Results 101 to 110 of about 2,451 (171)

Post-Quantum Security: Opportunities and Challenges. [PDF]

open access: yesSensors (Basel), 2023
Li S   +7 more
europepmc   +1 more source

YATA: Yet Another TFHE Accelerator with Key Compression and Radix-8 NTT

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper introduces a silicon-proven ASIC accelerator, YATA, specifically designed for TFHE’s most demanding operation, the BlindRotate. The architecture tackles the main bottleneck in TFHE—massive memory bandwidth—by applying Key Compression to ...
Kotaro Matsuoka, Takashi Sato
doaj   +1 more source

Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series

open access: yesIEEE Access
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim   +2 more
doaj   +1 more source

A Level-Aware Multi-Key Relinearization Method for MKHE

open access: yesIEEE Access
Multi-Key Homomorphic Encryption (MKHE) has been applied across diverse scenarios, including convolutional neural networks, federated learning, finance and healthcare, yet its efficiency remains less than satisfactory.
Lanfang Gao   +3 more
doaj   +1 more source

High-Efficiency Multi-Standard Polynomial Multiplication Accelerator on RISC-V SoC for Post-Quantum Cryptography

open access: yesIEEE Access
Number Theoretic Transform (NTT) enables speeding up polynomial multiplications, thereby accelerating the implementation of lattice-based post-quantum cryptography (PQC) algorithms.
Duc-Thuan Dam   +5 more
doaj   +1 more source

Lightweight FPGA-Based Number-Theoretic Transform for ML-KEM in Post-Quantum Cryptography

open access: yesIEEE Access
This study introduces a lightweight, energy-efficient Number Theoretic Transform (NTT) implementation tailored for the ML-KEM scheme in post-quantum cryptography.
Mohammed O. Alshomrany   +6 more
doaj   +1 more source

A Reconfigurable Butterfly Architecture for Fourier and Fermat Transforms

open access: yes, 2006
International audienceReconfiguration is an essential part of Soft- Ware Radio (SWR) technology. Thanks to this technique, systems are designed for change in operating mode with the aim to carry out several types of computations. In this SWR context, the
Al Ghouwayel, Ali   +2 more
core   +1 more source

Secure secondary utilization system of genomic data using quantum secure cloud. [PDF]

open access: yesSci Rep, 2022
Fujiwara M   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy