
code includes tasks for monitoring and sharing values,
marginally impacting results. While algorithmic op-
timization ensures portability, a hardware-specific ap-
proach, like the Xilinx Artix 7 CPU (Deshpande et al.,
2023), would yield better results with hardware ac-
celeration. The optimized HQC implementation runs
in constant time but must be evaluated against other
side-channel attacks for potential vulnerabilities.
6 CONCLUSIONS AND FUTURE
WORKS
This article presents algorithmic optimization for the
HQC post-quantum KEM on the ARM Cortex-M4 us-
ing the ChibiOS RTOS. The optimization is portable
and compatible with various operating systems, mak-
ing it applicable to a wide range of hardware plat-
forms. Performance improvements include a 96% re-
duction in key generation time and 95% reductions
in encapsulation and decapsulation times. These en-
hancements make HQC a viable solution for resource-
constrained systems, surpassing BIKE as the most
performant code-based KEM. While CRYSTALS-
Kyber remains the top-performing algorithm, further
optimization could narrow the performance gap.
Future work will explore hardware-specific opti-
mizations using NEON for ARM or AVX2 for Intel
CPUs. Additionally, BIKE will be investigated for a
similar optimization strategy. Evaluation across dif-
ferent hardware and OSs will validate the results.
Overall, this optimized version of HQC offers
enhanced cryptographic capabilities for applications
such as IoT and UAVs without compromising system
availability.
REFERENCES
Aguilar, C., Aragon, N., Bettaieb, S., Bidoux, L., Blazy,
O., Bos, J., Deneuville, J.-C., Dion, A., Gaborit, P.,
Lacan, J., Persichetti, E., Robert, J.-M., V
´
eron, P.,
and Z
´
emor, G. (2023). Hamming quasi-cyclic (HQC)
fourth round version. Submission to the NIST’s post-
quantum cryptography standardization process.
Aissaoui, R., Deneuville, J.-C., Guerber, C., and Pirovano,
A. (2023). A survey on cryptographic methods to se-
cure communications for uav traffic management. Ve-
hicular Communications.
Albrecht, M. R., Bernstein, D. J., Chou, T., Cid, C., Gilcher,
J., Lange, T., Maram, V., Von Maurich, I., Misoczki,
R., Niederhagen, R., Paterson, K. G., Persichetti, E.,
Peters, C., Schwabe, P., Sendrier, N., Szefer, J., Tjhai,
C. J., Tomlinson, M., and Wang, W. (2022). Clas-
sic mceliece: conservative code-based cryptography.
Submission to the NIST’s post-quantum cryptography
standardization process.
Aragon, N., Aguilar Melchor, C., Barreto, P., Bettaieb,
S., Bidoux, L., Blazy, O., Deneuville, J.-C., Gaborit,
P., Ghosh, S., Gueron, S., G
¨
uneysu, T., Misoczki,
R., Persichetti, E., Richter-Brockmann, J., Sendrier,
N., Tillich, J.-P., Vasseur, V., and Z
´
emor, G. (2022).
Bike: bit flipping key encapsulation. Submission to
the NIST’s post-quantum cryptography standardiza-
tion process.
Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyuba-
shevsky, V., Schanck, J. M., Schwabe, P., Seiler, G.,
and Stehl
´
e, D. (2019). Crystals-kyber algorithm spec-
ifications and supporting documentation. Submission
to the NIST’s post-quantum cryptography standard-
ization process.
Deshpande, S., Xu, C., Nawan, M., Nawaz, K., and Szefer,
J. (2023). Fast and efficient hardware implementa-
tion of HQC. In Proceedings of the Selected Areas in
Cryptography.
Kannwischer, M. J., Rijneveld, J., Schwabe, P., and Stof-
felen, K. (2019). pqm4: Testing and Benchmarking
NIST PQC on ARM Cortex-M4. Cryptology ePrint
Archive, Paper 2019/844.
Kannwischer, M. J., Schwabe, P., Stebila, D., and Wiggers,
T. (2022). Improving software quality in cryptogra-
phy standardization projects. In 2022 IEEE European
Symposium on Security and Privacy Workshops (Eu-
roS&PW). IEEE.
Karatsuba, A. and Ofman, Y. (1962). Multiplication of
many-digital numbers by automatic computers. Dokl.
Akad. Nauk SSSR.
Kumari, S., Singh, M., Singh, R., and Tewari, H. (2022).
Post-quantum cryptography techniques for secure
communication in resource-constrained internet of
things devices: A comprehensive survey. Software:
Practice and Experience.
Naru, E. R., Saini, H., and Sharma, M. (2017). A recent
review on lightweight cryptography in iot. In 2017 in-
ternational conference on I-SMAC (IoT in social, mo-
bile, analytics and cloud)(I-SMAC).
Shor, P. (1994). Algorithms for quantum computation: dis-
crete logarithms and factoring. In Proceedings 35th
Annual Symposium on Foundations of Computer Sci-
ence.
Thakor, V. A., Razzaque, M. A., and Khandaker, M. R.
(2021). Lightweight cryptography algorithms for
resource-constrained iot devices: A review, compar-
ison and research opportunities. IEEE Access.
Yiu, J. and Frame, A. (2013). Cortex-M Processors and the
Internet of Things (IoT). ARM whitepaper.
A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC
673