2015 IEEE 26th International Conference on Application-Specific Systems, Architectures and Processors (ASAP) 2015
DOI: 10.1109/asap.2015.7245723
|View full text |Cite
|
Sign up to set email alerts
|

Programmable RNS lattice-based parallel cryptographic decryption

Abstract: Should quantum computing become viable, current public-key cryptographic schemes will no longer be valid. Since cryptosystems take many years to mature, research on postquantum cryptography is now more important than ever. Herein, lattice-based cryptography is focused on, as an alternative postquantum cryptosystem, to improve its efficiency. We put together several theoretical developments so as to produce an efficient implementation that solves the Closest Vector Problem (CVP) on Goldreich-Goldwasser-Halevi (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 20 publications
(23 reference statements)
0
3
0
Order By: Relevance
“…As a matter of example, some practical results provided in [16] are indicated hereafter. The RNS/MRS approach was implemented on multi-core CPU and GPU and was compared with a classical multi-precision computation.…”
Section: Example Of Implementation On Cpu/gpu Of Rns/mrs Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…As a matter of example, some practical results provided in [16] are indicated hereafter. The RNS/MRS approach was implemented on multi-core CPU and GPU and was compared with a classical multi-precision computation.…”
Section: Example Of Implementation On Cpu/gpu Of Rns/mrs Approachmentioning
confidence: 99%
“…The performances of implementations on CPU or GPU have been investigated in [16]. In order to output the same value in both M and M 0 , Bex meth2 must be exact.…”
Section: Mrs Approach For Bex Meth1mentioning
confidence: 99%
“…Hence, should quantum computing become viable, currentlyin-use cryptosystems will be broken. As such, research on efficient post-quantum public-key cryptosystems is most valuable [4].…”
Section: Introductionmentioning
confidence: 99%