed performance with cost programmability, while most...
The Internet of Things (IoT) communication prevents information from being decrypted or tampered with by unauthorized third parties. Post-quantum cryptography ensures that the exchange between IoT devices can resist potential quantum computer attacks, thereby enhancing security IoT. This paper presents a quantum-secure hardware-software architecture for embedded systems. An FPGA-based post-quantum cryptographic Kyber accelerator and an STM32 microcontroller AES encryption are integrated into...
The security of a cryptographic system depends on the reliability and irreversibility random numbers. Secure Hash Algorithm-3 (SHA-3) is widely utilized in cryptography due to its robust security, computational efficiency, versatile hashing capabilities. SHA-3 discrete sampling are vital components post-quantum cryptography, providing essential defense against quantum computing attacks. This paper presents multi-probability number generator for lattice-based cryptography. design utilizes...