2014
DOI: 10.1007/978-3-662-43414-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware

Abstract: Abstract. With this work we provide further evidence that latticebased cryptography is a promising and efficient alternative to secure embedded applications. So far it is known for solid security reductions but implementations of specific instances have often been reported to be too complex beyond any practicability. In this work, we present an efficient and scalable micro-code engine for Ring-LWE encryption that combines polynomial multiplication based on the Number Theoretic Transform (NTT), polynomial addit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
93
0
4

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 94 publications
(97 citation statements)
references
References 41 publications
0
93
0
4
Order By: Relevance
“…In conclusion, it can be seen that the polynomial multiplier proposed in this chapter was a huge improvement over previous work [GFS + 12] and applicable for the implementation of latticebased encryption [PG13] and signature schemes [PDG14a,GLP15]. Moreover, our initial design was a first approach that has been extended by follow-up work.…”
Section: Discussionmentioning
confidence: 84%
See 3 more Smart Citations
“…In conclusion, it can be seen that the polynomial multiplier proposed in this chapter was a huge improvement over previous work [GFS + 12] and applicable for the implementation of latticebased encryption [PG13] and signature schemes [PDG14a,GLP15]. Moreover, our initial design was a first approach that has been extended by follow-up work.…”
Section: Discussionmentioning
confidence: 84%
“…However, more detailed coverage of efficient methods to realize the processing element (PE) and general improvements to the architecture have been added. Details on the microcode engine were published in [PG13] and the instruction set appeared in [GLP15]. …”
Section: Chapter 4 Polynomial Multiplication On Reconfigurable Hardwarementioning
confidence: 99%
See 2 more Smart Citations
“…After the proposal of the encryption scheme, several implementations of the encryption scheme followed [12,25,29,7,3,18,27]. The basic arithmetic operations are polynomial multiplication, addition, subtraction, and generation of error polynomials from a discrete Gaussian distribution.…”
Section: Public-key Encryption Schemesmentioning
confidence: 99%