x2DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes.
Uloženo v:
| Název: | x2DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes. |
|---|---|
| Autoři: | Ahmadunnisa, Shaik, Mathe, Sudha Ellison |
| Zdroj: | IET Quantum Communication; Dec2024, Vol. 5 Issue 4, p349-359, 11p |
| Témata: | LATTICE theory, CRYPTOGRAPHY, COMPUTER input-output equipment, POLYNOMIALS |
| Abstrakt: | Lattice‐based cryptography is one of the most promising cryptographic scheme which lies on the hardness of ring‐learning‐with‐error (RLWE). A new variant of RLWE, known as binary‐ring‐learning‐with‐error (BRLWE), has less key size and more efficient hardware implementations compared to RLWE‐based schemes. The key arithmetic operation for BRLWE‐based encryption scheme is the implementation of arithmetic operation represented by FD+H $FD+H$, where both F $F$ and H $H$ are integer polynomials, and D $D$ is a binary polynomial. An efficient architecture to perform the arithmetic operation FD+H $FD+H$ over a polynomial ring xn+1 ${x}^{n}+1$ is proposed. We employ two linear feedback shift register structures comprising x2 ${x}^{2}$‐net units in our design to reduce the computational time. This reduction in computational time yields to a significant improvement in the other performance metrics such as delay, area‐delay product (ADP), power‐delay product, throughput and efficiency compared to the existing designs. As per the experimental results, the authors' proposed design has 32% $32\%$ improvement in ADP when compared to the recently reported work. [ABSTRACT FROM AUTHOR] |
| Copyright of IET Quantum Communication is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Databáze: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=26328925&ISBN=&volume=5&issue=4&date=20241201&spage=349&pages=349-359&title=IET Quantum Communication&atitle=x2DL%3A%20A%20high%20throughput%20architecture%20for%20binary%E2%80%90ring%E2%80%90learning%E2%80%90with%E2%80%90error%E2%80%90based%20post%20quantum%20cryptography%20schemes.&aulast=Ahmadunnisa%2C%20Shaik&id=DOI:10.1049/qtc2.12110 Name: Full Text Finder Category: fullText Text: Full Text Finder Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif MouseOverText: Full Text Finder – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Ahmadunnisa%20S Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 187007613 RelevancyScore: 1007 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 1007.06323242188 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: x<superscript>2</superscript>DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Ahmadunnisa%2C+Shaik%22">Ahmadunnisa, Shaik</searchLink><br /><searchLink fieldCode="AR" term="%22Mathe%2C+Sudha+Ellison%22">Mathe, Sudha Ellison</searchLink> – Name: TitleSource Label: Source Group: Src Data: IET Quantum Communication; Dec2024, Vol. 5 Issue 4, p349-359, 11p – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22LATTICE+theory%22">LATTICE theory</searchLink><br /><searchLink fieldCode="DE" term="%22CRYPTOGRAPHY%22">CRYPTOGRAPHY</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+input-output+equipment%22">COMPUTER input-output equipment</searchLink><br /><searchLink fieldCode="DE" term="%22POLYNOMIALS%22">POLYNOMIALS</searchLink> – Name: Abstract Label: Abstract Group: Ab Data: Lattice‐based cryptography is one of the most promising cryptographic scheme which lies on the hardness of ring‐learning‐with‐error (RLWE). A new variant of RLWE, known as binary‐ring‐learning‐with‐error (BRLWE), has less key size and more efficient hardware implementations compared to RLWE‐based schemes. The key arithmetic operation for BRLWE‐based encryption scheme is the implementation of arithmetic operation represented by FD+H $FD+H$, where both F $F$ and H $H$ are integer polynomials, and D $D$ is a binary polynomial. An efficient architecture to perform the arithmetic operation FD+H $FD+H$ over a polynomial ring xn+1 ${x}^{n}+1$ is proposed. We employ two linear feedback shift register structures comprising x2 ${x}^{2}$‐net units in our design to reduce the computational time. This reduction in computational time yields to a significant improvement in the other performance metrics such as delay, area‐delay product (ADP), power‐delay product, throughput and efficiency compared to the existing designs. As per the experimental results, the authors' proposed design has 32% $32\%$ improvement in ADP when compared to the recently reported work. [ABSTRACT FROM AUTHOR] – Name: Abstract Label: Group: Ab Data: <i>Copyright of IET Quantum Communication is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=187007613 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1049/qtc2.12110 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 11 StartPage: 349 Subjects: – SubjectFull: LATTICE theory Type: general – SubjectFull: CRYPTOGRAPHY Type: general – SubjectFull: COMPUTER input-output equipment Type: general – SubjectFull: POLYNOMIALS Type: general Titles: – TitleFull: x2DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Ahmadunnisa, Shaik – PersonEntity: Name: NameFull: Mathe, Sudha Ellison IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 12 Text: Dec2024 Type: published Y: 2024 Identifiers: – Type: issn-print Value: 26328925 Numbering: – Type: volume Value: 5 – Type: issue Value: 4 Titles: – TitleFull: IET Quantum Communication Type: main |
| ResultId | 1 |
Full Text Finder
Nájsť tento článok vo Web of Science