Results 211 to 220 of about 126,749 (256)
Some of the next articles are maybe not open access.

NTT Architecture for a Linux-Ready RISC-V Fully-Homomorphic Encryption Accelerator

IEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2022
This paper proposes two architectures for the acceleration of Number Theoretic Transforms (NTTs) using a novel Montgomery-based butterfly. We first design a custom NTT hardware accelerator for Field-Programmable Gate Arrays (FPGAs).
Rogério Paludo, L. Sousa
semanticscholar   +1 more source

HRCIM-NTT: An Efficient Compute-in-Memory NTT Accelerator With Hybrid-Redundant Numbers

IEEE Transactions on Circuits and Systems Part 1: Regular Papers
Recently, four NIST-approved Post-Quantum Cryptography (PQC) algorithms are selected to be standardized. Three of them are lattice-based cryptographic schemes and feature the number-theoretic transform (NTT) as the computing bottleneck compelling fast ...
Xu Zhang   +4 more
semanticscholar   +1 more source

Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography

IEEE Transactions on Information Forensics and Security
Lattice-based cryptographic schemes such as Crystals-Kyber and Dilithium are post-quantum algorithms selected to be standardized by NIST as they are considered to be secure against quantum computing attacks.
Tolun Tosun, E. Savaş
semanticscholar   +1 more source

Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT

IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
NewHope-NIST is a promising ring learning with errors (RLWE)-based postquantum cryptography (PQC) for key encapsulation mechanisms. The performance on the field-programmable gate array (FPGA) affects the applicability of NewHope-NIST.
Neng Zhang   +5 more
semanticscholar   +1 more source

Managing Vulnerabilities in Software Projects: the Case of NTT Data

EUROMICRO Conference on Software Engineering and Advanced Applications, 2023
Background: Software vulnerabilities are flaws in application source code that can be exploited to cause harm, hence companies must devise strategies to manage them.Aim: We want to understand how software vulnerabilities are managed in a big IT ...
Sabato Nocera   +4 more
semanticscholar   +1 more source

Design of an Efficient NTT/INTT Architecture With Low-Complex Memory Mapping Scheme

IEEE Transactions on Circuits and Systems - II - Express Briefs
Number Theoretic Transform (NTT) and Inverse NTT (INTT) are the key algorithms used to speed up polynomial multiplications in post-quantum cryptography (PQC).
Yanrui Zhao   +3 more
semanticscholar   +1 more source

A Comparative Analysis between Karatsuba, Toom-Cook and NTT Multiplier for Polynomial Multiplication in NTRU on FPGA

Asian Hardware-Oriented Security and Trust Symposium, 2023
Post-quantum cryptography (PQC) is a rapidly growing field that aims to develop cryptographic algorithms that can resist attacks by quantum computers. Large-degree polynomial multiplication is an essential mathematical operation for lattice-based post ...
Harish Prasad Allam   +2 more
semanticscholar   +1 more source

Winograd for NTT: A Case Study on Higher-Radix and Low-Latency Implementation of NTT for Post Quantum Cryptography on FPGA

IEEE Transactions on Circuits and Systems Part 1: Regular Papers
Number Theoretic Transform (NTT) plays an important role in efficiently implementing lattice-based cryptographic algorithms like CRYSTALS-Kyber, Dilithium, and FALCON.
Suraj Mandal, Debapriya Basu Roy
semanticscholar   +1 more source

3D-NTT: a versatile integral field spectro-imager for the NTT

SPIE Proceedings, 2008
The 3D-NTT is a visible integral field spectro-imager offering two modes. A low resolution mode (R ~ 300 to 6 000) with a large field of view Tunable Filter (17'x17') and a high resolution mode (R ~ 10 000 to 40 000) with a scanning Fabry-Perot (7'x7'). It will be operated as a visitor instrument on the NTT from 2009.
Marcelin, M.   +13 more
openaire   +1 more source

HMNTT: A Highly Efficient MDC-NTT Architecture for Privacy-preserving Applications

ACM Great Lakes Symposium on VLSI
In privacy-preserving applications like Post-Quantum Cryptography (PQC) and Fully Homomorphic Encryption (FHE), polynomial multiplication is common, and the Number Theoretic Transform (NTT) is a key algorithm for reducing its complexity.
Changxu Liu   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy