Results 1 to 10 of about 120,753 (284)

Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor [PDF]

open access: yesSensors, 2020
In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized modular multiplication with secure countermeasure (i.e., constant timing), which ensures high ...
Hwajeong Seo   +6 more
doaj   +2 more sources

Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform [PDF]

open access: yesSensors, 2020
We implement elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes. We use the number theoretic transform to perform finite field multiplication and squaring as required in elliptic curve ...
Utku Gulen, Selcuk Baktir
doaj   +2 more sources

Pipelined and conflict-free number theoretic transform accelerator for CRYSTALS-Kyber on FPGA [PDF]

open access: yesPLoS ONE
Post-quantum cryptographic (PQC) algorithms are essential due to the threat posed by quantum computers to the security of currently deployed cryptosystems.
Ayesha Waris   +2 more
doaj   +3 more sources

Area-time efficient pipelined number theoretic transform for CRYSTALS-Kyber. [PDF]

open access: yesPLoS ONE
CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. The bottleneck in performance of Kyber is the polynomial multiplication
Ayesha Waris   +2 more
doaj   +2 more sources

RM-NTT: An RRAM-Based Compute-in-Memory Number Theoretic Transform Accelerator

open access: yesIEEE Journal on Exploratory Solid-State Computational Devices and Circuits, 2022
As more cloud computing resources are used for machine learning training and inference processes, privacy-preserving techniques that protect data from revealing at the cloud platforms attract increasing interest. Homomorphic encryption (HE) is one of the
Yongmo Park   +3 more
doaj   +1 more source

Configurable Mixed-Radix Number Theoretic Transform Architecture for Lattice-Based Cryptography

open access: yesIEEE Access, 2022
Lattice-based cryptography continues to dominate in the second-round finalists of the National Institute of Standards and Technology post-quantum cryptography standardization process. Computational efficiency is primarily considered to evaluate promising
Phap Duong-Ngoc, Hanho Lee
doaj   +1 more source

High-Precision Leveled Homomorphic Encryption for Rational Numbers

open access: yesMathematics, 2023
In most homomorphic encryption schemes based on RLWE, native plaintexts are represented as polynomials in a ring Zt[x]/xN+1, where t is a plaintext modulus and xN+1 is a cyclotomic polynomial with a degree power of two.
Long Nie, Shaowen Yao, Jing Liu
doaj   +1 more source

Number-theoretic transforms of prescribed length [PDF]

open access: yesMathematics of Computation, 1986
A new constructive method for finding all convenient moduli m for a number-theoretic transform with given length N and given primitive Nth root of unity modulo m is presented. This method is based on the prime factorization of cyclotomic polynomials with integer-valued argument or on the primitive divisors of integers.
Creutzburg, R., Tasche, M.
openaire   +3 more sources

Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this work, we present the first fault injection analysis of the Number Theoretic Transform (NTT). The NTT is an integral computation unit, widely used for polynomial multiplication in several structured lattice-based key encapsulation mechanisms ...
Prasanna Ravi   +4 more
doaj   +1 more source

Conceptual Review on Number Theoretic Transform and Comprehensive Review on Its Implementations

open access: yesIEEE Access, 2023
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic Encryption (HE).
Ardianto Satriawan   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy