Results 91 to 100 of about 2,451 (171)

Accelerating NTT with RISC-V Vector Extension for Fully Homomorphic Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fully Homomorphic Encryption (FHE) has gained increasing importance mainly due to its potential use in privacy-preserving cloud computing. This privacy stems from the computation being directly performed on data that is encrypted by the client. However,
Tiago B. Rodrigues   +4 more
doaj   +1 more source

Configurable radix-4 NTT hardware optimization and implementation for lattice-based cryptography

open access: yesTongxin xuebao
In response to the complex polynomial multiplication issue in lattice-based cryptography algorithms optimized with number theoretic transform (NTT), as well as the demand for NTT designs catering to multiple application scenarios, a configurable radix-4 ...
ZHOU Qinglei   +3 more
doaj  

NTTRU: Truly Fast NTRU Using NTT

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
We present NTTRU – an IND-CCA2 secure NTRU-based key encapsulation scheme that uses the number theoretic transform (NTT) over the cyclotomic ring Z7681[X]/(X768−X384+1) and produces public keys and ciphertexts of approximately 1.25 KB at the 128-bit ...
Vadim Lyubashevsky, Gregor Seiler
doaj   +1 more source

Fast Mojette Transform for Discrete Tomography

open access: yes, 2010
A new algorithm for reconstructing a two dimensional object from a set of one dimensional projected views is presented that is both computationally exact and experimentally practical. The algorithm has a computational complexity of O(n log2 n) with n = N^
Chandra, Shekhar S.   +4 more
core  

ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service [PDF]

open access: yes, 2017
In recent years, ride-hailing services (RHSs) have be- come increasingly popular, serving millions of users per day. Such systems, however, raise significant privacy concerns, because service providers are able to track the precise mobility patterns of ...
Dacosta, I.   +5 more
core   +1 more source

High-Performance Number Theoretic Transform on GPU Through radix2-CT and 4-Step Algorithms

open access: yesIEEE Access
The number theoretic transform (NTT) provides a practical and efficient technique to perform multiplication of very large degree polynomials typically found in fully homomorphic encryption (FHE), lattice-based cryptography, and non-interactive succinct ...
Alisah Ozcan   +2 more
doaj   +1 more source

Faster amortized bootstrapping using the incomplete NTT for free

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Amortized bootstrapping techniques have been proposed for FHEW/TFHE to efficiently refresh multiple ciphertexts simultaneously within a polynomial modulus.
Thales B. Paiva   +4 more
doaj   +1 more source

High-Speed NTT Accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium

open access: yesIEEE Access
The efficiency of polynomial multiplication execution majorly impacts the performance of lattice-based post-quantum cryptosystems. In this research, we propose a high-speed hardware architecture to accelerate polynomial multiplication based on the Number
Trong-Hung Nguyen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy