Towards practical lattice-based public-key encryption on reconfigurable hardware
T Pöppelmann, T Güneysu - Selected Areas in Cryptography--SAC 2013 …, 2014 - Springer
With this work we provide further evidence that lattice-based cryptography is a promising
and efficient alternative to secure embedded applications. So far it is known for solid security …
and efficient alternative to secure embedded applications. So far it is known for solid security …
Carbon-aware energy capacity planning for datacenters
Datacenters are facing increasing pressure to cap their carbon footprints at low cost. Recent
work has shown the significant environmental benefits of using renewable energy for …
work has shown the significant environmental benefits of using renewable energy for …
A comparison of CPUs, GPUs, FPGAs, and massively parallel processor arrays for random number generation
The future of high-performance computing is likely to rely on the ability to efficiently exploit
huge amounts of parallelism. One way of taking advantage of this parallelism is to formulate …
huge amounts of parallelism. One way of taking advantage of this parallelism is to formulate …
A hardware Gaussian noise generator using the Box-Muller method and its error analysis
We present a hardware Gaussian noise generator based on the Box-Muller method that
provides highly accurate noise samples. The noise generator can be used as a key …
provides highly accurate noise samples. The noise generator can be used as a key …
Gaussian random number generation: A survey on hardware architectures
Some excellent surveys of the Gaussian random number generators (GRNGs) from the
algorithmic perspective exist in the published literature to date (eg, Thomas et al.[2007]). In …
algorithmic perspective exist in the published literature to date (eg, Thomas et al.[2007]). In …
Post-quantum cryptography: Challenges and opportunities for robust and secure HW design
Post-Quantum Cryptography (PQC) will become soon the standard for many systems of the
future. With the advent of quantum computers, all encrypted communications based on …
future. With the advent of quantum computers, all encrypted communications based on …
Neuromorphic accelerators: A comparison between neuroscience and machine-learning approaches
A vast array of devices, ranging from industrial robots to self-driven cars or smartphones,
require increasingly sophisticated processing of real-world input data (image, voice …
require increasingly sophisticated processing of real-world input data (image, voice …
A novel cryptographic substitution box design using Gaussian distribution
In this paper, a novel method is being proposed to construct a substitution box or Boolean
function for block ciphers using Gaussian distribution and linear fractional transform. The …
function for block ciphers using Gaussian distribution and linear fractional transform. The …
High precision discrete Gaussian sampling on FPGAs
Lattice-based public key cryptography often requires sampling from discrete Gaussian
distributions. In this paper we present an efficient hardware implementation of a discrete …
distributions. In this paper we present an efficient hardware implementation of a discrete …
Hardware generation of arbitrary random number distributions from uniform distributions via the inversion method
We present an automated methodology for producing hardware-based random number
generator (RNG) designs for arbitrary distributions using the inverse cumulative distribution …
generator (RNG) designs for arbitrary distributions using the inverse cumulative distribution …