Results 121 to 130 of about 2,293 (163)

Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation

open access: closedJournal of Cryptographic Engineering, 2022
Efficient computation of polynomial multiplication over characteristic three fields is required for post-quantum cryptographic applications which gain importance upon the recent advances in quantum computers. In this paper, we propose three new polynomial multiplication algorithms over F-3 and show that they are more efficient than the current state-of-
Esra Yeniaras, Murat Cenk
openalex   +3 more sources

Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM

open access: closed2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2021
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalist and alternative candidates), and we demonstrate the vulnerabilities of their sub-routines to a power-based ...
Emre Karabulut   +2 more
openalex   +3 more sources

Efficient Multiplier and FPGA Implementation for NTRU Prime

open access: closed2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2021
As quantum computing age is emerging on horizon, many of the current cryptography standards, e.g., RSA and Elliptic Curve Cryptography, are shown to be compromised under quantum attacks according to Shor's algorithm. A multiple-round competition has been launched by NIST to decide the next generation post-quantum cryptography (PQC) standards since 2017.
Huapeng Wu, Xi Gao
openalex   +2 more sources

A Constant Time Full Hardware Implementation of Streamlined NTRU Prime

open access: closed, 2021
This paper presents a constant time hardware implementation of the NIST round 2 post-quantum cryptographic algorithm Streamlined NTRU Prime. We implement the entire KEM algorithm, including all steps for key generation, encapsulation and decapsulation, and all en- and decoding. We focus on optimizing the resources used, as well as applying optimization
Adrian Marotzke
openalex   +2 more sources

A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime

open access: closed2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan), 2023
Masakazu Awakiahra   +5 more
openalex   +2 more sources

CALCULATION OF GENERAL PARAMETERS FOR NTRU PRIME UKRAINE OF 6-7 LEVELS OF STABILITY

open access: closedTelecommunications and Radio Engineering, 2019
І.Д. Горбенко   +7 more
openalex   +2 more sources

ANALYSIS OF ASYMMETRIC NTRU PRIME IIT UKRAINE ENCRYPTION ALGORITHM WITH REGARDS TO KNOWN ATTACKS

open access: closedTelecommunications and Radio Engineering, 2018
І.Д. Горбенко   +2 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy