2022
DOI: 10.1109/tetc.2022.3144101
|View full text |Cite
|
Sign up to set email alerts
|

Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 36 publications
(23 citation statements)
references
References 23 publications
0
23
0
Order By: Relevance
“…In which, #Slice ≈ #LUT 4 for 7 series FPGAs due to 4 LUTs in one Slice [42] and #LUT 8 for UltraScale FPGAs due to 8 LUTs in one Slice [43]. One DSP block can be replaced by 102.4 and 51.2 Slices, and each 36Kb BRAM unit can be substituted by 232.4 and 116.2 Slices for 7 series and UltraScale FPGAs, respectively [26], [44]. The 15th column indicates the data throughput that determines the performance of hardware designs and be measured by the number of bits passing through the NTT module for one second as follows:…”
Section: B Comparison With Related Work and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In which, #Slice ≈ #LUT 4 for 7 series FPGAs due to 4 LUTs in one Slice [42] and #LUT 8 for UltraScale FPGAs due to 8 LUTs in one Slice [43]. One DSP block can be replaced by 102.4 and 51.2 Slices, and each 36Kb BRAM unit can be substituted by 232.4 and 116.2 Slices for 7 series and UltraScale FPGAs, respectively [26], [44]. The 15th column indicates the data throughput that determines the performance of hardware designs and be measured by the number of bits passing through the NTT module for one second as follows:…”
Section: B Comparison With Related Work and Discussionmentioning
confidence: 99%
“…Prior arts can be classified into two major architectural approaches: (i) in-place NTT architectures that use a single computing module to perform computations iteratively and generate the results after a delay gap [14], [15], [16], [17], [18], [19], [20], [21], [22], [23]; and (ii) fully-pipelined NTT architectures that deploy all stages in series and produce coefficients every clock cycle (CC) [24], [25], [26], [27], [28], [29]. The selection of a design method depends on the parameter setting of the HE schemes, desired throughput rate, and available hardware resources on the target computing platform.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Utilizing FFT for polynomial multiplication has become prevalent in security applications, including homomorphic encryption [35], [36] and post-quantum cryptography [37], [38]. These works target the multiplication of polynomials over the ring of integers, in which the FFT becomes an NTT.…”
Section: B Fft Acceleratorsmentioning
confidence: 99%
“…Since NTT/INTT calculations are not simultaneously performed, the same architecture is reused to minimize resource consumption. To balance area and speed and match the throughput of data in the subsequent modules, the Radix-2 multipath delay commutator (MDC)based architecture turns out to be the optimal choice [30].…”
Section: Ntt/intt Modulementioning
confidence: 99%