YATA: Yet Another TFHE Accelerator with Key Compression and Radix-8 NTT
This paper introduces a silicon-proven ASIC accelerator, YATA, specifically designed for TFHE’s most demanding operation, the BlindRotate. The architecture tackles the main bottleneck in TFHE—massive memory bandwidth—by applying Key Compression to ...
Kotaro Matsuoka, Takashi Sato
doaj +1 more source
Post-Quantum Security: Opportunities and Challenges. [PDF]
Li S +7 more
europepmc +1 more source
Vectorized Implementation of Kyber and Dilithium on 32-bit Cortex-A Series
In the field of Post-Quantum Cryptography (PQC), which typically demands more memory and relatively lower performance compared to Elliptic-Curve Cryptography (ECC), recent studies have been actively focused on neon-based parallel implementations for the ...
Youngbeom Kim +2 more
doaj +1 more source
Number Theoretic Transform (NTT) enables speeding up polynomial multiplications, thereby accelerating the implementation of lattice-based post-quantum cryptography (PQC) algorithms.
Duc-Thuan Dam +5 more
doaj +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
A Novel Secure Authentication Protocol for e-Health Records in Cloud with a New Key Generation Method and Minimized Key Exchange. [PDF]
Mohinder Singh B, Natarajan J.
europepmc +1 more source
A Generalized Number-Theoretic Transform for Efficient Multiplication in Lattice Cryptography
The Number Theoretic Transform (NTT) has emerged as a powerful tool for efficiently computing convolutions of digital signals, due to its inherent advantages such as numerical stability, reliance on simple integer operations, and proven efficiency.
A. Al Badawi +2 more
semanticscholar +1 more source
UEG Week 2025 Moderated Posters
United European Gastroenterology Journal, Volume 13, Issue S8, Page S189-S802, October 2025.
wiley +1 more source
Heterogeneous Reconfigurable Accelerator for Homomorphic Evaluation on Encrypted Data
Homomorphic encryption (HE) enables third-party servers to perform computations on encrypted user data while preserving privacy. Although conceptually attractive, the speed of software implementations of HE is almost impractical.
Wenqing Song +7 more
doaj +1 more source
Secure secondary utilization system of genomic data using quantum secure cloud. [PDF]
Fujiwara M +7 more
europepmc +1 more source

