Results 51 to 60 of about 120,587 (184)

Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling

open access: yesIEEE Access, 2021
In this paper, we propose single-trace side-channel attacks against $\mathsf {CRYSTALS{-}DILITHIUM}$ . $\mathsf {CRYSTALS{-}DILITHIUM}$ is a lattice-based digital signature algorithm, one of the third round finalists of the national institute of ...
Jaeseung Han   +7 more
doaj   +1 more source

FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This work showcases Quatorze-bis, a state-of-the-art Number Theoretic Transform circuit for TFHE-like cryptosystems on FPGAs. It contains a novel modular multiplication design for modular multiplication with a constant for a constant modulus.
Jonas Bertels   +2 more
doaj   +1 more source

Heterogeneous Reconfigurable Accelerator for Homomorphic Evaluation on Encrypted Data

open access: yesIEEE Access
Homomorphic encryption (HE) enables third-party servers to perform computations on encrypted user data while preserving privacy. Although conceptually attractive, the speed of software implementations of HE is almost impractical.
Wenqing Song   +7 more
doaj   +1 more source

Area-Efficient Polynomial Multiplication Hardware Implementation for Lattice-based Cryptography [PDF]

open access: yesJisuanji gongcheng
Lattice-based post-quantum cryptography algorithms demonstrate significant potential in public-key cryptography. A key performance bottleneck in hardware implementation is the computational complexity of polynomial multiplication. To address the problems
XIE Jiaxing, PU Jinwei, FANG Weitian, ZHENG Xin, XIONG Xiaoming
doaj   +1 more source

Multiscale Granger causality analysis by \`a trous wavelet transform

open access: yes, 2017
Since interactions in neural systems occur across multiple temporal scales, it is likely that information flow will exhibit a multiscale structure, thus requiring a multiscale generalization of classical temporal precedence causality analysis like ...
Bassez, Iege   +3 more
core   +1 more source

A Flexible and Parallel Hardware Accelerator for Forward and Inverse Number Theoretic Transform

open access: yesIEEE Access
This paper demonstrates an efficient and flexible hardware accelerator for polynomial multiplication using number theoretic transform (NTT). The proposed architecture considers flexibility and performance requirements at the same time.
Muhammad Rashid   +3 more
doaj   +1 more source

Efficient Hardware Implementation of Pipelined NTT for Dynamic Rotation Factor Generation [PDF]

open access: yesJisuanji kexue
In the field of fully homomorphic encryption,the high computational complexity of polynomial multiplication has always been a bottleneck for performance improvement.To accelerate this process,the Number Theoretic Transform(NTT) has been widely used,but ...
HAN Yingmei, LI Bin, LI Kun, ZHOU Qinglei, YU Shiliang
doaj   +1 more source

Littelmann paths and brownian paths

open access: yes, 2005
We study some path transformations related to Littelmann path model and their applications to representation theory and Brownian motion in a Weyl chamber.Comment: 30 pages, 1 ...
Biane, Philippe   +2 more
core   +2 more sources

Lightweight FPGA-Based Number-Theoretic Transform for ML-KEM in Post-Quantum Cryptography

open access: yesIEEE Access
This study introduces a lightweight, energy-efficient Number Theoretic Transform (NTT) implementation tailored for the ML-KEM scheme in post-quantum cryptography.
Mohammed O. Alshomrany   +6 more
doaj   +1 more source

Graph isomorphism and genotypical houses [PDF]

open access: yes, 2005
This paper will introduce a new method, known as small graph matching, anddemonstrate how it may be used to determine the genotype signature of a sample ofbuildings.
Dalton, Ruth, Kirsan, Ciler
core  

Home - About - Disclaimer - Privacy