Some of the post-quantum cryptographic protocols require polynomial multiplication in characteristic three fields, thus the efficiency of such multiplication algorithms gain more importance recently. In this thesis, we propose four new polynomial multiplication algorithms in characteristic three fields and we show that they are more efficient than the current state-of-the-art methods. We first analyze the well-known algorithms such as the schoolbook method, Karatsuba 2-way and 3-way split methods, Bernstein’s three 3-way split method, Toom-Cook-like formulas, and other recent algorithms. We realize that there are not any 4-way or 5-way split multiplication algorithms in characteristic three fields unlike the binary (characteristic two) fiel...
With the advance of quantum computers, there is an urgent need to find replacements for public-key c...
In this paper, we show how multiplication for polynomial rings used in the NIST PQC finalists Saber ...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
Efficient computation of polynomial multiplication over characteristic three fields is required for ...
Abstract. Characteristic three fields denoted by F3n, where n ≥ 1, are used in curve based cryptogra...
Multiplication of polynomials with large integer coefficients and very high degree is used in crypt...
N. Koblitz and V. Miller originally proposed the concept of elliptic curve cryptography in 1985. It ...
In this paper, we first present an enhancement of the well-known Karatsuba 2-way and 3-way algorithm...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
NTRU is a lattice-based public-key cryptosystem that has been selected as one of the Round III final...
We survey various mathematical tools used in software works multiplying polynomials in $\mathbb{Z}_q...
In this paper, we explore the cost of vectorization for polynomial multiplication with coefficients ...
In their 2022 study, Kuang et al. introduced the Multivariable Polynomial Public Key (MPPK) cryptogr...
When implementing a cryptographic algorithm, efficient operations have high relevance both in hardwa...
Number theoretic transform (NTT) is the most efficient method for multiplying two polynomials of hig...
With the advance of quantum computers, there is an urgent need to find replacements for public-key c...
In this paper, we show how multiplication for polynomial rings used in the NIST PQC finalists Saber ...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
Efficient computation of polynomial multiplication over characteristic three fields is required for ...
Abstract. Characteristic three fields denoted by F3n, where n ≥ 1, are used in curve based cryptogra...
Multiplication of polynomials with large integer coefficients and very high degree is used in crypt...
N. Koblitz and V. Miller originally proposed the concept of elliptic curve cryptography in 1985. It ...
In this paper, we first present an enhancement of the well-known Karatsuba 2-way and 3-way algorithm...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
NTRU is a lattice-based public-key cryptosystem that has been selected as one of the Round III final...
We survey various mathematical tools used in software works multiplying polynomials in $\mathbb{Z}_q...
In this paper, we explore the cost of vectorization for polynomial multiplication with coefficients ...
In their 2022 study, Kuang et al. introduced the Multivariable Polynomial Public Key (MPPK) cryptogr...
When implementing a cryptographic algorithm, efficient operations have high relevance both in hardwa...
Number theoretic transform (NTT) is the most efficient method for multiplying two polynomials of hig...
With the advance of quantum computers, there is an urgent need to find replacements for public-key c...
In this paper, we show how multiplication for polynomial rings used in the NIST PQC finalists Saber ...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...