Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor [PDF]
In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized modular multiplication with secure countermeasure (i.e., constant timing), which ensures high ...
Hwajeong Seo +6 more
doaj +2 more sources
Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform [PDF]
We implement elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes. We use the number theoretic transform to perform finite field multiplication and squaring as required in elliptic curve ...
Utku Gulen, Selcuk Baktir
doaj +2 more sources
Pipelined and conflict-free number theoretic transform accelerator for CRYSTALS-Kyber on FPGA [PDF]
Post-quantum cryptographic (PQC) algorithms are essential due to the threat posed by quantum computers to the security of currently deployed cryptosystems.
Ayesha Waris +2 more
doaj +3 more sources
Area-time efficient pipelined number theoretic transform for CRYSTALS-Kyber. [PDF]
CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. The bottleneck in performance of Kyber is the polynomial multiplication
Ayesha Waris +2 more
doaj +2 more sources
RM-NTT: An RRAM-Based Compute-in-Memory Number Theoretic Transform Accelerator
As more cloud computing resources are used for machine learning training and inference processes, privacy-preserving techniques that protect data from revealing at the cloud platforms attract increasing interest. Homomorphic encryption (HE) is one of the
Yongmo Park +3 more
doaj +1 more source
Configurable Mixed-Radix Number Theoretic Transform Architecture for Lattice-Based Cryptography
Lattice-based cryptography continues to dominate in the second-round finalists of the National Institute of Standards and Technology post-quantum cryptography standardization process. Computational efficiency is primarily considered to evaluate promising
Phap Duong-Ngoc, Hanho Lee
doaj +1 more source
High-Precision Leveled Homomorphic Encryption for Rational Numbers
In most homomorphic encryption schemes based on RLWE, native plaintexts are represented as polynomials in a ring Zt[x]/xN+1, where t is a plaintext modulus and xN+1 is a cyclotomic polynomial with a degree power of two.
Long Nie, Shaowen Yao, Jing Liu
doaj +1 more source
Number-theoretic transforms of prescribed length [PDF]
A new constructive method for finding all convenient moduli m for a number-theoretic transform with given length N and given primitive Nth root of unity modulo m is presented. This method is based on the prime factorization of cyclotomic polynomials with integer-valued argument or on the primitive divisors of integers.
Creutzburg, R., Tasche, M.
openaire +3 more sources
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform
In this work, we present the first fault injection analysis of the Number Theoretic Transform (NTT). The NTT is an integral computation unit, widely used for polynomial multiplication in several structured lattice-based key encapsulation mechanisms ...
Prasanna Ravi +4 more
doaj +1 more source
Conceptual Review on Number Theoretic Transform and Comprehensive Review on Its Implementations
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic Encryption (HE).
Ardianto Satriawan +5 more
doaj +1 more source

