Hardware

Hardware in Modern Cryptography

Cryptographic protocols often start as software prototypes, yet ASIC and FPGA architectures can differ radically. We discuss some of the limitations on custom hardware and adaptations to existing protocols to make them more hardware-friendly.

Arithmetization-Friendly Primes and Efficient Constraint Evaluation: STARKs on Custom Hardware

Under the premise of fully custom hardware, we explore more efficient choices of prime numbers in STARKs. In particular, we show that designing trace tables over specific primes that have previously not been considered leads to smaller traces for …