Towards practical lattice-based public-key encryption on reconfigurable hardware

T Pöppelmann, T Güneysu - Selected Areas in Cryptography--SAC 2013 …, 2014 - Springer
With this work we provide further evidence that lattice-based cryptography is a promising
and efficient alternative to secure embedded applications. So far it is known for solid security …

Carbon-aware energy capacity planning for datacenters

C Ren, D Wang, B Urgaonkar… - 2012 IEEE 20th …, 2012 - ieeexplore.ieee.org
Datacenters are facing increasing pressure to cap their carbon footprints at low cost. Recent
work has shown the significant environmental benefits of using renewable energy for …

A comparison of CPUs, GPUs, FPGAs, and massively parallel processor arrays for random number generation

DB Thomas, L Howes, W Luk - Proceedings of the ACM/SIGDA …, 2009 - dl.acm.org
The future of high-performance computing is likely to rely on the ability to efficiently exploit
huge amounts of parallelism. One way of taking advantage of this parallelism is to formulate …

A hardware Gaussian noise generator using the Box-Muller method and its error analysis

DU Lee, JD Villasenor, W Luk… - IEEE transactions on …, 2006 - ieeexplore.ieee.org
We present a hardware Gaussian noise generator based on the Box-Muller method that
provides highly accurate noise samples. The noise generator can be used as a key …

Gaussian random number generation: A survey on hardware architectures

JS Malik, A Hemani - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
Some excellent surveys of the Gaussian random number generators (GRNGs) from the
algorithmic perspective exist in the published literature to date (eg, Thomas et al.[2007]). In …

Post-quantum cryptography: Challenges and opportunities for robust and secure HW design

D Bellizia, N El Mrabet, AP Fournaris… - … on Defect and fault …, 2021 - ieeexplore.ieee.org
Post-Quantum Cryptography (PQC) will become soon the standard for many systems of the
future. With the advent of quantum computers, all encrypted communications based on …

Neuromorphic accelerators: A comparison between neuroscience and machine-learning approaches

Z Du, DD Ben-Dayan Rubin, Y Chen, L He… - Proceedings of the 48th …, 2015 - dl.acm.org
A vast array of devices, ranging from industrial robots to self-driven cars or smartphones,
require increasingly sophisticated processing of real-world input data (image, voice …

A novel cryptographic substitution box design using Gaussian distribution

MF Khan, A Ahmed, K Saleem - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, a novel method is being proposed to construct a substitution box or Boolean
function for block ciphers using Gaussian distribution and linear fractional transform. The …

High precision discrete Gaussian sampling on FPGAs

S Sinha Roy, F Vercauteren, I Verbauwhede - International Conference on …, 2013 - Springer
Lattice-based public key cryptography often requires sampling from discrete Gaussian
distributions. In this paper we present an efficient hardware implementation of a discrete …

Hardware generation of arbitrary random number distributions from uniform distributions via the inversion method

RCC Cheung, DU Lee, W Luk… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
We present an automated methodology for producing hardware-based random number
generator (RNG) designs for arbitrary distributions using the inverse cumulative distribution …