Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling
In this paper, we propose single-trace side-channel attacks against $\mathsf {CRYSTALS{-}DILITHIUM}$ . $\mathsf {CRYSTALS{-}DILITHIUM}$ is a lattice-based digital signature algorithm, one of the third round finalists of the national institute of ...
Jaeseung Han +7 more
doaj +1 more source
FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs
This work showcases Quatorze-bis, a state-of-the-art Number Theoretic Transform circuit for TFHE-like cryptosystems on FPGAs. It contains a novel modular multiplication design for modular multiplication with a constant for a constant modulus.
Jonas Bertels +2 more
doaj +1 more source
Heterogeneous Reconfigurable Accelerator for Homomorphic Evaluation on Encrypted Data
Homomorphic encryption (HE) enables third-party servers to perform computations on encrypted user data while preserving privacy. Although conceptually attractive, the speed of software implementations of HE is almost impractical.
Wenqing Song +7 more
doaj +1 more source
Area-Efficient Polynomial Multiplication Hardware Implementation for Lattice-based Cryptography [PDF]
Lattice-based post-quantum cryptography algorithms demonstrate significant potential in public-key cryptography. A key performance bottleneck in hardware implementation is the computational complexity of polynomial multiplication. To address the problems
XIE Jiaxing, PU Jinwei, FANG Weitian, ZHENG Xin, XIONG Xiaoming
doaj +1 more source
Multiscale Granger causality analysis by \`a trous wavelet transform
Since interactions in neural systems occur across multiple temporal scales, it is likely that information flow will exhibit a multiscale structure, thus requiring a multiscale generalization of classical temporal precedence causality analysis like ...
Bassez, Iege +3 more
core +1 more source
A Flexible and Parallel Hardware Accelerator for Forward and Inverse Number Theoretic Transform
This paper demonstrates an efficient and flexible hardware accelerator for polynomial multiplication using number theoretic transform (NTT). The proposed architecture considers flexibility and performance requirements at the same time.
Muhammad Rashid +3 more
doaj +1 more source
Efficient Hardware Implementation of Pipelined NTT for Dynamic Rotation Factor Generation [PDF]
In the field of fully homomorphic encryption,the high computational complexity of polynomial multiplication has always been a bottleneck for performance improvement.To accelerate this process,the Number Theoretic Transform(NTT) has been widely used,but ...
HAN Yingmei, LI Bin, LI Kun, ZHOU Qinglei, YU Shiliang
doaj +1 more source
Littelmann paths and brownian paths
We study some path transformations related to Littelmann path model and their applications to representation theory and Brownian motion in a Weyl chamber.Comment: 30 pages, 1 ...
Biane, Philippe +2 more
core +2 more sources
Lightweight FPGA-Based Number-Theoretic Transform for ML-KEM in Post-Quantum Cryptography
This study introduces a lightweight, energy-efficient Number Theoretic Transform (NTT) implementation tailored for the ML-KEM scheme in post-quantum cryptography.
Mohammed O. Alshomrany +6 more
doaj +1 more source
Graph isomorphism and genotypical houses [PDF]
This paper will introduce a new method, known as small graph matching, anddemonstrate how it may be used to determine the genotype signature of a sample ofbuildings.
Dalton, Ruth, Kirsan, Ciler
core

