{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T08:28:50Z","timestamp":1772094530608,"version":"3.50.1"},"reference-count":52,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T00:00:00Z","timestamp":1738972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"US National Science Foundation","doi-asserted-by":"crossref","award":["SaTC-1801488"],"award-info":[{"award-number":["SaTC-1801488"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>Addressing the looming threat posed by quantum computers capable of breaching current public key cryptography schemes has become imperative. To this end, the National Institute of Standards and Technology (NIST) initiated a competition in Post-Quantum Cryptography, resulting in the selection of four schemes as the new standardized replacements, while a fourth round and an additional signature round is still ongoing. Notably, CRYSTALS-Dilithium, a lattice-based signature scheme, has exhibited promising resilience due to its efficiency and simplicity. Despite the finalization of standardization for these new four schemes, transitioning from classical cryptography to these alternatives necessitates further investigation and analysis. Comprehensive scrutiny of these newly standardized schemes is imperative, including considerations of implementation efficiency across various platforms and side-channel vulnerability analysis. This article introduces a novel design leveraging physical unclonable functions to bolster the physical security of CRYSTALS-Dilithium. Physical security is paramount in scenarios where network nodes are exposed to public scrutiny, potentially making them targets for adversaries. After discussing the advantages of our design compared to the original design, we implemented it on two different architectures, ARMv7 and ARMv8. Our results indicate substantial improvements in both security and performance compared to existing references. Moreover, noting the new competition initiated by the NIST in 2023 for new signatures (first round finalized in October 2024), potentially the proposed schemes can be adopted to the new standards set to be finalized in the coming years. These make our scheme not solely confined to the current standards and would be an important merit of the presented approaches.<\/jats:p>","DOI":"10.1145\/3715328","type":"journal-article","created":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T11:43:47Z","timestamp":1737805427000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["PUF-Dilithium: Design of a PUF-Based Dilithium Architecture Benchmarked on ARM Processors"],"prefix":"10.1145","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6742-0868","authenticated-orcid":false,"given":"Saeed","family":"Aghapour","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, University of South Florida, Tampa, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5989-2244","authenticated-orcid":false,"given":"Kasra","family":"Ahmadi","sequence":"additional","affiliation":[{"name":"Computer Engineering, University of South Florida, Tampa, United States and Computer Science and Engineering, University of South Florida, Tampa, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3530-7024","authenticated-orcid":false,"given":"Mila","family":"Anastasova","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, Boca Raton, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6921-6868","authenticated-orcid":false,"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[{"name":"Florida Atlantic University, Boca Raton, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4513-3109","authenticated-orcid":false,"given":"Mehran","family":"Mozaffari Kermani","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, University of South Florida, Tampa, United States"}]}],"member":"320","published-online":{"date-parts":[[2025,2,8]]},"reference":[{"key":"e_1_3_2_2_2","volume-title":"Proceedings of the 35th Annual Symposium on Foundations of Computer Science (FOCS\u201994)","author":"Shor Peter W.","year":"1994","unstructured":"Peter W. Shor. 1994. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science (FOCS\u201994). IEEE Computer Society Press, Los Alamitos, CA, 124\u2013134. DOI:10.1109\/SFCS.1994.365700"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Leo Ducas Eike Kiltz Tancrede Lepoint Vadim Lyubashevsky Peter Schwabe Gregor Seiler and Damien Stehle. 2018. Crystals-Dilithium: A lattice-based digital signature scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 238\u2013268. 10.13154\/tches.v2018.i1.238-268","DOI":"10.13154\/tches.v2018.i1.238-268"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-022-04623-2"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","unstructured":"Youngbeom Kim Jingyo Song Taek-Young Youn and Seog Chung Seo. 2022. Crystals-Dilithium on ARMv8. In Security and Communication Networks. 10.1155\/2022\/5226390","DOI":"10.1155\/2022\/5226390"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.221-244"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Denisa O. C. Greconici Matthias J. Kannwischer and Amber Sprenkels. 2021. Compact Dilithium implementations on Cortex-M3 and Cortex-M4. IACR Trans. Cryptogr. Hardw. Embed. Syst. 1\u201324. 10.46586\/tches.v2021.i1.1-24","DOI":"10.46586\/tches.v2021.i1.1-24"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i4.17-61"},{"key":"e_1_3_2_9_2","volume-title":"International Conference on Applied Cryptography and Network Security (ACNS\u201922)","author":"Abdulrahman Amin","year":"2022","unstructured":"Amin Abdulrahman, Vincent Hwang, Matthias J. Kannwischer, and Amber Sprenkels. 2022. Faster kyber and Dilithium on the Cortex-M4. In International Conference on Applied Cryptography and Network Security (ACNS\u201922), 853\u2013871. Springer International Publishing."},{"key":"e_1_3_2_10_2","volume-title":"Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC\u201922)","author":"Zheng Jieyu","year":"2022","unstructured":"Jieyu Zheng, Feng He, Shiyu Shen, Chenxi Xue, and Yunlei Zhao. 2022. Parallel small polynomial multiplication for Dilithium: A faster design and implementation. In Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC\u201922), 304\u2013317. 10.1145\/3564625.3564629"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3609223"},{"key":"e_1_3_2_12_2","volume-title":"Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES\u201921)","author":"Ricci Sara","year":"2021","unstructured":"Sara Ricci, Lukas Malina, Petr Jedlicka, David Smekal, Jan Hajny, Peter Cibik, Petr Dzurenda, and Patrik Dobias. 2021. Implementing crystals-dilithium signature scheme on FPGAs. In Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES\u201921), 1\u201311."},{"key":"e_1_3_2_13_2","volume-title":"Proceedings of the International Conference on Field-Programmable Technology (ICFPT\u201921)","author":"Beckwith Luke","year":"2021","unstructured":"Luke Beckwith, Duc Tri Nguyen, and Kris Gaj. 2021. High-performance hardware implementation of crystals-dilithium. In Proceedings of the International Conference on Field-Programmable Technology (ICFPT\u201921), 1\u201310. IEEE. https:\/\/eprint.iacr.org\/2021\/1451"},{"key":"e_1_3_2_14_2","volume-title":"International Conference on Smart Card Research and Advanced Applications (CARDIS\u201921)","author":"Land Georg","year":"2021","unstructured":"Georg Land, Pascal Sasdrich, and Tim Guneysu. 2021. A hard crystal - implementing Dilithium on reconfigurable hardware. In International Conference on Smart Card Research and Advanced Applications (CARDIS\u201921), 210\u2013230. Springer International Publishing. 10.1007\/978-3-030-97348-3_12"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Cankun Zhao Neng Zhang Hanning Wang Bohan Yang Wenping Zhu Zhengdong Li Min Zhu Shouyi Yin Shaojun Wei and Leibo Liu. 2022. A compact and high-performance hardware architecture for crystals-dilithium. IACR Trans. Cryptogr. Hardw. Embed. Syst. 270\u2013295. 10.46586\/tches.v2022.i1.270-295","DOI":"10.46586\/tches.v2022.i1.270-295"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2023.3304416"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3219555"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3179459"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3569456"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447812"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","unstructured":"Lu Li Qi Tian Guofeng Qin Shuaiyu Chen and Weijia Wang. 2024. Compact instruction set extensions for Dilithium. ACM Trans. Embed. Comput. Syst. 10.1145\/3643826","DOI":"10.1145\/3643826"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2023.3274599"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Patrick Karl Jonas Schupp Tim Fritzmann and Georg Sigl. 2023. Post-quantum signatures on RISC-V with hardware acceleration. ACM Trans. Embed. Comput. Syst. 10.1145\/3579092","DOI":"10.1145\/3579092"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2023.3316393"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3342914"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Jean-Sebastien Coron Francois Gerard Matthias Trannoy and Rina Zeitoun. 2023. Improved gadgets for the high-order masking of Dilithium. Cryptology ePrint Archive.","DOI":"10.46586\/tches.v2023.i4.110-145"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3569420"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Melissa Azouaoui Olivier Bronchain Gaetan Cassiers Clement Hoffmann Yulia Kuzovkova Joost Renes Markus Schonauer Tobias Schneider Francois-Xavier Standaert and Christine van Vredendaal. 2022. Protecting Dilithium against leakage: Revisited sensitivity analysis and improved implementations. Cryptology ePrint Archive.10.46586\/tches.v2023.i4.58-79","DOI":"10.46586\/tches.v2023.i4.58-79"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i4.367-392"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i4.188-210"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","unstructured":"Richa Singh Saad Islam Berk Sunar and Patrick Schaumont. 2023. Analysis of EM fault injection on bit-sliced number theoretic transform software in Dilithium. ACM Trans. Embed. Comput. Syst. 10.1145\/3583757","DOI":"10.1145\/3583757"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3603170"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11062801"},{"key":"e_1_3_2_34_2","volume-title":"CRYSTALS-dilithium: Algorithm specifications and supporting documentation (Version 3.1). NIST Post-Quantum Cryptography Standardization Round 3. Retrieved","author":"Bai Shi","year":"2024","unstructured":"Shi Bai, Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehle. 2021. CRYSTALS-dilithium: Algorithm specifications and supporting documentation (Version 3.1). NIST Post-Quantum Cryptography Standardization Round 3. Retrieved November 1, 2024 from https:\/\/pq-crystals.org\/dilithium\/data\/dilithium-specification-round3-20210208.pdf"},{"key":"e_1_3_2_35_2","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.vlsi.2021.06.001","article-title":"FPGA-based physical unclonable functions: A comprehensive overview of theory and architectures","volume":"81","author":"Anandakumar N. Nalla","year":"2021","unstructured":"N. Nalla Anandakumar, Mohammad S. Hashmi, and Mark Tehranipoor. 2021. FPGA-based physical unclonable functions: A comprehensive overview of theory and architectures. Integration 81 (2021), 175\u2013194.","journal-title":"Integration"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3479240.3488526"},{"key":"e_1_3_2_37_2","volume-title":"Conference on the Theory and Application of Cryptographic Techniques, 186\u2013194","author":"Fiat Amos","year":"1986","unstructured":"Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Conference on the Theory and Application of Cryptographic Techniques, 186\u2013194. Springer, Berlin, 1986."},{"key":"e_1_3_2_38_2","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","article-title":"Efficient signature generation by smart cards","volume":"4","author":"Schnorr Claus-Peter","year":"1991","unstructured":"Claus-Peter Schnorr. 1991. Efficient signature generation by smart cards. J. Cryptol. 4 (1991), 161\u2013174.","journal-title":"J. Cryptol."},{"key":"e_1_3_2_39_2","volume-title":"Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, 598\u2013616","author":"Lyubashevsky Vadim","year":"2009","unstructured":"Vadim Lyubashevsky. 2009. Fiat-shamir with aborts: Applications to lattice and factoring-based signatures. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, 598\u2013616. Springer, Berlin."},{"key":"e_1_3_2_40_2","doi-asserted-by":"crossref","first-page":"3470","DOI":"10.1109\/TIFS.2020.2986887","article-title":"TI-PUF: Toward side-channel resistant physical unclonable functions","volume":"15","author":"Aghaie Anita","year":"2020","unstructured":"Anita Aghaie and Amir Moradi. 2020. TI-PUF: Toward side-channel resistant physical unclonable functions. IEEE Trans. Inf. Forens. Secur. 15 (2020), 3470\u20133481.","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-021-00255-w"},{"key":"e_1_3_2_42_2","first-page":"16456","article-title":"Using quantum confinement to uniquely identify devices. Sci","volume":"5","author":"Roberts Jonny","year":"2015","unstructured":"Jonny Roberts, Ibrahim Ethem Bagci, M. A. M. Zawawi, J. Sexton, N. Hulbert, Y. J. Noori, M. P. Young et\u00a0al. 2015. Using quantum confinement to uniquely identify devices. Sci. Rep. 5, 1 (2015), 16456.","journal-title":"Rep."},{"key":"e_1_3_2_43_2","first-page":"1","article-title":"Authenticated communication from quantum readout of PUFs","volume":"16","author":"Skoric Boris","year":"2017","unstructured":"Boris Skoric, Pepijn W. H. Pinkse, and Allard P. Mosk. 2017. Authenticated communication from quantum readout of PUFs. Quantum Inf. Process. 16 (2017), 1\u20139.","journal-title":"Quantum Inf. Process."},{"key":"e_1_3_2_44_2","volume-title":"Ramon Bernardo-Gavito et\u00a0al. Optical identification using imperfections in 2D materials. 2D Mater. 4, 4","author":"Cao Yameng","year":"2017","unstructured":"Yameng Cao, Alexander J. Robson, Abdullah Alharbi, Jonathan Roberts, Christopher S. Woodhead, Yasir J. Noori, Ramon Bernardo-Gavito et\u00a0al. Optical identification using imperfections in 2D materials. 2D Mater. 4, 4 (2017), 045021."},{"key":"e_1_3_2_45_2","volume-title":"Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST\u201920)","author":"Wang Ye","year":"2020","unstructured":"Ye Wang, Xiaodan Xi, and Michael Orshansky. 2020. Lattice PUF: A strong physical unclonable function provably secure against machine learning attacks. In Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST\u201920), 273\u2013283. DOI:10.1109\/HOST45689.2020.9300125"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3207119"},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/TDSC.2016.2536609","article-title":"Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions","volume":"14","author":"Herder Charles","year":"2016","unstructured":"Charles Herder, Ling Ren, Marten Van Dijk, Meng-Day Yu, and Srinivas Devadas. 2016. Trapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions. IEEE Trans. Depend. Secure Comput. 14, 1 (2016), 65\u201382.","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"e_1_3_2_48_2","doi-asserted-by":"crossref","first-page":"101228","DOI":"10.1016\/j.segan.2023.101228","article-title":"An efficient authentication protocol for smart grid communication based on on-chip-error-correcting physical unclonable function","volume":"36","author":"Kaveh Masoud","year":"2023","unstructured":"Masoud Kaveh, Mohammad Reza Mosavi, Diego Martin, and Saeed Aghapour. 2023. An efficient authentication protocol for smart grid communication based on on-chip-error-correcting physical unclonable function. Sust. Energy Grids Netw. 36 (2023), 101228.","journal-title":"Sust. Energy Grids Netw."},{"key":"e_1_3_2_49_2","volume-title":"Young Beom Kim, and Seog Chung Seo","author":"Hwang Vincent","year":"2023","unstructured":"Vincent Hwang, Young Beom Kim, and Seog Chung Seo. 2023. Barrett multiplication for Dilithium on embedded devices. Cryptology ePrint Archive."},{"key":"e_1_3_2_50_2","volume-title":"International Conference on Cryptology in Africa, 217\u2013235","author":"Bos Joppe W.","year":"2022","unstructured":"Joppe W. Bos, Joost Renes, and Amber Sprenkels. 2022. Dilithium for memory constrained devices. In International Conference on Cryptology in Africa, 217\u2013235. Springer Nature, Cham, Switzerland."},{"key":"e_1_3_2_51_2","volume-title":"Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P\u201918)","author":"Bos Joppe","year":"2018","unstructured":"Joppe Bos, Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehle. 2018. CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P\u201918), 353\u2013367. IEEE. DOI:10.1109\/EuroSP.2018.00032"},{"key":"e_1_3_2_52_2","first-page":"1","article-title":"Classic McEliece: Conservative code-based cryptography","volume":"1","author":"Bernstein Daniel J.","year":"2017","unstructured":"Daniel J. Bernstein, Tung Chou, Tanja Lange, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Edoardo Persichetti, et\u00a0al. 2017. Classic McEliece: Conservative code-based cryptography. NIST Submissions 1, 1 (2017), 1\u201325.","journal-title":"NIST Submissions"},{"key":"e_1_3_2_53_2","volume-title":"Proceedings of the Annual International Cryptology Conference, 537\u2013554","author":"Fujisaki Eiichiro","year":"1999","unstructured":"Eiichiro Fujisaki and Tatsuaki Okamoto. 1999. Secure integration of asymmetric and symmetric encryption schemes. In Proceedings of the Annual International Cryptology Conference, 537\u2013554. Springer, Berlin. 10.1007\/3-540-48405-1_34"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:18Z","timestamp":1750295898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,8]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3715328"],"URL":"https:\/\/doi.org\/10.1145\/3715328","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,8]]},"assertion":[{"value":"2024-02-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}