Post-Quantum Security: Opportunities and Challenges. [PDF]
Li S +7 more
europepmc +1 more source
YATA: Yet Another TFHE Accelerator with Key Compression and Radix-8 NTT
This paper introduces a silicon-proven ASIC accelerator, YATA, specifically designed for TFHE’s most demanding operation, the BlindRotate. The architecture tackles the main bottleneck in TFHE—massive memory bandwidth—by applying Key Compression to ...
Kotaro Matsuoka, Takashi Sato
doaj +1 more source
Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim +2 more
doaj +1 more source
A Level-Aware Multi-Key Relinearization Method for MKHE
Multi-Key Homomorphic Encryption (MKHE) has been applied across diverse scenarios, including convolutional neural networks, federated learning, finance and healthcare, yet its efficiency remains less than satisfactory.
Lanfang Gao +3 more
doaj +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Number Theoretic Transform (NTT) enables speeding up polynomial multiplications, thereby accelerating the implementation of lattice-based post-quantum cryptography (PQC) algorithms.
Duc-Thuan Dam +5 more
doaj +1 more source
Lightweight FPGA-Based Number-Theoretic Transform for ML-KEM in Post-Quantum Cryptography
This study introduces a lightweight, energy-efficient Number Theoretic Transform (NTT) implementation tailored for the ML-KEM scheme in post-quantum cryptography.
Mohammed O. Alshomrany +6 more
doaj +1 more source
A Reconfigurable Butterfly Architecture for Fourier and Fermat Transforms
International audienceReconfiguration is an essential part of Soft- Ware Radio (SWR) technology. Thanks to this technique, systems are designed for change in operating mode with the aim to carry out several types of computations. In this SWR context, the
Al Ghouwayel, Ali +2 more
core +1 more source
A Novel Secure Authentication Protocol for e-Health Records in Cloud with a New Key Generation Method and Minimized Key Exchange. [PDF]
Mohinder Singh B, Natarajan J.
europepmc +1 more source
Secure secondary utilization system of genomic data using quantum secure cloud. [PDF]
Fujiwara M +7 more
europepmc +1 more source

