We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 6,489 results
  1. Explicit construction of q+1 regular local Ramanujan graphs, for all prime-powers q

    A constant locality function is one in which each output bit depends on just a constant number of input bits. Viola and Wigderson (2018) gave an...

    Rishabh Batra, Nitin Saxena, Devansh Shringi in computational complexity
    Article 06 April 2023
  2. AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing

    We optimise the verification of the SQIsign signature scheme. By using field extensions in the signing procedure, we are able to significantly...
    Maria Corte-Real Santos, Jonathan Komada Eriksen, ... Krijn Reijnders in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  3. Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation

    Efficient computation of polynomial multiplication over characteristic three fields is required for post-quantum cryptographic applications which...

    Esra Yeniaras, Murat Cenk in Journal of Cryptographic Engineering
    Article 04 January 2022
  4. An Alternative Approach for SIDH Arithmetic

    In this paper, we present new algorithms for the field arithmetic layers of supersingular isogeny Diffie-Hellman; one of the fifteen remaining...
    Cyril Bouvier, Laurent Imbert in Public-Key Cryptography – PKC 2021
    Conference paper 2021
  5. E\({^2}\)CSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p)

    Elliptic curve scalar multiplication (ECSM) is the primitive operation that is also the main computational hurdle in almost all protocols based on...

    Khalid Javeed, Ali El-Moursy, David Gregg in The Journal of Supercomputing
    Article 22 June 2023
  6. Finite-Field Parallel Adder Circuit Over Prime Numbers Based on Spiking Neural P Systems

    Nowadays, the arithmetic operations precision is one of the most critical aspects in the development of efficient finite-field arithmetic circuits,...
    Emmanuel Tonatihu Juárez-Velázquez, Derlis Hernández-Lara, Carlos Alfonso Trejo-Villanueva in Advances in Soft Computing
    Conference paper 2021
  7. Improved Polynomial Multiplication Algorithms over Characteristic Three Fields and Applications to NTRU Prime

    This paper introduces a new polynomial multiplication algorithm which decreases the arithmetic complexity and another modified algorithm that speeds...
    Conference paper 2022
  8. Automated Verification of Correctness for Masked Arithmetic Programs

    Masking is a widely-used effective countermeasure against power side-channel attacks for implementing cryptographic algorithms. Surprisingly, few...
    Mingyang Liu, Fu Song, Taolue Chen in Computer Aided Verification
    Conference paper Open access 2023
  9. Lossless FFTs Using Posit Arithmetic

    The Fast Fourier Transform (FFT) is required for chemistry, weather, defense, and signal processing for seismic exploration and radio astronomy. It...
    Siew Hoon Leong, John L. Gustafson in Next Generation Arithmetic
    Conference paper 2023
  10. Efficient Extended GCD and Class Groups from Secure Integer Arithmetic

    In this paper we first present an efficient protocol for the secure computation of the extended greatest common divisor, assuming basic secure...
    Berry Schoenmakers, Toon Segers in Cyber Security, Cryptology, and Machine Learning
    Conference paper 2023
  11. Divisibility, Congruences, and Modular Arithmetic

    Modern cryptography is largely based on the mathematicals of modular arithmetic, congruences, and the arithmetic in the integers modulo prime numbers...
    Chapter 2021
  12. New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic

    In this paper we present a new class of protocols for the secure computation of the sine and cosine functions. The precision for the underlying...
    Stan Korzilius, Berry Schoenmakers in Cyber Security, Cryptology, and Machine Learning
    Conference paper 2023
  13. PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption

    A large part of current research in homomorphic encryption (HE) aims towards making HE practical for real-world applications. In any practical HE, an...
    Luke Harmon, Gaetan Delavignette, ... David Silva in Applied Cryptography and Network Security
    Conference paper 2023
  14. Second order arithmetic

    In the previous chapter, we discussed reducibility notions based on computability theory. Another method for comparing problems relies on...
    Damir D. Dzhafarov, Carl Mummert in Reverse Mathematics
    Chapter 2022
  15. Novel Feynman-Based Reversible and Fault-Tolerant Nano-communication Arithmetic Architecture Based on QCA Technology

    Quantum-dot cellular automata (QCA) has advantages such as low energy dissipation and high density as a suitable alternative to CMOS technology. The...

    Milad Bagherian Khosroshahy, Alireza Abdoli, Mohammad Mehdi Panahi in SN Computer Science
    Article 20 August 2021
  16. Lower Bounds for Arithmetic Circuits via the Hankel Matrix

    We study the complexity of representing polynomials by arithmetic circuits in both the commutative and the non-commutative settings. Our approach...

    Nathanaël Fijalkow, Guillaume Lagarde, ... Olivier Serre in computational complexity
    Article 08 October 2021
  17. MCSat-Based Finite Field Reasoning in the Yices2 SMT Solver (Short Paper)

    This system description introduces an enhancement to the Yices2 SMT solver, enabling it to reason over non-linear polynomial systems over finite...
    Thomas Hader, Daniela Kaufmann, ... Laura Kovács in Automated Reasoning
    Conference paper Open access 2024
  18. Basic Arithmetic Foundations

    In cryptography, the Integer Factorization Problem (IFP) has significant importance because many cryptosystems with public keys ground their security...
    Marius Iulian Mihailescu, Stefania Loredana Nita in Cryptography and Cryptanalysis in MATLAB
    Chapter 2021
  19. Montgomery Arithmetic over Gaussian Integers

    Up to now, we have demonstrated that Gaussian integers are suitable for RSA and ECC systems. Moreover, we have illustrated that performing complex...
    Chapter 2021
  20. Field Instruction Multiple Data

    Fully homomorphic encryption (FHE) has flourished since it was first constructed by Gentry (STOC 2009). Single instruction multiple data (SIMD) gave...
    Khin Mi Mi Aung, Enhui Lim, ... Sze Ling Yeo in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.