Fast and power-analysis resistant ring lizard crypto-processor based on the sparse ternary property

Piljoo Choi, Ji Hoon Kim, Dong Kyue Kim

Research output: Contribution to journalArticlepeer-review

3 Scopus citations


Ring Lizard (RLizard) is a quantum-resistant public-key cryptosystem based on the ideal lattice. RLizard uses a sparse ternary polynomial, which facilitates implementation with lower complexity. The Lizard scheme’s proposal for the National Institute of Standards and Technology’s post-quantum cryptography standardization included its reference hardware design using the sparse ternary property; however, in this paper, we present the RLizard crypto-processor with the improved processing speed and security level against power analysis attacks. By additionally utilizing unused values for each memory access in the conventional RLizard crypto-processor, the processing speed of the proposed RLizard crypto-processors can increase by a factor of two or up to four times. The implementation results with three different FPGA devices show that the area overhead is approximately 50–100 flip-flops (FFs) and 50–300 lookup tables (LUTs), occupying approximately 2%–3% of the total area. The vulnerability to power analysis attacks and the proposed countermeasures were also analyzed. The experimental results prove the vulnerability of unprotected implementation, and the implementation results show that the masking and hiding countermeasures additionally require approximately 50–120 FFs and 100–360 LUTs. In addition, our idea can be applied to other ideal-lattice-based cryptosystems using a sparse binary or ternary polynomial, such as NTRU and Round5.

Original languageEnglish
Article number2929299
Pages (from-to)98684-98693
Number of pages10
JournalIEEE Access
StatePublished - 2019

Bibliographical note

Publisher Copyright:
© 2019 Institute of Electrical and Electronics Engineers Inc.. All rights reserved.


  • Coprocessors
  • Digital circuits
  • Field programmable gate arrays
  • Post-quantum cryptography
  • Side-channel attacks


Dive into the research topics of 'Fast and power-analysis resistant ring lizard crypto-processor based on the sparse ternary property'. Together they form a unique fingerprint.

Cite this