2020
DOI: 10.46586/tches.v2021.i1.217-238
|View full text |Cite
|
Sign up to set email alerts
|

Polynomial Multiplication in NTRU Prime

Abstract: This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by Bernstein, Chuengsatiansup, Lange, and Vredendaal, which uses a polynomial ring that is, by design, not amenable to use with NTT. One of our approaches is using Good’s trick and focuses on speed and supporting more than one parameter set with a single implemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 8 publications
0
0
0
Order By: Relevance
“…It appears that the number-theoretic transforms are cores of all high-speed implementations of lattice-based crypto for the Cortex-M4. It is either prescribed in the specification of Dilithium, Falcon, and Kyber, or maintains to be the fastest polynomial multiplication methods in Saber, NTRU [CHK+21], and NTRU Prime [ACC+20].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It appears that the number-theoretic transforms are cores of all high-speed implementations of lattice-based crypto for the Cortex-M4. It is either prescribed in the specification of Dilithium, Falcon, and Kyber, or maintains to be the fastest polynomial multiplication methods in Saber, NTRU [CHK+21], and NTRU Prime [ACC+20].…”
Section: Introductionmentioning
confidence: 99%
“…While the techniques are already known, they have so far not been applied to Kyber and Dilithium. This includes (1) the use of Cooley-Tukey butterflies for the inverse NTT of both Kyber and Dilithium previously proposed for Saber in [ACC+21]; (2) the use of floating point registers for caching values in the NTT of Dilithium and Kyber which was first proposed in the context of NTTs for NTRU Prime in [ACC+20]. This allows to merge more layers of the NTT and reduce memory access time for loading twiddle factors; (3) we make use of the "asymmetric multiplication" proposed in [BHK+21] which eliminates some duplicate computation in the base multiplication of Kyber at the cost of extra stack usage; and (4) we use an idea from [CHK+21] to improve the accumulation in the matrix-vector product of Kyber by using a 32-bit accumulator allowing to eliminate some modular reductions at the cost of more stack usage.…”
Section: Introductionmentioning
confidence: 99%
“…The superiority of safegcd has also provided new solution approaches for other algorithms. In [23], researchers proposed three polynomial multiplication methods based on NTT and implemented them on Cortex-M4 microcontrollers using safegcd. Similarly, researchers [24] have studied public key compression capabilities using safegcd.…”
Section: Introduction 1related Workmentioning
confidence: 99%