This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using the Number Theoretic Transform (NTT) on the popular ARM Cortex-M4 microcontroller. Improvements come in the form of a faster code using more efficient modular reductions, optimized small-degree polynomial multiplications, and more aggressive layer merging in the NTT, but also in the form of reduced stack usage. We test our optimizations in software implementations of Kyber and NewHope, both round 2 candidates in the NIST post-quantum project, and also NewHope-Compact, a recently proposed variant of NewHope with smaller parameters. Our software is the first implementation of NewHope-Compact on the Cortex-M4 and shows speed improvements over p...
The NTRU lattice is a promising candidate to construct practical cryptosystems, in particular key en...
6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016 ...
The thesis is about implementation of LWE/MLWE encryption schemes in C++ and the use of the Number T...
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using...
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using...
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using...
In this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quant...
In this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quant...
n this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quantu...
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying...
The U.S. National Institute of Standards and Technology (NIST) has designated ARM microcontrollers a...
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST\...
Accepted paper for the DAC 2020 conference We present a domain-specific co-processor to speed up Sa...
The NTRU lattice is a promising candidate to construct practical cryptosystems, in particular key en...
6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016 ...
The thesis is about implementation of LWE/MLWE encryption schemes in C++ and the use of the Number T...
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using...
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using...
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using...
In this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quant...
In this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quant...
n this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quantu...
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying...
The U.S. National Institute of Standards and Technology (NIST) has designated ARM microcontrollers a...
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST\...
Accepted paper for the DAC 2020 conference We present a domain-specific co-processor to speed up Sa...
The NTRU lattice is a promising candidate to construct practical cryptosystems, in particular key en...
6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016 ...
The thesis is about implementation of LWE/MLWE encryption schemes in C++ and the use of the Number T...