[HTML][HTML] A literature review of fault diagnosis based on ensemble learning

Z Mian, X Deng, X Dong, Y Tian, T Cao, K Chen… - … Applications of Artificial …, 2024 - Elsevier
The accuracy of fault diagnosis is an important indicator to ensure the reliability of key
equipment systems. Ensemble learning integrates different weak learning methods to obtain …

Conceptual review on number theoretic transform and comprehensive review on its implementations

A Satriawan, I Syafalni, R Mareta, I Anshori… - IEEE …, 2023 - ieeexplore.ieee.org
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become
increasingly important in develo** Post Quantum Cryptography (PQC) and Homomorphic …

High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber

VB Dang, K Mohajerani, K Gaj - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …

KaLi: A crystal for post-quantum security using Kyber and Dilithium

A Aikata, AC Mert, M Imran… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Quantum computers pose a threat to the security of communications over the internet. This
imminent risk has led to the standardization of cryptographic schemes for protection in a post …

A high-performance domain-specific processor with matrix extension of RISC-V for module-LWE applications

Y Zhao, R **e, G **n, J Han - IEEE Transactions on Circuits and …, 2022 - ieeexplore.ieee.org
The 5G edge computing infrastructure should be empowered with quantum attack resistance
by implementing post-quantum cryptography (PQC). Among various PQC schemes, lattice …

A highly unified reconfigurable multicore architecture to speed up NTT/INTT for homomorphic polynomial multiplication

Y Su, BL Yang, C Yang, ZP Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The ring learning with error (RLWE)-based fully homomorphic encryption (FHE) scheme has
become one of the most promising FHE schemes. However, its performance is limited by the …

Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution

FR Ghashghaei, Y Ahmed, N Elmrabit, M Yousefi - Computers, 2024 - mdpi.com
This research aims to establish a secure system for key exchange by using post-quantum
cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD) …

Efficient hardware arithmetic for inverted binary ring-lwe based post-quantum cryptography

JL Imana, P He, T Bao, Y Tu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Ring learning-with-errors (RLWE)-based encryption scheme is a lattice-based cryptographic
algorithm that constitutes one of the most promising candidates for Post-Quantum …

Space and time-efficient quantum multiplier in post quantum cryptography era

DSC Putranto, RW Wardhani, HT Larasati… - IEEE Access, 2023 - ieeexplore.ieee.org
This paper examines the asymptotic performance of multiplication and the cost of quantum
implementation for the Naive schoolbook, Karatsuba, and Toom-Cook methods in the …

HPKA: A high-performance CRYSTALS-Kyber accelerator exploring efficient pipelining

Z Ni, A Khalid, M O'Neill, W Liu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
CRYSTALS-Kyber (Kyber) was recently chosen as the first quantum resistant Key
Encapsulation Mechanism (KEM) scheme for standardisation, after three rounds of the …