The lattice-based post-quantum cryptosystem NTRU is used by Google for protecting Google’s internal communication. In NTRU, polynomial multiplication is one of bottleneck. In this paper, we explore the interactions between polynomial multiplication, Toeplitz matrix–vector product, and vectorization with architectural insights. For a unital commutative ring $R$, a positive integer $n$, and an element $\zeta \in R$, we reveal the benefit of vector-by-scalar multiplication instructions while multiplying in $R[x] / \langle x^n - \zeta \rangle$. We aim at designing an algorithm exploiting no algebraic and number–theoretic properties of $n$ and $\zeta$. An obvious way is to multiply in $R[x]$ and reduce modulo $x^n - \zeta$. Since the product in ...
Modulo polynomial multiplication is an essential mathematical operation in the area of finite field ...
This is a preprint of a book chapter published in Lecture Notes in Computer Science, 2551, Springer-...
In this thesis, four efficient multiplication architectures, named as Multipliers I, II, III, and IV...
The lattice-based post-quantum cryptosystem NTRU is used by Google for protecting Google’s internal ...
We survey various mathematical tools used in software works multiplying polynomials in $\mathbb{Z}_q...
In this paper, we explore the cost of vectorization for polynomial multiplication with coefficients ...
We conduct a systematic examination of vector arithmetic for polynomial multiplications in software....
Multiplication of polynomials with large integer coefficients and very high degree is used in crypt...
Efficient polynomial multiplication routines are critical to the performance of lattice-based post-q...
In this paper, we show how multiplication for polynomial rings used in the NIST PQC finalists Saber ...
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying...
International audienceBini–Capovani–Lotti–Romani approximate formula (or border rank) for matrix mul...
http://www.math.missouri.edu/~bbanks/papers/index.htmlWe discuss three cryptosystems, NTRU, SPIFI , ...
In this paper, new software and hardware designs for the NTRU Public Key Cryptosystem are proposed. ...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
Modulo polynomial multiplication is an essential mathematical operation in the area of finite field ...
This is a preprint of a book chapter published in Lecture Notes in Computer Science, 2551, Springer-...
In this thesis, four efficient multiplication architectures, named as Multipliers I, II, III, and IV...
The lattice-based post-quantum cryptosystem NTRU is used by Google for protecting Google’s internal ...
We survey various mathematical tools used in software works multiplying polynomials in $\mathbb{Z}_q...
In this paper, we explore the cost of vectorization for polynomial multiplication with coefficients ...
We conduct a systematic examination of vector arithmetic for polynomial multiplications in software....
Multiplication of polynomials with large integer coefficients and very high degree is used in crypt...
Efficient polynomial multiplication routines are critical to the performance of lattice-based post-q...
In this paper, we show how multiplication for polynomial rings used in the NIST PQC finalists Saber ...
High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying...
International audienceBini–Capovani–Lotti–Romani approximate formula (or border rank) for matrix mul...
http://www.math.missouri.edu/~bbanks/papers/index.htmlWe discuss three cryptosystems, NTRU, SPIFI , ...
In this paper, new software and hardware designs for the NTRU Public Key Cryptosystem are proposed. ...
The significant effort in the research and design of large-scale quantum computers has spurred a tra...
Modulo polynomial multiplication is an essential mathematical operation in the area of finite field ...
This is a preprint of a book chapter published in Lecture Notes in Computer Science, 2551, Springer-...
In this thesis, four efficient multiplication architectures, named as Multipliers I, II, III, and IV...