Saber is one of the four finalists in the ongoing NIST post-quantum cryptography standardization project. A significant portion of Saber\u27s computation time is spent on computing polynomial multiplications in polynomial rings with powers-of-two moduli. We propose several optimization strategies for improving the performance of polynomial multiplier architectures for Saber, targeting different hardware platforms and diverse application goals. We propose two high-speed architectures that exploit the smallness of operand polynomials in Saber and can achieve great performance with a moderate area consumption. We also propose a lightweight multiplier that consumes only 541 LUTs and 301 FFs on a small Artix-7 FPGA
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
The U.S. National Institute of Standards and Technology (NIST) has designated ARM microcontrollers a...
With the recent advances in quantum computing, code-based cryptography is foreseen to be one of the...
The evolution of quantum algorithms threatens to break public key cryptography in polynomial time. T...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST\...
The evolution of quantum algorithms threatens to break public key cryptography in polynomial time. T...
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying...
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’...
Accepted paper for the DAC 2020 conference We present a domain-specific co-processor to speed up Sa...
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
In this paper, we show how multiplication for polynomial rings used in the NIST PQC finalists Saber ...
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’...
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
The U.S. National Institute of Standards and Technology (NIST) has designated ARM microcontrollers a...
With the recent advances in quantum computing, code-based cryptography is foreseen to be one of the...
The evolution of quantum algorithms threatens to break public key cryptography in polynomial time. T...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST\...
The evolution of quantum algorithms threatens to break public key cryptography in polynomial time. T...
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying...
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’...
Accepted paper for the DAC 2020 conference We present a domain-specific co-processor to speed up Sa...
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
In this paper, we show how multiplication for polynomial rings used in the NIST PQC finalists Saber ...
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’...
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-based pos...
The U.S. National Institute of Standards and Technology (NIST) has designated ARM microcontrollers a...
With the recent advances in quantum computing, code-based cryptography is foreseen to be one of the...