We present the algorithm to multiply univariate polynomials with integer coefficients efficiently using the Number Theoretic transform (NTT) on Graphics Processing Units (GPU). The same approach can be used to multiply large integers encoded as polynomials. Our algorithm exploits fused multiply-add capabilities of the graphics hardware. NTT multiplications are executed in parallel for a set of distinct primes followed by reconstruction using the Chinese Remainder theorem (CRT) on the GPU. Our benchmarking experiences show the NTT multiplication performance up to 77 GMul/s. We compared our approach with CPU-based implementations of polynomial and large integer multiplication provided by NTL and GMP libraries
Abstract—We present novel algorithms for computing discrete Fourier transforms with high performance...
In this paper, we show how multiplication for polynomial rings used in the NIST PQC finalists Saber ...
Lattice-based cryptography forms the mathematical basis for current homomorphic encryption schemes, ...
We present the algorithm to multiply univariate polynomials with integer coefficients efficiently us...
The number theoretic transform (NTT) permits a very efficient method to perform multiplication of ve...
Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine ...
AbstractThis paper examines the most efficient known serial and parallel algorithms for multiplying ...
With the advent of hardware accelerator technologies, multi-core processors and GPUs, much effort fo...
Post-quantum cryptography has become popular in recent years due to advances in quantum computing. C...
In this paper, we present an optimized FPGA implementation of a novel, fast and highly parallelized ...
Multiplication of polynomials of large degrees is the predominant operation in lattice-based cryptos...
Polynomial multiplication is the most time-consuming part of cryptographic schemes whose security is...
The evolution of quantum algorithms threatens to break public key cryptography in polynomial time. T...
Polynomial multiplication is a key algorithm underlying computer algebra systems (CAS) and its effic...
AbstractMultivariate polynomial multiplication is a fundamental operation which is used in many scie...
Abstract—We present novel algorithms for computing discrete Fourier transforms with high performance...
In this paper, we show how multiplication for polynomial rings used in the NIST PQC finalists Saber ...
Lattice-based cryptography forms the mathematical basis for current homomorphic encryption schemes, ...
We present the algorithm to multiply univariate polynomials with integer coefficients efficiently us...
The number theoretic transform (NTT) permits a very efficient method to perform multiplication of ve...
Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine ...
AbstractThis paper examines the most efficient known serial and parallel algorithms for multiplying ...
With the advent of hardware accelerator technologies, multi-core processors and GPUs, much effort fo...
Post-quantum cryptography has become popular in recent years due to advances in quantum computing. C...
In this paper, we present an optimized FPGA implementation of a novel, fast and highly parallelized ...
Multiplication of polynomials of large degrees is the predominant operation in lattice-based cryptos...
Polynomial multiplication is the most time-consuming part of cryptographic schemes whose security is...
The evolution of quantum algorithms threatens to break public key cryptography in polynomial time. T...
Polynomial multiplication is a key algorithm underlying computer algebra systems (CAS) and its effic...
AbstractMultivariate polynomial multiplication is a fundamental operation which is used in many scie...
Abstract—We present novel algorithms for computing discrete Fourier transforms with high performance...
In this paper, we show how multiplication for polynomial rings used in the NIST PQC finalists Saber ...
Lattice-based cryptography forms the mathematical basis for current homomorphic encryption schemes, ...