Results 191 to 200 of about 13,252 (232)
Some of the next articles are maybe not open access.

Low-Cost Shuffling Countermeasures Against Side-Channel Attacks for NTT-Based Post-Quantum Cryptography

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
Lattice-based cryptography (LBC) schemes are promising candidates in the post-quantum cryptography (PQC) standardization process. Number theoretic transform (NTT), as a crucial technique, is widely used to accelerate LBC implementations on computer ...
Zhaohui Chen, Yuan Ma, Jiwu Jing
semanticscholar   +1 more source

An FPGA-Based Efficient NTT Accelerator for Post-Quantum Cryptography CRYSTALS-Kyber

Information and Communication Technologies and Accessibility, 2023
CRYSTALS-Kyber has emerged as a significant lattice-based post-quantum cryptography (PQC) scheme. As one of the four finalists at round three in NIST's PQC standardization, CRYSTALS-Kyber uses number theoretic transform (NTT) to optimize polynomial ...
Junyan Sun, Xuefei Bai, Yi Kang
semanticscholar   +1 more source

High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography

IEEE Symposium on Computer Arithmetic, 2021
This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST post-quantum cryptography standardization process. Simultaneously,
Mojtaba Bisheh-Niasar   +2 more
semanticscholar   +1 more source

Design and Implementation of a NTT Accelerator Based on RISC-V for PQC Kyber

International Conference on Anti-counterfeiting, Security, and Identification
RISC-V, as a new generation open-source Reduced Instruction Set Computing (RISC) architecture, has the advantages of low power consumption, small footprint, and high performance.
Nuo Wang   +4 more
semanticscholar   +1 more source

Post-Quantum Cryptography Coprocessor for RISC-V CPU Core

International Conference on Electronics, Information and Communications, 2022
The importance of PQC (Post-Quantum Cryptography) is highly emphasized according to the advancement of quantum computing technology and emergence of Shor's algorithm.
Jihye Lee   +3 more
semanticscholar   +1 more source

Configurable Energy-Efficient Lattice-Based Post-Quantum Cryptography Processor for IoT Devices

European Solid-State Circuits Conference, 2022
This work presents a configurable lattice-based post-quantum cryptography processor suitable for lightweight edge devices. To reduce hardware cost and energy consumption, it employs a look-up-table-based modular multiplication for the number-theoretic ...
Byungjun Kim   +4 more
semanticscholar   +1 more source

NEW APPROACHES TO EAVESDROPPER INFORMATION BOUNDS IN QUANTUM CRYPTOGRAPHY PROBLEMS

Voprosy kiberbezopasnosti
Purpose of work is to review new aspects for the task of information extraction from ensembles of quantum states, dictated by practical tasks of quantum cryptography.
D. A. Kronberg, A.S. Holevo
semanticscholar   +1 more source

POST-QUANTUM CRYPTOGRAPHY FOR DATA PROTECTION IN INDUSTRIAL CONTROLLERS

EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA
In the context of the development of quantum computing, traditional cryptographic algorithms used to protect data in industrial controllers are losing their stability.
Aleksey A. Naumov   +2 more
semanticscholar   +1 more source

Winograd for NTT: A Case Study on Higher-Radix and Low-Latency Implementation of NTT for Post Quantum Cryptography on FPGA

IEEE Transactions on Circuits and Systems Part 1: Regular Papers
Number Theoretic Transform (NTT) plays an important role in efficiently implementing lattice-based cryptographic algorithms like CRYSTALS-Kyber, Dilithium, and FALCON.
Suraj Mandal, Debapriya Basu Roy
semanticscholar   +1 more source

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

Cryptogr.
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC).
Maryam Abbasi   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy