Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic
Transform are fundamental building blocks for lattice-based post-quantum cryptography. In …
Transform are fundamental building blocks for lattice-based post-quantum cryptography. In …
[PDF][PDF] Improved plantard arithmetic for lattice-based cryptography
This paper presents an improved Plantard's modular arithmetic (Plantard arithmetic) tailored
for Lattice-Based Cryptography (LBC). Based on the improved Plantard arithmetic, we …
for Lattice-Based Cryptography (LBC). Based on the improved Plantard arithmetic, we …
High-order polynomial comparison and masking lattice-based encryption
The main protection against side-channel attacks consists in computing every function with
multiple shares via the masking countermeasure. For IND-CCA secure lattice-based …
multiple shares via the masking countermeasure. For IND-CCA secure lattice-based …
Dcryp-unit: Crypto hardware accelerator unit design for elliptic curve point multiplication
We propose a hardware-optimized design that implements a Montgomery Elliptic-curve
point multiplication Algorithm over using Lopez-Dahab projective coordinates. Moreover, we …
point multiplication Algorithm over using Lopez-Dahab projective coordinates. Moreover, we …
{OpenSSLNTRU}: Faster post-quantum {TLS} key exchange
OpenSSLNTRU: Faster post-quantum TLS key exchange Page 1 This paper is included in
the Proceedings of the 31st USENIX Security Symposium. August 10–12, 2022 • Boston, MA …
the Proceedings of the 31st USENIX Security Symposium. August 10–12, 2022 • Boston, MA …
High-speed design of post quantum cryptography with optimized hashing and multiplication
In this brief, we realize different architectural techniques for improving the performance of
post-quantum cryptography (PQC) algorithms when implemented as hardware accelerators …
post-quantum cryptography (PQC) algorithms when implemented as hardware accelerators …
High-order table-based conversion algorithms and masking lattice-based encryption
Masking is the main countermeasure against side-channel attacks on embedded devices.
For cryptographic algorithms that combine Boolean and arithmetic masking, one must …
For cryptographic algorithms that combine Boolean and arithmetic masking, one must …
Roulette: A diverse family of feasible fault attacks on masked kyber
J Delvaux - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Abstract At Indocrypt 2021, Hermelink, Pessl, and Pöppelmann presented a fault attack
against Kyber in which a system of linear inequalities over the private key is generated and …
against Kyber in which a system of linear inequalities over the private key is generated and …
Polynomial multiplication on embedded vector architectures
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive
underlying structured lattice based cryptography. Its algorithmic properties and suitability for …
underlying structured lattice based cryptography. Its algorithmic properties and suitability for …
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices
have become ubiquitous in our digital ecosystem. These devices generate and handle a …
have become ubiquitous in our digital ecosystem. These devices generate and handle a …