2023
DOI: 10.1109/tcad.2022.3218614
|View full text |Cite
|
Sign up to set email alerts
|

Error Detection Architectures for Hardware/Software Co-Design Approaches of Number-Theoretic Transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Nonetheless, PQCs and NTT are susceptible to FIA and PA attack [46], [48]. Researchers are employing error-detection mechanisms [50] and investigating error-resistant NTT architectures [51] to safeguard PQC schemes from FIAs. Additionally, they are exploring masking schemes [52] as a countermeasure against power attacks.…”
Section: E Background On Other Cryptosmentioning
confidence: 99%
“…Nonetheless, PQCs and NTT are susceptible to FIA and PA attack [46], [48]. Researchers are employing error-detection mechanisms [50] and investigating error-resistant NTT architectures [51] to safeguard PQC schemes from FIAs. Additionally, they are exploring masking schemes [52] as a countermeasure against power attacks.…”
Section: E Background On Other Cryptosmentioning
confidence: 99%
“…Yaman et al implemented different architectures of multiplication units by increasing the number of butterfly units in the NTT based on a unified butterfly structure [16], with lightweight, balanced, and high-performance hardware architectures, using 1, 4, and 16 parallel butterfly units, respectively. Resistance to attacks on the NTT has also received attention, with some work focusing on the error detection capabilities of the NTT [20], [21]. These NTT-based error detection architectures are compact and are suitable for deeply embedded NTT architectures.…”
Section: Related Workmentioning
confidence: 99%
“…The study paid close attention to security issues in digital transformation in the new era of quantum computing, especially in the PQC environment. The research focused on improving the security of hardware/software co-design approaches to defend against potential threats and attacks, which were critical to protecting sensitive data and communications [ 21 ]. Kermani mentioned the issue of integrating emerging cryptographic engineering research with security education.…”
Section: Introductionmentioning
confidence: 99%