This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessArticle
Secure Implementation of RISC-V’s Scalar Cryptography Extension Set
Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands
*
Authors to whom correspondence should be addressed.
Cryptography 2026, 10(1), 6; https://doi.org/10.3390/cryptography10010006 (registering DOI)
Submission received: 17 December 2025
/
Revised: 7 January 2026
/
Accepted: 14 January 2026
/
Published: 17 January 2026
Abstract
Instruction Set Architecture (ISA) extensions, particularly scalar cryptography extensions (Zk), combine the performance advantages of hardware with the adaptability of software, enabling the direct and efficient execution of cryptographic functions within the processor pipeline. This integration eliminates the need to communicate with external cores, substantially reducing latency, power consumption, and hardware overhead, making it especially suitable for embedded systems with constrained resources. However, current scalar cryptography extension implementations remain vulnerable to physical threats, notably power side-channel attacks (PSCAs). These attacks allow adversaries to extract confidential information, such as secret keys, by analyzing the power consumption patterns of the hardware during operation. This paper presents an optimized and secure implementation of the RISC-V scalar Advanced Encryption Standard (AES) extension (Zkne/Zknd) using Domain-Oriented Masking (DOM) to mitigate first-order PSCAs. Our approach features optimized assembly implementations for partial rounds and key scheduling alongside pipeline-aware microarchitecture optimizations. We evaluated the security and performance of the proposed design using the Xilinx Artix7 FPGA platform. The results indicate that our design is side-channel-resistant while adding a very low area overhead of 0.39% to the full 32-bit CV32E40S RISC-V processor. Moreover, the performance overhead is zero when the extension-related instructions are properly scheduled.
Share and Cite
MDPI and ACS Style
Kassimi, A.; Aljuffri, A.; Larmann, C.; Hamdioui, S.; Taouil, M.
Secure Implementation of RISC-V’s Scalar Cryptography Extension Set. Cryptography 2026, 10, 6.
https://doi.org/10.3390/cryptography10010006
AMA Style
Kassimi A, Aljuffri A, Larmann C, Hamdioui S, Taouil M.
Secure Implementation of RISC-V’s Scalar Cryptography Extension Set. Cryptography. 2026; 10(1):6.
https://doi.org/10.3390/cryptography10010006
Chicago/Turabian Style
Kassimi, Asmaa, Abdullah Aljuffri, Christian Larmann, Said Hamdioui, and Mottaqiallah Taouil.
2026. "Secure Implementation of RISC-V’s Scalar Cryptography Extension Set" Cryptography 10, no. 1: 6.
https://doi.org/10.3390/cryptography10010006
APA Style
Kassimi, A., Aljuffri, A., Larmann, C., Hamdioui, S., & Taouil, M.
(2026). Secure Implementation of RISC-V’s Scalar Cryptography Extension Set. Cryptography, 10(1), 6.
https://doi.org/10.3390/cryptography10010006
Article Metrics
Article metric data becomes available approximately 24 hours after publication online.