Conceptual review on number theoretic transform and comprehensive review on its implementations

A Satriawan, I Syafalni, R Mareta, I Anshori… - IEEE …, 2023 - ieeexplore.ieee.org
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become
increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic …

High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography

M Bisheh-Niasar, R Azarderakhsh… - 2021 IEEE 28th …, 2021 - ieeexplore.ieee.org
This paper demonstrates an architecture for accelerating the polynomial multiplication using
number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST …

Instruction-set accelerated implementation of CRYSTALS-Kyber

M Bisheh-Niasar, R Azarderakhsh… - … on Circuits and …, 2021 - ieeexplore.ieee.org
Large scale quantum computers will break classical public-key cryptography protocols by
quantum algorithms such as Shor's algorithm. Hence, designing quantum-safe …

Error detection architectures for hardware/software co-design approaches of number-theoretic transform

A Sarker, AC Canto, MM Kermani… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Number-theoretic transform (NTT) is an efficient polynomial multiplication technique of lattice-
based post-quantum cryptography including Kyber which is standardized as the NIST key …

VLSI Design and FPGA implementation of an NTT hardware accelerator for Homomorphic seal-embedded library

S Di Matteo, ML Gerfo, S Saponara - IEEE Access, 2023 - ieeexplore.ieee.org
Homomorphic Encryption (HE) allows performing specific algebraic computations on
encrypted data without the need for decryption. For this reason, HE is emerging as a strong …

NTT architecture for a Linux-ready RISC-V fully-homomorphic encryption accelerator

R Paludo, L Sousa - … Transactions on Circuits and Systems I …, 2022 - ieeexplore.ieee.org
This paper proposes two architectures for the acceleration of Number Theoretic Transforms
(NTTs) using a novel Montgomery-based butterfly. We first design a custom NTT hardware …

Horizontal side-channel vulnerabilities of post-quantum key exchange and encapsulation protocols

F Aydin, A Aysu, M Tiwari, A Gerstlauer… - ACM Transactions on …, 2021 - dl.acm.org
Key exchange protocols and key encapsulation mechanisms establish secret keys to
communicate digital information confidentially over public channels. Lattice-based …

CoHA-NTT: A configurable hardware accelerator for NTT-based polynomial multiplication

K Derya, AC Mert, E Öztürk, E Savaş - Microprocessors and Microsystems, 2022 - Elsevier
In this paper, we introduce a configurable hardware architecture that can be used to
generate unified and parametric NTT-based polynomial multipliers that support a wide …

Configurable memory-based NTT architecture for homomorphic encryption

S Kurniawan, P Duong-Ngoc… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Fully Homomorphic Encryption (FHE) is currently seen to be a promising solution for privacy-
preserving applications. However, FHE suffers from a computational bottleneck due to the …

Scalable and parallel optimization of the number theoretic transform based on FPGA

B Li, Y Yan, Y Wei, H Han - IEEE Transactions on Very Large …, 2023 - ieeexplore.ieee.org
In lattice-based postquantum cryptography (PQC), polynomial multiplication is complex and
time-consuming, which affects the overall computational efficiency. In addition, the …