Conceptual review on number theoretic transform and comprehensive review on its implementations

A Satriawan, I Syafalni, R Mareta, I Anshori… - IEEE …, 2023 - ieeexplore.ieee.org
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become
increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic …

Tensorfhe: Achieving practical computation on encrypted data using gpgpu

S Fan, Z Wang, W Xu, R Hou, D Meng… - … Symposium on High …, 2023 - ieeexplore.ieee.org
In the cloud computing era, privacy protection is becoming pervasive in a broad range of
applications (eg, machine learning, data mining, etc). Fully Homomorphic Encryption (FHE) …

[图书][B] Residue Number Systems

PVA Mohan, PVA Mohan - 2016 - Springer
The design of algorithms and hardware implementation for signal processing systems has
received considerable attention over the last few decades. The primary area of application …

High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber

VB Dang, K Mohajerani, K Gaj - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Post-Quantum Cryptography (PQC) has emerged as a response of the cryptographic
community to the danger of attacks performed using quantum computers. All PQC schemes …

Gme: Gpu-based microarchitectural extensions to accelerate homomorphic encryption

K Shivdikar, Y Bao, R Agrawal, M Shen… - Proceedings of the 56th …, 2023 - dl.acm.org
Fully Homomorphic Encryption (FHE) enables the processing of encrypted data without
decrypting it. FHE has garnered significant attention over the past decade as it supports …

Hardware Circuits and Systems Design for Post-Quantum Cryptography–A Tutorial Brief

J Xie, W Zhao, H Lee, DB Roy… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Due to the increasing threats from possible large-scale quantum computers, post-quantum
cryptography (PQC) has drawn significant attention from various communities recently. In …

Enabling zero knowledge proof by accelerating zk-SNARK kernels on GPU

N Ni, Y Zhu - Journal of Parallel and Distributed Computing, 2023 - Elsevier
As a recent cryptography protocol, Zero-Knowledge Succinct Non-Interactive Argument of
Knowledge (zk-SNARK) allows one party to prove that it possesses certain information …

Designing an FPGA-accelerated homomorphic encryption co-processor

DB Cousins, K Rohloff… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper we report on our advances designing and implementing an FPGA-based
computation accelerator as part of a Homomorphic Encryption Processing Unit (HEPU) co …

Evaluation of large integer multiplication methods on hardware

C Rafferty, M O'Neill, N Hanley - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Multipliers requiring large bit lengths have a major impact on the performance of many
applications, such as cryptography, digital signal processing (DSP) and image processing …

Power-aware test: Challenges and solutions

S Ravi - 2007 IEEE International Test Conference, 2007 - ieeexplore.ieee.org
Power-aware test is increasingly becoming a major manufacturing test consideration due to
the problems of increased power dissipation in various test modes as well as test …