This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessArticle
Accelerating Post-Quantum Cryptography: A High-Efficiency NTT for ML-KEM on RISC-V
1
Department of Computer and Network Engineering, University of Electro-Communications (UEC), Tokyo 182-8585, Japan
2
Faculty of Radio-Electronics Engineering, Le Quy Don Technical University (LQDTU), Hanoi 10000, Vietnam
3
Faculty of Electronics and Telecommunications, The University of Science, Vietnam National University Ho Chi Minh City, Ho Chi Minh City 700000, Vietnam
*
Authors to whom correspondence should be addressed.
Electronics 2026, 15(1), 100; https://doi.org/10.3390/electronics15010100 (registering DOI)
Submission received: 12 November 2025
/
Revised: 17 December 2025
/
Accepted: 23 December 2025
/
Published: 24 December 2025
Abstract
Post-quantum cryptography (PQC) is rapidly being standardized, with key primitives such as Key Encapsulation Mechanisms (KEMs) and Digital Signature Algorithms (DSAs) moving into practical applications. While initial research focused on pure software and hardware implementations, the focus is shifting toward flexible, high-efficiency solutions suitable for widespread deployment. A system-on-chip is a viable option with the ability to coordinate between hardware and software flexibly. However, the main drawback of this system is the latency in exchanging data during computation. Currently, most SoCs are implemented on FPGAs, and there is a lack of SoCs realized on ASICs. This paper introduces a complete RISC-V SoC design in an ASIC for Module Lattice-based KEM. Our system features a RISC-V processor tightly integrated with a high-efficiency Number Theoretic Transform (NTT) accelerator. This accelerator leverages custom instructions to accelerate cryptographic operations. Our research has achieved the following results: (1) The accelerator provides a speedup of up to 14.51 × for NTT and 16.75 × for inverse NTT operations compared to other RISC-V platforms; (2) This leads to end-to-end performance improvements for ML-KEM of up to 56.5% for security level I, 50.9% for level III, and 45.4% for level V; (3) The ASIC design is fabricated using a 180 nm CMOS process at a maximum operating frequency of 118 MHz with an area overhead of 8.7%. The chip achieved a minimum power consumption of 5.913 W at 10 kHz and 0.9 V of supply voltage.
Share and Cite
MDPI and ACS Style
Dam, D.-T.; Nguyen, K.-D.; Le, D.-H.; Pham, C.-K.
Accelerating Post-Quantum Cryptography: A High-Efficiency NTT for ML-KEM on RISC-V. Electronics 2026, 15, 100.
https://doi.org/10.3390/electronics15010100
AMA Style
Dam D-T, Nguyen K-D, Le D-H, Pham C-K.
Accelerating Post-Quantum Cryptography: A High-Efficiency NTT for ML-KEM on RISC-V. Electronics. 2026; 15(1):100.
https://doi.org/10.3390/electronics15010100
Chicago/Turabian Style
Dam, Duc-Thuan, Khai-Duy Nguyen, Duc-Hung Le, and Cong-Kha Pham.
2026. "Accelerating Post-Quantum Cryptography: A High-Efficiency NTT for ML-KEM on RISC-V" Electronics 15, no. 1: 100.
https://doi.org/10.3390/electronics15010100
APA Style
Dam, D.-T., Nguyen, K.-D., Le, D.-H., & Pham, C.-K.
(2026). Accelerating Post-Quantum Cryptography: A High-Efficiency NTT for ML-KEM on RISC-V. Electronics, 15(1), 100.
https://doi.org/10.3390/electronics15010100
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details
here.
Article Metrics
Article Access Statistics
For more information on the journal statistics, click
here.
Multiple requests from the same IP address are counted as one view.