Results 71 to 80 of about 9,817 (168)

YATA: Yet Another TFHE Accelerator with Key Compression and Radix-8 NTT

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper introduces a silicon-proven ASIC accelerator, YATA, specifically designed for TFHE’s most demanding operation, the BlindRotate. The architecture tackles the main bottleneck in TFHE—massive memory bandwidth—by applying Key Compression to ...
Kotaro Matsuoka, Takashi Sato
doaj   +1 more source

Post-Quantum Security: Opportunities and Challenges. [PDF]

open access: yesSensors (Basel), 2023
Li S   +7 more
europepmc   +1 more source

Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series

open access: yesIEEE Access
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim   +2 more
doaj   +1 more source

High-Efficiency Multi-Standard Polynomial Multiplication Accelerator on RISC-V SoC for Post-Quantum Cryptography

open access: yesIEEE Access
Number Theoretic Transform (NTT) enables speeding up polynomial multiplications, thereby accelerating the implementation of lattice-based post-quantum cryptography (PQC) algorithms.
Duc-Thuan Dam   +5 more
doaj   +1 more source

A Generalized Number-Theoretic Transform for Efficient Multiplication in Lattice Cryptography

open access: yesContemporary Mathematics
The Number Theoretic Transform (NTT) has emerged as a powerful tool for efficiently computing convolutions of digital signals, due to its inherent advantages such as numerical stability, reliance on simple integer operations, and proven efficiency.
A. Al Badawi   +2 more
semanticscholar   +1 more source

UEG Week 2025 Moderated Posters

open access: yes
United European Gastroenterology Journal, Volume 13, Issue S8, Page S189-S802, October 2025.
wiley   +1 more source

Heterogeneous Reconfigurable Accelerator for Homomorphic Evaluation on Encrypted Data

open access: yesIEEE Access
Homomorphic encryption (HE) enables third-party servers to perform computations on encrypted user data while preserving privacy. Although conceptually attractive, the speed of software implementations of HE is almost impractical.
Wenqing Song   +7 more
doaj   +1 more source

Secure secondary utilization system of genomic data using quantum secure cloud. [PDF]

open access: yesSci Rep, 2022
Fujiwara M   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy