{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:10:52Z","timestamp":1740143452074,"version":"3.37.3"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"5","funder":[{"name":"Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korean government","award":["2022-0-00627"]},{"name":"Institute for Information & Communications Technology Promotion (IITP) grant funded by the Korean government","award":["2018-0-00264"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"\n The Rainbow Signature Scheme is one of the finalists in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) standardization competition,\n but failed to win because it has lack of stability in the parameter selection.<\/jats:styled-content>\n It is the only signature candidate based on a multivariate quadratic equation. Rainbow signatures have smaller signature sizes compared with other post-quantum cryptography candidates. However, they require expensive tower-field based polynomial multiplications. In this article, we propose an efficient implementation of Rainbow signatures using a look-up table\u2013based multiplication method. The polynomial multiplications in Rainbow signatures are performed on the \ud835\udd3d\n 16<\/jats:sub>\n field, which is divided into sub-fields \ud835\udd3d\n 4<\/jats:sub>\n and \ud835\udd3d\n 2<\/jats:sub>\n under the tower-field method. To accelerate the multiplication process on target processors, we propose a look-up table\u2013based tower-field multiplication technique. In \ud835\udd3d\n 16<\/jats:sub>\n , all values are expressed in 4-bit data format and can be implemented using a 256-byte look-up table access. The implementation uses the\n TBL<\/jats:monospace>\n and\n TBX<\/jats:monospace>\n instructions of the 64-bit ARMv8 target processor. For Rainbow III and Rainbow V, they are computed on the \ud835\udd3d\n 256<\/jats:sub>\n field using an additional 16-byte table instead of creating a new look-up table. The proposed technique uses the vector registers of 64-bit ARMv8 processors and can calculate 16 result values with a single instruction.\n We also proposed implementations that are resistant to timing attacks. There are two types of implementations. The first one is the cache side-attack resistant implementation, which utilizes the 128-byte cache lines of the M1 processor. In this implementation, cache misses do not occur, and cache hits always occur. The second type is the constant-time implementation. This method takes a step-by-step approach to finding the required look-up table value and ensures that the same number of accesses is made regardless of which look-up table value is called. This implementation is designed to be constant-time, meaning it does not leak timing information.<\/jats:styled-content>\n Our experiments on modern Apple M1 processors showed up to 428.73\u00d7 and 114.16\u00d7 better performance for finite field multiplications and Rainbow signatures schemes, respectively, compared with previous\n reference<\/jats:styled-content>\n implementations. To the best of our knowledge, this proposed Rainbow implementation is the first optimized Rainbow implementation for 64-bit ARMv8 processors.\n <\/jats:p>","DOI":"10.1145\/3607140","type":"journal-article","created":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T13:37:06Z","timestamp":1688477826000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Look-up the Rainbow: Table-based Implementation of Rainbow Signature on 64-bit ARMv8 Processors"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9173-512X","authenticated-orcid":false,"given":"Hyeokdong","family":"Kwon","sequence":"first","affiliation":[{"name":"Hansung University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6757-6109","authenticated-orcid":false,"given":"Hyunjun","family":"Kim","sequence":"additional","affiliation":[{"name":"Hansung University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5242-214X","authenticated-orcid":false,"given":"Minjoo","family":"Sim","sequence":"additional","affiliation":[{"name":"Hansung University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4659-8979","authenticated-orcid":false,"given":"Wai-Kong","family":"Lee","sequence":"additional","affiliation":[{"name":"Gachon University, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0069-9061","authenticated-orcid":false,"given":"Hwajeong","family":"Seo","sequence":"additional","affiliation":[{"name":"Hansung University, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"key":"e_1_3_3_2_2","first-page":"92","volume-title":"International Conference on Selected Areas in Cryptography","author":"Bernstein Daniel J.","year":"2014","unstructured":"Daniel J. Bernstein and Tung Chou. 2014. Faster binary-field multiplication and faster binary-field MACS. In International Conference on Selected Areas in Cryptography. Springer, 92\u2013111."},{"key":"e_1_3_3_3_2","article-title":"Breaking rainbow takes a weekend on a laptop","author":"Beullens Ward","year":"2022","unstructured":"Ward Beullens. 2022. Breaking rainbow takes a weekend on a laptop. Cryptology ePrint Archive (2022).","journal-title":"Cryptology ePrint Archive"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66626-2_13"},{"issue":"3","key":"e_1_3_3_5_2","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1587\/transfun.E101.A.553","article-title":"Implementing 128-bit secure MPKC signatures","volume":"101","author":"Chen Ming-Shing","year":"2018","unstructured":"Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, and Chen-Mou Cheng. 2018. Implementing 128-bit secure MPKC signatures. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 101, 3 (2018), 553\u2013569.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"e_1_3_3_6_2","first-page":"532","article-title":"Rainbow on Cortex-M4.","volume":"2021","author":"Chou Tung","year":"2021","unstructured":"Tung Chou, Matthias J. Kannwischer, and Bo-Yin Yang. 2021. Rainbow on Cortex-M4. IACR Cryptol. ePrint Arch. 2021 (2021), 532.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_3_7_2","article-title":"Rainbow \u2014 Algorithm Specification and Documentation The 3rd Round Proposal","author":"Ding Jintai","year":"2020","unstructured":"Jintai Ding, Ming-Shing Chen, Matthias Kannwischer, Jacques Patarin, Albrecht Petzoldt, Dieter Schmidt, and Bo-Yin Yang. 2020. Rainbow \u2014 Algorithm Specification and Documentation The 3rd Round Proposal. https:\/\/troll.iis.sinica.edu.tw\/by-publ\/recent\/R ainbow3round.pdf","journal-title":"https:\/\/troll.iis.sinica.edu.tw\/by-publ\/recent\/R ainbow3round.pdf"},{"key":"e_1_3_3_8_2","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/11496137_12","volume-title":"International Conference on Applied Cryptography and Network Security","author":"Ding Jintai","year":"2005","unstructured":"Jintai Ding and Dieter Schmidt. 2005. Rainbow, a new multivariable polynomial signature scheme. In International Conference on Applied Cryptography and Network Security. Springer, 164\u2013175."},{"issue":"3","key":"e_1_3_3_9_2","first-page":"527","article-title":"Efficient implementation of finite field operations in NIST PQC rainbow","volume":"31","author":"Kim Gwang-Sik","year":"2021","unstructured":"Gwang-Sik Kim and Young-Sik Kim. 2021. Efficient implementation of finite field operations in NIST PQC rainbow. Journal of the Korea Institute of Information Security & Cryptology 31, 3 (2021), 527\u2013532.","journal-title":"Journal of the Korea Institute of Information Security & Cryptology"},{"key":"e_1_3_3_10_2","first-page":"206","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"Kipnis Aviad","year":"1999","unstructured":"Aviad Kipnis, Jacques Patarin, and Louis Goubin. 1999. Unbalanced oil and vinegar signature schemes. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 206\u2013222."},{"key":"e_1_3_3_11_2","article-title":"Optimized implementation of SM4 on AVR microcontrollers, RISC-V processors, and ARM processors","author":"Kwon Hyeokdong","year":"2021","unstructured":"Hyeokdong Kwon, Hyunjun Kim, Siwoo Eum, Minjoo Sim, Hyunji Kim, Wai-Kong Lee, Zhi Hu, and Hwajeong Seo. 2021. Optimized implementation of SM4 on AVR microcontrollers, RISC-V processors, and ARM processors. Cryptology ePrint Archive (2021).","journal-title":"Cryptology ePrint Archive"},{"issue":"1","key":"e_1_3_3_12_2","first-page":"99","article-title":"VHDL design for out-of-order superscalar processor of a fully pipelined scheme","volume":"21","author":"Lee Jongbok","year":"2021","unstructured":"Jongbok Lee. 2021. VHDL design for out-of-order superscalar processor of a fully pipelined scheme. The Journal of the Institute of Internet, Broadcasting and Communication 21, 1 (2021), 99\u2013105.","journal-title":"The Journal of the Institute of Internet, Broadcasting and Communication"},{"key":"e_1_3_3_13_2","first-page":"1","volume-title":"2016 International Symposium on VLSI Design, Automation and Test (VLSI-DAT)","author":"Lin Ivan","year":"2016","unstructured":"Ivan Lin, Brian Jeff, and Ian Rickard. 2016. ARM platform for performance and power efficiency-hardware and software perspectives. In 2016 International Symposium on VLSI Design, Automation and Test (VLSI-DAT). IEEE, 1\u20135."},{"key":"e_1_3_3_14_2","unstructured":"Duc Tri Nguyen and Kris Gaj. 2021. Optimized software implementations of CRYSTALS-Kyber NTRU and saber using NEON-based special instructions of ARMv8. (2021)."},{"key":"e_1_3_3_15_2","first-page":"33","volume-title":"International Conference on Cryptology in India","author":"Petzoldt Albrecht","year":"2010","unstructured":"Albrecht Petzoldt, Stanislav Bulygin, and Johannes Buchmann. 2010. CyclicRainbow\u2013a multivariate signature scheme with a partially cyclic public key. In International Conference on Cryptology in India. Springer, 33\u201348."},{"key":"e_1_3_3_16_2","first-page":"424","volume-title":"International Conference on Security and Privacy in Communication Systems","author":"Sanal Pakize","year":"2021","unstructured":"Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, and Mehran Mozaffari-Kermani. 2021. Kyber on ARM64: Compact implementations of Kyber on 64-bit ARM Cortex-A processors. In International Conference on Security and Privacy in Communication Systems. Springer, 424\u2013440."},{"issue":"3","key":"e_1_3_3_17_2","first-page":"473","article-title":"Optimized implementation of scalable multi-precision multiplication method on RISC-V processor for high-speed computation of post-quantum cryptography","volume":"31","author":"Seo Hwajeong","year":"2021","unstructured":"Hwajeong Seo, Hyeokdong Kwon, Kyoungbae Jang, and Hyunjun Kim. 2021. Optimized implementation of scalable multi-precision multiplication method on RISC-V processor for high-speed computation of post-quantum cryptography. Journal of the Korea Institute of Information Security & Cryptology 31, 3 (2021), 473\u2013480.","journal-title":"Journal of the Korea Institute of Information Security & Cryptology"},{"key":"e_1_3_3_18_2","first-page":"1","article-title":"SIDH on ARM: Faster modular multiplications for faster post-quantum supersingular isogeny key exchange","author":"Seo Hwajeong","year":"2018","unstructured":"Hwajeong Seo, Zhe Liu, Patrick Longa, and Zhi Hu. 2018. SIDH on ARM: Faster modular multiplications for faster post-quantum supersingular isogeny key exchange. IACR Transactions on Cryptographic Hardware and Embedded Systems (2018), 1\u201320.","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930986"},{"issue":"11","key":"e_1_3_3_20_2","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.1109\/TC.2017.2773524","article-title":"Post-quantum key exchange on ARMv8-A: A new hope for NEON made simple","volume":"67","author":"Streit Silvan","year":"2017","unstructured":"Silvan Streit and Fabrizio De Santis. 2017. Post-quantum key exchange on ARMv8-A: A new hope for NEON made simple. IEEE Trans. Comput. 67, 11 (2017), 1651\u20131662.","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_3_21_2","first-page":"1","volume-title":"2020 7th International Conference on Smart Structures and Systems (ICSSS)","author":"Surana Purab","year":"2020","unstructured":"Purab Surana, Nishil Madhani, and T. Gopalakrishnan. 2020. A comparative study on the recent smart mobile phone processors. In 2020 7th International Conference on Smart Structures and Systems (ICSSS). IEEE, 1\u20133."},{"key":"e_1_3_3_22_2","unstructured":"Rainbow Team. 2020. Modified parameters of Rainbow in response to a refined analysis of the Rainbow band separation attack by the NIST team and the recent new MinRank attacks. https:\/\/troll.iis.sinica.edu.tw\/by-publ\/recent\/rainbow-pars.pdf"},{"key":"e_1_3_3_23_2","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1109\/SP46214.2022.9833570","volume-title":"2022 IEEE Symposium on Security and Privacy (SP)","author":"Vicarte Jose Rodrigo Sanchez","year":"2022","unstructured":"Jose Rodrigo Sanchez Vicarte, Michael Flanders, Riccardo Paccagnella, Grant Garrett-Grossman, Adam Morrison, Christopher W. Fletcher, and David Kohlbrenner. 2022. Augury: Using data memory-dependent prefetchers to leak data at rest. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1491\u20131505."}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T10:52:32Z","timestamp":1695725552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3607140"],"URL":"https:\/\/doi.org\/10.1145\/3607140","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2023,9,26]]},"assertion":[{"value":"2022-01-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}