Results 1 to 10 of about 2,231 (134)

Polynomial Multiplication in NTRU Prime [PDF]

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by
Erdem Alkim   +10 more
doaj   +7 more sources

Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We propose NTT implementations with each supporting at least one parameter of NTRU and one parameter of NTRU Prime. Our implementations are based on size-1440, size-1536, and size-1728 convolutions without algebraic assumptions on the target polynomial ...
Erdem Alkim, Vincent Hwang, Bo-Yin Yang
doaj   +5 more sources

Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Streamlined NTRU Prime is a lattice-based Key Encapsulation Mechanism (KEM) that is, together with X25519, the default algorithm in OpenSSH 9. Based on lattice assumptions, it is assumed to be secure also against attackers with access to< large-scale ...
Georg Land   +3 more
doaj   +2 more sources

NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [PDF]

open access: yesJisuanji kexue, 2022
Full homomorphic encryption (FHE) supports arbitrary computation on the ciphertext without the requirement of decryption,which provides protection for privacy security in cloud computing.However,the current FHE scheme constructed using the approximate ...
QIN Xiao-yue, HUANG Ru-wei, YANG Bo
doaj   +2 more sources

Power Analysis on NTRU Prime

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
This paper applies a variety of power analysis techniques to several implementations of NTRU Prime, a Round 2 submission to the NIST PQC Standardization Project.
Wei-Lun Huang   +2 more
doaj   +3 more sources

Will You Cross the Threshold for Me?

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this work, we propose generic and novel side-channel assisted chosenciphertext attacks on NTRU-based key encapsulation mechanisms (KEMs). These KEMs are IND-CCA secure, that is, they are secure in the chosen-ciphertext model.
Prasanna Ravi   +4 more
doaj   +1 more source

Streamlined NTRU Prime on FPGA

open access: yesJournal of Cryptographic Engineering, 2022
AbstractWe present a novel full hardware implementation of Streamlined NTRU Prime, with two variants: a high-speed, high-area implementation and a slower, low-area implementation. We introduce several new techniques that improve performance, including a batch inversion for key generation, a high-speed schoolbook polynomial multiplier, an NTT polynomial
Bo-Yuan Peng   +4 more
openaire   +1 more source

Efficient multi‐key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations

open access: yesIET Information Security, 2021
Multi‐key fully homomorphic encryption (MKFHE) allows computations on ciphertexts encrypted by different users, which can be applied to implement secure multi‐party computing (MPC).
TanPing Zhou   +5 more
doaj   +1 more source

Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Rei Ueno   +5 more
doaj   +1 more source

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Yutaro Tanaka   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy