Results 121 to 130 of about 2,231 (134)
Some of the next articles are maybe not open access.
2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2021
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalist and alternative candidates), and we demonstrate the vulnerabilities of their sub-routines to a power-based ...
Karabulut, Emre +2 more
openaire +2 more sources
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalist and alternative candidates), and we demonstrate the vulnerabilities of their sub-routines to a power-based ...
Karabulut, Emre +2 more
openaire +2 more sources
Journal of Cryptographic Engineering, 2022
Efficient computation of polynomial multiplication over characteristic three fields is required for post-quantum cryptographic applications which gain importance upon the recent advances in quantum computers. In this paper, we propose three new polynomial multiplication algorithms over F-3 and show that they are more efficient than the current state-of-
Esra Yeniaras, Murat Cenk
openaire +2 more sources
Efficient computation of polynomial multiplication over characteristic three fields is required for post-quantum cryptographic applications which gain importance upon the recent advances in quantum computers. In this paper, we propose three new polynomial multiplication algorithms over F-3 and show that they are more efficient than the current state-of-
Esra Yeniaras, Murat Cenk
openaire +2 more sources
A Constant Time Full Hardware Implementation of Streamlined NTRU Prime
2021This paper presents a constant time hardware implementation of the NIST round 2 post-quantum cryptographic algorithm Streamlined NTRU Prime. We implement the entire KEM algorithm, including all steps for key generation, encapsulation and decapsulation, and all en- and decoding. We focus on optimizing the resources used, as well as applying optimization
openaire +1 more source
2017
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading proposals for post-quantum lattice-based cryptography, including the classic NTRU cryptosystem and typical Ring-LWE-based cryptosystems.
Bernstein, Daniel J. +3 more
openaire +1 more source
Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading proposals for post-quantum lattice-based cryptography, including the classic NTRU cryptosystem and typical Ring-LWE-based cryptosystems.
Bernstein, Daniel J. +3 more
openaire +1 more source
Secure and efficient hardware implementations of NTRU Prime
Streamlined NTRU Prime ist ein Kryptographischer Algorithmus mit dem Ziel, das Risiko von gitterbasiertem KEM zu senken, bei einer nur niedrigem Leistungseinbuße. Wir untersuchen, inwieweit diese Leistungseinbußen auch für Hardwareimplementierungen gelten und ob wir diese mit spezialisierten Designs weiter mindern können.openaire +1 more source
Efficient NTT Multiplier of NTRU Prime PQC Algorithm
2023Salarifard, Raziyeh +3 more
openaire +1 more source
A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime
2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan), 2023Masakazu Awakiahra +5 more
openaire +1 more source
ANALYSIS OF ASYMMETRIC NTRU PRIME IIT UKRAINE ENCRYPTION ALGORITHM WITH REGARDS TO KNOWN ATTACKS
Telecommunications and Radio Engineering, 2018I. D. Gorbenko +2 more
openaire +1 more source
CALCULATION OF GENERAL PARAMETERS FOR NTRU PRIME UKRAINE OF 6-7 LEVELS OF STABILITY
Telecommunications and Radio Engineering, 2019I. D. Gorbenko +7 more
openaire +1 more source

