JOURNAL ARTICLE

Efficient unified architecture for post-quantum cryptography: combining Dilithium and Kyber

Patrik DobiášLukáš MalinaJan Hajný

Year: 2025 Journal:   PeerJ Computer Science Vol: 11 Pages: e2746-e2746   Publisher: PeerJ, Inc.

Abstract

As the ongoing standardization process of post-quantum schemes yields initial outcomes, it becomes increasingly important to not only optimize standalone implementations but also explore the potential of combining multiple schemes into a single, unified architecture. In this article, we investigate the combination of two National Institute of Standards and Technology (NIST)-selected schemes: the Dilithium digital signature scheme and the Kyber key encapsulation mechanism. We propose a novel set of optimization techniques for a unified hardware implementation of these leading post-quantum schemes, achieving a balanced approach between area efficiency and high performance. Our design demonstrates superior resource efficiency and performance compared to previously reported unified architecture ( DOI 10.1109/TCSI.2022.3219555 ), also achieving results that are better than, or comparable, to those of standalone implementations. The efficient and combined implementation of lattice-based digital signatures and key establishment methods can be deployed for establishing secure sessions in high-speed communication networks at servers and gateways. Moreover, the unique and compact design that requires small hardware resources can be directly used in small and cost-effective field programmable gate array (FPGA) platforms that can be used as security co-processors for embedded devices and in the Internet of Things.

Keywords:
Dilithium Quantum cryptography Cryptography Computer science Architecture Theoretical computer science Quantum Computer security Physics Quantum mechanics Quantum information History

Metrics

2
Cited By
9.64
FWCI (Field Weighted Citation Impact)
39
Refs
0.96
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Coding theory and cryptography
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.