Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Erdem ALKIM"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 4 (2022)
We propose NTT implementations with each supporting at least one parameter of NTRU and one parameter of NTRU Prime. Our implementations are based on size-1440, size-1536, and size-1728 convolutions without algebraic assumptions on the target polynomi
Externí odkaz:
https://doaj.org/article/0597fd42fa0c4d3aabcf3587cbcb061b
Autor:
Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 1 (2020)
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) propose
Externí odkaz:
https://doaj.org/article/fb164585af0447278192b10d67273ab2
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
This paper proposes various optimizations for lattice-based key encapsulation mechanisms (KEM) using the Number Theoretic Transform (NTT) on the popular ARM Cortex-M4 microcontroller. Improvements come in the form of a faster code using more efficien
Externí odkaz:
https://doaj.org/article/1267f9a49bf24273850871c91e5674aa
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
We present and evaluate a custom extension to the RISC-V instruction set for finite field arithmetic. The result serves as a very compact approach to software-hardware co-design of PQC implementations in the context of small embedded processors such
Externí odkaz:
https://doaj.org/article/749d4bd2dd6946869efe9c001bf71e48
This paper demonstrates the first side-channel attack on homomorphic encryption (HE), which allows computing on encrypted data. We reveal a power-based side-channel leakage of Microsoft SEAL prior to v3.6 that implements the Brakerski/FanVercauteren
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::eb44d34e1e38aacc7b7e9d21d23128b9
https://avesis.deu.edu.tr/publication/details/cfd7db13-50bd-48ab-8ec4-5f6a8435b2de/oai
https://avesis.deu.edu.tr/publication/details/cfd7db13-50bd-48ab-8ec4-5f6a8435b2de/oai
This paper proposes a discrete Gaussian sampling hardware design that can flexibly support different sampling parameters, that is more efficient (in area-delay product) compared to the majority of earlier proposals, and that has constant execution ti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dd8d4599696823f145831893d62bf868
https://avesis.deu.edu.tr/publication/details/f442bc47-fd2d-41b5-a357-c19c59e7cfda/oai
https://avesis.deu.edu.tr/publication/details/f442bc47-fd2d-41b5-a357-c19c59e7cfda/oai
Publikováno v:
Trends in Data Engineering Methods for Intelligent Systems ISBN: 9783030793562
In recent times, Wireless Sensor Networks (WSN) have become used in all fields of life, especially military and commercial ones. These networks are so widespread that it can be used in small enclosed spaces, or even to cover large geographical areas.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::399f4eb4f087b5e57bbb5b16b361ec46
https://avesis.deu.edu.tr/publication/details/1a72c517-6b26-4a37-ade6-1f44ad68fd43/oai
https://avesis.deu.edu.tr/publication/details/1a72c517-6b26-4a37-ade6-1f44ad68fd43/oai
Autor:
Bilge Kagan Yazar, Erdem Alkim
Publikováno v:
Avrupa Bilim ve Teknoloji Dergisi
Şifreleme sistemleri gizli değerlerin korunmasını sağlamakta olan sistemlerdir. Bu sistemlere karşı son yıllarda kuantum bilgisayarlar üzerinde çok sayıda araştırmalar yapılmaktadır. Yeterli işlem kapasitesine sahip kuantum bilgisayar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::da21c86fb7debbb0a87f75beef46462c
https://dergipark.org.tr/tr/pub/ejosat/issue/53473/710955
https://dergipark.org.tr/tr/pub/ejosat/issue/53473/710955
We present and evaluate a custom extension to the RISC-V instruction set for finite field arithmetic. The result serves as a very compact approach to software-hardware co-design of PQC implementations in the context of small embedded processors such
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7797a98f461d1e00bc597e55531c4a91
https://publica.fraunhofer.de/handle/publica/263223
https://publica.fraunhofer.de/handle/publica/263223
Autor:
Jefferson E. Ricardini, Patrick Longa, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Erdem Alkim
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030578077
ACNS (1)
ACNS (1)
We present qTESLA, a post-quantum provably-secure digital signature scheme that exhibits several attractive features such as simplicity, strong security guarantees against quantum adversaries, and built-in protection against certain side-channel and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7bff2ea007bb09d9ddde55efd5aadc8d
https://doi.org/10.1007/978-3-030-57808-4_22
https://doi.org/10.1007/978-3-030-57808-4_22