2021
DOI: 10.1109/tr.2020.2991671
|View full text |Cite
|
Sign up to set email alerts
|

Error Detection Architectures for Ring Polynomial Multiplication and Modular Reduction of Ring-LWE in $\boldsymbol{\frac{\mathbb{Z}/p\mathbb{Z}[x]}{x^{n}+1}}$ Benchmarked on ASIC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…Broadcast routing is a straightforward method of flooding messages with other vehicles in groups. This procedure ensures that the message is delivered to all vehicles (Sarker et al, 2020;Kermani and Azarderakhsh, 2018). Flooding ensures packet delivery by ensuring that every node in the network receives the packet.…”
Section: B Broadcast-based Routingmentioning
confidence: 99%
“…Broadcast routing is a straightforward method of flooding messages with other vehicles in groups. This procedure ensures that the message is delivered to all vehicles (Sarker et al, 2020;Kermani and Azarderakhsh, 2018). Flooding ensures packet delivery by ensuring that every node in the network receives the packet.…”
Section: B Broadcast-based Routingmentioning
confidence: 99%
“…For sensitive systems, degraded performance can lead to disastrous results; consequently, research has explored strategies to reduce errors and provide higher reliability with acceptable overhead [16,17,18,19,20,21,22,23,24]. In [16], a ingerprint-based technique for detecting malicious programs in hardware is presented.…”
Section: Previous Workmentioning
confidence: 99%
“…In [18] and [19], fault detection mechanisms are presented for the lightweight cryptographic block cipher QARMA and polynomial basis inversions, respectively. Moreover, error detection constructions based on recomputation with encoded (shifted) operands and recomputation with encoded (negated) operands for the Ring-LWE and for the ring polynomial multiplication and modular reduction of Ring-LWE are implemented in [20] and [21], respectively. Lastly, error detection schemes are proposed for secure cryptographic GCM structures in [22], for Hash-Counter-Hash tweakable enciphering constructions in [23], and for cryptographic applications using multipliers in [24].…”
Section: Previous Workmentioning
confidence: 99%
“…Moving on, Anastasova et al [37] explore the fast strategies for the implementation of Supersingular Isogeny Key Encapsulation (SIKE) Round 3 on ARM Cortex-M4, showcasing optimized techniques. Additionally, [38] discusses error detection architectures for Ring Polynomial Multiplication and Modular Reduction of Ring-LWE, providing valuable insights into ASIC implementations. These works collectively contribute to the advancement of cryptographic implementations on resource-constrained platforms and are crucial in the context of secure and reliable systems.…”
Section: Introductionmentioning
confidence: 99%