Results 191 to 200 of about 13,252 (232)
Some of the next articles are maybe not open access.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023
Lattice-based cryptography (LBC) schemes are promising candidates in the post-quantum cryptography (PQC) standardization process. Number theoretic transform (NTT), as a crucial technique, is widely used to accelerate LBC implementations on computer ...
Zhaohui Chen, Yuan Ma, Jiwu Jing
semanticscholar +1 more source
Lattice-based cryptography (LBC) schemes are promising candidates in the post-quantum cryptography (PQC) standardization process. Number theoretic transform (NTT), as a crucial technique, is widely used to accelerate LBC implementations on computer ...
Zhaohui Chen, Yuan Ma, Jiwu Jing
semanticscholar +1 more source
An FPGA-Based Efficient NTT Accelerator for Post-Quantum Cryptography CRYSTALS-Kyber
Information and Communication Technologies and Accessibility, 2023CRYSTALS-Kyber has emerged as a significant lattice-based post-quantum cryptography (PQC) scheme. As one of the four finalists at round three in NIST's PQC standardization, CRYSTALS-Kyber uses number theoretic transform (NTT) to optimize polynomial ...
Junyan Sun, Xuefei Bai, Yi Kang
semanticscholar +1 more source
High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography
IEEE Symposium on Computer Arithmetic, 2021This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST post-quantum cryptography standardization process. Simultaneously,
Mojtaba Bisheh-Niasar +2 more
semanticscholar +1 more source
Design and Implementation of a NTT Accelerator Based on RISC-V for PQC Kyber
International Conference on Anti-counterfeiting, Security, and IdentificationRISC-V, as a new generation open-source Reduced Instruction Set Computing (RISC) architecture, has the advantages of low power consumption, small footprint, and high performance.
Nuo Wang +4 more
semanticscholar +1 more source
Post-Quantum Cryptography Coprocessor for RISC-V CPU Core
International Conference on Electronics, Information and Communications, 2022The importance of PQC (Post-Quantum Cryptography) is highly emphasized according to the advancement of quantum computing technology and emergence of Shor's algorithm.
Jihye Lee +3 more
semanticscholar +1 more source
Configurable Energy-Efficient Lattice-Based Post-Quantum Cryptography Processor for IoT Devices
European Solid-State Circuits Conference, 2022This work presents a configurable lattice-based post-quantum cryptography processor suitable for lightweight edge devices. To reduce hardware cost and energy consumption, it employs a look-up-table-based modular multiplication for the number-theoretic ...
Byungjun Kim +4 more
semanticscholar +1 more source
NEW APPROACHES TO EAVESDROPPER INFORMATION BOUNDS IN QUANTUM CRYPTOGRAPHY PROBLEMS
Voprosy kiberbezopasnostiPurpose of work is to review new aspects for the task of information extraction from ensembles of quantum states, dictated by practical tasks of quantum cryptography.
D. A. Kronberg, A.S. Holevo
semanticscholar +1 more source
POST-QUANTUM CRYPTOGRAPHY FOR DATA PROTECTION IN INDUSTRIAL CONTROLLERS
EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYAIn the context of the development of quantum computing, traditional cryptographic algorithms used to protect data in industrial controllers are losing their stability.
Aleksey A. Naumov +2 more
semanticscholar +1 more source
IEEE Transactions on Circuits and Systems Part 1: Regular Papers
Number Theoretic Transform (NTT) plays an important role in efficiently implementing lattice-based cryptographic algorithms like CRYSTALS-Kyber, Dilithium, and FALCON.
Suraj Mandal, Debapriya Basu Roy
semanticscholar +1 more source
Number Theoretic Transform (NTT) plays an important role in efficiently implementing lattice-based cryptographic algorithms like CRYSTALS-Kyber, Dilithium, and FALCON.
Suraj Mandal, Debapriya Basu Roy
semanticscholar +1 more source
Cryptogr.
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC).
Maryam Abbasi +4 more
semanticscholar +1 more source
The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC).
Maryam Abbasi +4 more
semanticscholar +1 more source

