BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.riscv-europe.org//eu-summit-2026//talk//YQDVJU
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-eu-summit-2026-YQDVJU@cfp.riscv-europe.org
DTSTART;TZID=CET:20260609T130000
DTEND;TZID=CET:20260609T133000
DESCRIPTION:Post-Quantum Cryptography is becoming a key building block for 
 future secure systems\, as quantum computers threaten widely deployed publ
 ic-key cryptographic algorithms. In response\, the NIST standardization pr
 ocess has selected new quantum-resistant schemes\, among which ML-KEM play
 s a central role for key establishment. Deploying these algorithms efficie
 ntly on embedded processors is therefore a critical step toward practical 
 adoption\, particularly because embedded systems face strict constraints i
 n terms of computational resources\, memory footprint\, and energy consump
 tion. At the same time\, they are more exposed to physical threats\, makin
 g resistance to side-channel attacks a key requirement. These constraints 
 make RISC-V especially attractive: its open instruction set and extensibil
 ity allow experimentation with software optimizations as well as hardware 
 acceleration for PQC. To explore these aspects\, CEA has developed VASCO3\
 , a 22 nm ASIC chip designed to experimentally evaluate PQC implementation
 s and side-channel countermeasures directly on silicon. The chip integrate
 s a RISC-V–based System-on-Chip (SoC) together with several ML-KEM hardw
 are accelerators\, enabling the study of different hardware/software parti
 tioning strategies around an embedded RISC-V CPU. In this demonstration\, 
 we present a comprehensive exploration of ML-KEM. We first showcase a pure
  software implementation running on the RISC-V\, then progressively introd
 uce hardware acceleration and a fully dedicated ML-KEM accelerator. We als
 o demonstrate protected implementations based on first-order masking\, inc
 luding a masked software version and a masked hardware-assisted design.
DTSTAMP:20260522T163252Z
LOCATION:Devzone
SUMMARY:ML-KEM on a 22 nm ASIC: Protected\, Unprotected\, and Hardware-Ac
 celerated Implementations - Stefano Di Matteo\, Emanuele Valea
URL:https://cfp.riscv-europe.org/eu-summit-2026/talk/YQDVJU/
END:VEVENT
END:VCALENDAR
