Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Algorithmic Views of Vectorized Polynomial Multipliers – NTRU Prime

    In this paper, we explore the cost of vectorization for multiplying polynomials with coefficients in \(\mathbb {{Z}}_q\) ...

    Vincent Hwang, Chi-Ting Liu, Bo-Yin Yang in Applied Cryptography and Network Security (2024)

  2. No Access

    Chapter and Conference Paper

    Algorithmic Views of Vectorized Polynomial Multipliers – NTRU

    The lattice-based post-quantum cryptosystem NTRU is used by Google for protecting Google’s internal communication. In NTRU, polynomial multiplication is one of bottleneck. In this paper, we explore the interac...

    Han-Ting Chen, Yi-Hua Chung, Vincent Hwang in Progress in Cryptology – INDOCRYPT 2023 (2024)

  3. Article

    Open Access

    Streamlined NTRU Prime on FPGA

    We present a novel full hardware implementation of Streamlined NTRU Prime, with two variants: a high-speed, high-area implementation and a slower, low-area implementation. We introduce several new techniques t...

    Bo-Yuan Peng, Adrian Marotzke, Ming-Han Tsai in Journal of Cryptographic Engineering (2023)

  4. Chapter and Conference Paper

    CoqCryptoLine: A Verified Model Checker with Certified Results

    We present the verified model checker CoqCryptoLine for cryptographic programs with certified verification results. The CoqCryptoLine verification algorithm consists of two reductions. The algebraic reduction tra...

    Ming-Hsien Tsai, Yu-Fu Fu, Jiaxiang Liu, **aomu Shi in Computer Aided Verification (2023)

  5. Chapter and Conference Paper

    Correction to: CoqCryptoLine: A Verified Model Checker with Certified Results

    Ming-Hsien Tsai, Yu-Fu Fu, Jiaxiang Liu, **aomu Shi in Computer Aided Verification (2023)

  6. Chapter and Conference Paper

    Certified Verification for Algebraic Abstraction

    We present a certified algebraic abstraction technique for verifying bit-accurate non-linear integer computations. In algebraic abstraction, programs are lifted to polynomial equations in the abstract domain. ...

    Ming-Hsien Tsai, Yu-Fu Fu, Jiaxiang Liu, **aomu Shi in Computer Aided Verification (2023)

  7. No Access

    Chapter and Conference Paper

    Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms

    Conventional wisdom purports that FFT-based integer multiplication methods (such as the Schönhage–Strassen algorithm) begin to compete with Karatsuba and Toom–Cook only for integers of several tens of thousand...

    Hanno Becker, Vincent Hwang in Advances in Information and Computer Secur… (2022)

  8. No Access

    Chapter and Conference Paper

    Secure Boolean Masking of Gimli

    Gimli is a highly secure permutation with high performance across a broad range of platforms. However, side-channel analysis poses a threat to the Gimli without any masking protection. To resist side-channel anal...

    Tzu-Hsien Chang, Yen-Ting Kuo, Jiun-Peng Chen in Information and Communications Security (2022)

  9. No Access

    Chapter and Conference Paper

    Verifying Post-Quantum Signatures in 8 kB of RAM

    In this paper, we study implementations of post-quantum signature schemes on resource-constrained devices. We focus on verification of signatures and cover NIST PQC round-3 candidates Dilithium, Falcon, Rainbo...

    Ruben Gonzalez, Andreas Hülsing, Matthias J. Kannwischer in Post-Quantum Cryptography (2021)

  10. Chapter and Conference Paper

    The Nested Subset Differential Attack

    In 2017, Ward Beullens et al. submitted Lifted Unbalanced Oil and Vinegar [3], which is a modification to the Unbalanced Oil and Vinegar Scheme by Patarin. Previously, Ding et al. proposed the Subfield Differenti...

    **tai Ding, Joshua Deaton, Vishakha in Advances in Cryptology – EUROCRYPT 2021 (2021)

  11. Chapter and Conference Paper

    CoqQFBV: A Scalable Certified SMT Quantifier-Free Bit-Vector Solver

    We present a certified SMT  QF_BV solver CoqQFBV built from a verified bit blasting algorithm, Kissat, and the verified SAT certificate checker GratChk in this paper. Our verified bit blasting algorithm supports ...

    **aomu Shi, Yu-Fu Fu, Jiaxiang Liu, Ming-Hsien Tsai in Computer Aided Verification (2021)

  12. No Access

    Chapter and Conference Paper

    Implementing Joux-Vitse’s Crossbred Algorithm for Solving \({\mathcal M\mathcal Q}\) Systems over \({\mathbb F}_2\) on GPUs

    The hardness of solving multivariate quadratic ( \(\mathcal {MQ}\) ) systems is the underlying problem for mu...

    Ruben Niederhagen, Kai-Chun Ning, Bo-Yin Yang in Post-Quantum Cryptography (2018)

  13. No Access

    Chapter and Conference Paper

    Asymptotically Faster Quantum Algorithms to Solve Multivariate Quadratic Equations

    This paper designs and analyzes a quantum algorithm to solve a system of m quadratic equations in n variables over a finite field ...

    Daniel J. Bernstein, Bo-Yin Yang in Post-Quantum Cryptography (2018)

  14. No Access

    Chapter and Conference Paper

    HMFEv - An Efficient Multivariate Signature Scheme

    Multivariate Cryptography, as one of the main candidates for establishing post-quantum cryptosystems, provides strong, efficient and well-understood digital signature schemes such as UOV, Rainbow, and Gui. Whi...

    Albrecht Petzoldt, Ming-Shing Chen, **tai Ding, Bo-Yin Yang in Post-Quantum Cryptography (2017)

  15. No Access

    Chapter and Conference Paper

    Gauss Sieve Algorithm on GPUs

    Lattice-based cryptanalysis is an important field in cryptography since lattice problems are among the most robust assumptions, and have been used to construct most cryptographic primitives. In this research, ...

    Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang in Topics in Cryptology – CT-RSA 2017 (2017)

  16. No Access

    Book and Conference Proceedings

    Public-Key Cryptography – PKC 2016

    19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I

    Chen-Mou Cheng, Kai-Min Chung in Lecture Notes in Computer Science (2016)

  17. No Access

    Book and Conference Proceedings

    Public-Key Cryptography – PKC 2016

    19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II

    Chen-Mou Cheng, Kai-Min Chung in Lecture Notes in Computer Science (2016)

  18. No Access

    Chapter and Conference Paper

    Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation

    Elliptic Curve Cryptography is gaining popularity, and optimization opportunities exist on several different levels: algorithm, architecture, and/or implementation. To support a wide variety of curves and at t...

    Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh in Cryptology and Network Security (2016)

  19. No Access

    Chapter and Conference Paper

    A Memory Efficient Variant of an Implementation of the F \(_4\) Algorithm for Computing Gröbner Bases

    Solving multivariate systems of polynomial equations is an important problem both as a subroutine in many problems and in its own right. Currently, the most efficient solvers are the Gröbner-basis solvers, whi...

    Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang in Trusted Systems (2015)

  20. No Access

    Chapter and Conference Paper

    Tuning GaussSieve for Speed

    The area of lattice-based cryptography is growing ever-more prominent as a paradigm for quantum-resistant cryptography. One of the most important hard problem underpinning the security of lattice-based cryptos...

    Robert Fitzpatrick, Christian Bischof in Progress in Cryptology - LATINCRYPT 2014 (2015)

previous disabled Page of 3