Results 91 to 100 of about 2,451 (171)
Accelerating NTT with RISC-V Vector Extension for Fully Homomorphic Encryption
Fully Homomorphic Encryption (FHE) has gained increasing importance mainly due to its potential use in privacy-preserving cloud computing. This privacy stems from the computation being directly performed on data that is encrypted by the client. However,
Tiago B. Rodrigues +4 more
doaj +1 more source
Configurable radix-4 NTT hardware optimization and implementation for lattice-based cryptography
In response to the complex polynomial multiplication issue in lattice-based cryptography algorithms optimized with number theoretic transform (NTT), as well as the demand for NTT designs catering to multiple application scenarios, a configurable radix-4 ...
ZHOU Qinglei +3 more
doaj
NTTRU: Truly Fast NTRU Using NTT
We present NTTRU – an IND-CCA2 secure NTRU-based key encapsulation scheme that uses the number theoretic transform (NTT) over the cyclotomic ring Z7681[X]/(X768−X384+1) and produces public keys and ciphertexts of approximately 1.25 KB at the 128-bit ...
Vadim Lyubashevsky, Gregor Seiler
doaj +1 more source
Fast Mojette Transform for Discrete Tomography
A new algorithm for reconstructing a two dimensional object from a set of one dimensional projected views is presented that is both computationally exact and experimentally practical. The algorithm has a computational complexity of O(n log2 n) with n = N^
Chandra, Shekhar S. +4 more
core
ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service [PDF]
In recent years, ride-hailing services (RHSs) have be- come increasingly popular, serving millions of users per day. Such systems, however, raise significant privacy concerns, because service providers are able to track the precise mobility patterns of ...
Dacosta, I. +5 more
core +1 more source
High-Performance Number Theoretic Transform on GPU Through radix2-CT and 4-Step Algorithms
The number theoretic transform (NTT) provides a practical and efficient technique to perform multiplication of very large degree polynomials typically found in fully homomorphic encryption (FHE), lattice-based cryptography, and non-interactive succinct ...
Alisah Ozcan +2 more
doaj +1 more source
Pipelined Key Switching Accelerator Architecture for CKKS-Based Fully Homomorphic Encryption. [PDF]
Duong PN, Lee H.
europepmc +1 more source
Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption. [PDF]
Lee J, Duong PN, Lee H.
europepmc +1 more source
Faster amortized bootstrapping using the incomplete NTT for free
Amortized bootstrapping techniques have been proposed for FHEW/TFHE to efficiently refresh multiple ciphertexts simultaneously within a polynomial modulus.
Thales B. Paiva +4 more
doaj +1 more source
High-Speed NTT Accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium
The efficiency of polynomial multiplication execution majorly impacts the performance of lattice-based post-quantum cryptosystems. In this research, we propose a high-speed hardware architecture to accelerate polynomial multiplication based on the Number
Trong-Hung Nguyen +3 more
doaj +1 more source

