-
1
-
-
0015965118
-
Fast convolution using fermat number transforms with applications to digital filtering
-
Agarwal, R., Burrus, C.: Fast convolution using fermat number transforms with applications to digital filtering. IEEE Transactions on Acoustics, Speech and Signal Processing 22(2), 87-97 (1974)
-
(1974)
IEEE Transactions on Acoustics, Speech and Signal Processing
, vol.22
, Issue.2
, pp. 87-97
-
-
Agarwal, R.1
Burrus, C.2
-
3
-
-
78449233506
-
SWIFFTX: A proposal for the SHA-3 standard
-
Submission to
-
Arbitman, Y., Dogon, G., Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: SWIFFTX: A proposal for the SHA-3 standard. Submission to NIST (2008)
-
(2008)
NIST
-
-
Arbitman, Y.1
Dogon, G.2
Lyubashevsky, V.3
Micciancio, D.4
Peikert, C.5
Rosen, A.6
-
4
-
-
51649129069
-
Low-cost implementations of NTRU for pervasive security
-
IEEE
-
Atici, A.C., Batina, L., Fan, J., Verbauwhede, I., Yalcin, S.B.O.: Low-cost implementations of NTRU for pervasive security. In: International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2008, pp. 79-84. IEEE (2008)
-
(2008)
International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2008
, pp. 79-84
-
-
Atici, A.C.1
Batina, L.2
Fan, J.3
Verbauwhede, I.4
Yalcin, S.B.O.5
-
5
-
-
84944878686
-
NTRU in Constrained Devices
-
Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. Springer, Heidelberg
-
Bailey, D.V., Coffin, D., Elbirt, A., Silverman, J.H., Woodbury, A.D.: NTRU in Constrained Devices. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 262-272. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2162
, pp. 262-272
-
-
Bailey, D.V.1
Coffin, D.2
Elbirt, A.3
Silverman, J.H.4
Woodbury, A.D.5
-
6
-
-
35348824919
-
A state-of-the-art elliptic curve cryptographic processor operating in the frequency domain
-
Baktir, S., Kumar, S., Paar, C., Sunar, B.: A state-of-the-art elliptic curve cryptographic processor operating in the frequency domain. Mob. Netw. Appl. 12(4), 259-270 (2007)
-
(2007)
Mob. Netw. Appl.
, vol.12
, Issue.4
, pp. 259-270
-
-
Baktir, S.1
Kumar, S.2
Paar, C.3
Sunar, B.4
-
7
-
-
34248351922
-
Achieving efficient polynomial multiplication in fermat fields using the fast fourier transform
-
ACM, New York
-
Baktir, S., Sunar, B.: Achieving efficient polynomial multiplication in fermat fields using the fast fourier transform. In: Proceedings of the 44th Annual Southeast Regional Conference, ACM-SE 44, pp. 549-554. ACM, New York (2006)
-
(2006)
Proceedings of the 44th Annual Southeast Regional Conference, ACM-SE 44
, pp. 549-554
-
-
Baktir, S.1
Sunar, B.2
-
8
-
-
0014521742
-
Fast fourier transform hardware implementations-an overview
-
Bergland, G.: Fast fourier transform hardware implementations-an overview. IEEE Transactions on Audio and Electroacoustics 17(2), 104-108 (1969)
-
(1969)
IEEE Transactions on Audio and Electroacoustics
, vol.17
, Issue.2
, pp. 104-108
-
-
Bergland, G.1
-
9
-
-
70350258302
-
Fast multiplication and its applications
-
Bernstein, D.J.: Fast multiplication and its applications. Algorithmic Number Theory 44, 325-384 (2008)
-
(2008)
Algorithmic Number Theory
, vol.44
, pp. 325-384
-
-
Bernstein, D.J.1
-
11
-
-
84864712134
-
Fully homomorphic encryption without bootstrapping
-
Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. In: Electronic Colloquium on Computational Complexity (ECCC), vol. 18, p. 111 (2011)
-
(2011)
Electronic Colloquium on Computational Complexity (ECCC)
, vol.18
, pp. 111
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
12
-
-
33748538996
-
Perspectives for cryptographic long-term security
-
Buchmann, J., May, A., Vollmer, U.: Perspectives for cryptographic long-term security. Communications of the ACM 49(9), 50-55 (2006)
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 50-55
-
-
Buchmann, J.1
May, A.2
Vollmer, U.3
-
13
-
-
77649240179
-
Secure Parameters for SWIFFT
-
Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
-
Buchmann, J., Lindner, R.: Secure Parameters for SWIFFT. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 1-17. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5922
, pp. 1-17
-
-
Buchmann, J.1
Lindner, R.2
-
14
-
-
33751314100
-
Efficient FPGA implementation of FFT based multipliers
-
IEEE
-
Cheng, L.S., Miri, A., Yeap, T.H.: Efficient FPGA implementation of FFT based multipliers. In: Canadian Conference on Electrical and Computer Engineering, pp. 1300-1303. IEEE (2005)
-
(2005)
Canadian Conference on Electrical and Computer Engineering
, pp. 1300-1303
-
-
Cheng, L.S.1
Miri, A.2
Yeap, T.H.3
-
15
-
-
84968470212
-
An algorithm for the machine calculation of complex fourier series
-
Cooley, J.W., Tukey, J.W.: An algorithm for the machine calculation of complex fourier series. Math. Comput 19(90), 297-301 (1965)
-
(1965)
Math. Comput
, vol.19
, Issue.90
, pp. 297-301
-
-
Cooley, J.W.1
Tukey, J.W.2
-
16
-
-
0004116989
-
-
3rd edn. The MIT Press July
-
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. The MIT Press (July 2009)
-
(2009)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
17
-
-
84856861552
-
Hardware design of a 256-bit prime field multiplier suitable for computing bilinear pairings
-
IEEE
-
Corona, C.C., Moreno, E.F., Henriquez, F.R., et al.: Hardware design of a 256-bit prime field multiplier suitable for computing bilinear pairings. In: 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig), pp. 229-234. IEEE (2011)
-
(2011)
2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig)
, pp. 229-234
-
-
Corona, C.C.1
Moreno, E.F.2
Henriquez, F.R.3
-
18
-
-
33847792614
-
Comparison of FPGA implementation of the mod M reduction
-
Deschamps, J.P., Sutter, G.: Comparison of FPGA implementation of the mod M reduction. Latin American Applied Research 37(1), 93-97 (2007)
-
(2007)
Latin American Applied Research
, vol.37
, Issue.1
, pp. 93-97
-
-
Deschamps, J.P.1
Sutter, G.2
-
19
-
-
80055016220
-
Implementation of an Ultra-High Speed 256-Point FFT for Xilinx Virtex-6 Devices
-
July
-
Dreschmann, M., Meyer, J., Huebner, M., Schmogrow, R., Hillerkuss, D., Becker, J., Leuthold, J., Freude, W.: Implementation of an Ultra-High Speed 256-Point FFT for Xilinx Virtex-6 Devices. In: 2011 9th IEEE International Conference on Industrial Informatics (INDIN), pp. 829-834 (July 2011)
-
(2011)
2011 9th IEEE International Conference on Industrial Informatics (INDIN)
, pp. 829-834
-
-
Dreschmann, M.1
Meyer, J.2
Huebner, M.3
Schmogrow, R.4
Hillerkuss, D.5
Becker, J.6
Leuthold, J.7
Freude, W.8
-
20
-
-
70350648821
-
Efficient Multiplication of Polynomials on Graphics Hardware
-
Dou, Y., Gruber, R., Joller, J.M. (eds.) APPT 2009. Springer, Heidelberg
-
Emeliyanenko, P.: Efficient Multiplication of Polynomials on Graphics Hardware. In: Dou, Y., Gruber, R., Joller, J.M. (eds.) APPT 2009. LNCS, vol. 5737, pp. 134-149. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5737
, pp. 134-149
-
-
Emeliyanenko, P.1
-
23
-
-
79959966072
-
Hardware efficient design of variable length FFT processor
-
April
-
Gautam, V., Ray, K.C., Haddow, P.: Hardware efficient design of variable length FFT processor. In: 2011 IEEE 14th International Symposium on Design and Diagnostics of Electronic Circuits Systems (DDECS), pp. 309-312 (April 2011)
-
(2011)
2011 IEEE 14th International Symposium on Design and Diagnostics of Electronic Circuits Systems (DDECS)
, pp. 309-312
-
-
Gautam, V.1
Ray, K.C.2
Haddow, P.3
-
25
-
-
84865663852
-
Homomorphic evaluation of the AES circuit
-
ePrint Archive
-
Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. IACR Cryptology ePrint Archive, 2012:99 (2012)
-
(2012)
IACR Cryptology
, vol.2012
, pp. 99
-
-
Gentry, C.1
Halevi, S.2
Smart, N.P.3
-
26
-
-
85061201056
-
On the design of hardware building blocks for modern lattice-based encryption schemes
-
Göttert, N., Feller, T., Schneider, M., Huss, S.A., Buchmann, J.: On the design of hardware building blocks for modern lattice-based encryption schemes. In: Cryptographic Hardware and Embedded Systems-CHES 2012 (2012)
-
(2012)
Cryptographic Hardware and Embedded Systems-CHES 2012
-
-
Göttert, N.1
Feller, T.2
Schneider, M.3
Huss, S.A.4
Buchmann, J.5
-
28
-
-
51049102787
-
Ultra High Performance ECC over NIST Primes on Commercial FPGAs
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
-
Güneysu, T., Paar, C.: Ultra High Performance ECC over NIST Primes on Commercial FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 62-78. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 62-78
-
-
Güneysu, T.1
Paar, C.2
-
29
-
-
84871531301
-
High-throughput hardware architecture for the SWIFFT / SWIFFTX hash functions
-
ePrint Archive
-
Györfi, T., Cret, O., Hanrot, G., Brisebarre, N.: High-throughput hardware architecture for the SWIFFT / SWIFFTX hash functions. In: IACR Cryptology ePrint Archive, 2012:343 (2012)
-
(2012)
IACR Cryptology
, vol.2012
, pp. 343
-
-
Györfi, T.1
Cret, O.2
Hanrot, G.3
Brisebarre, N.4
-
30
-
-
84947808606
-
NTRU: A ring-based public key cryptosystem
-
Hoffstein, J., Pipher, J., Silverman, J.: NTRU: A ring-based public key cryptosystem. Algorithmic Number Theory, 267-288 (1998)
-
(1998)
Algorithmic Number Theory
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.3
-
32
-
-
0001464763
-
Multiplication of multidigit numbers on automata
-
Karatsuba, A., Ofman, Y.: Multiplication of multidigit numbers on automata. Soviet Physics Doklady 7, 595 (1963)
-
(1963)
Soviet Physics Doklady
, vol.7
, pp. 595
-
-
Karatsuba, A.1
Ofman, Y.2
-
33
-
-
79951793525
-
Better Key Sizes (and Attacks) for LWE-Based Encryption
-
Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
-
Lindner, R., Peikert, C.: Better Key Sizes (and Attacks) for LWE-Based Encryption. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 319-339. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6558
, pp. 319-339
-
-
Lindner, R.1
Peikert, C.2
-
34
-
-
40249086645
-
Lattice-Based Identification Schemes Secure under Active Attacks
-
Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
-
Lyubashevsky, V.: Lattice-Based Identification Schemes Secure Under Active Attacks. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 162-179. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4939
, pp. 162-179
-
-
Lyubashevsky, V.1
-
35
-
-
33746342484
-
Generalized Compact Knapsacks Are Collision Resistant
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D.: Generalized Compact Knapsacks Are Collision Resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 144-155. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 144-155
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
36
-
-
77954639468
-
On Ideal Lattices and Learning with Errors over Rings
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 1-23
-
-
Lyubashevsky, V.1
Peikert, C.2
Regev, O.3
-
37
-
-
72449144658
-
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Lyubashevsky, V.: Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 598-616. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 598-616
-
-
Lyubashevsky, V.1
-
38
-
-
84859986507
-
Lattice Signatures without Trapdoors
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
Lyubashevsky, V.: Lattice Signatures without Trapdoors. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 738-755. Springer, Heidelberg (2012)
-
LNCS
, vol.7237
, Issue.2012
, pp. 738-755
-
-
Lyubashevsky, V.1
-
39
-
-
50249148926
-
SWIFFT: A Modest Proposal for FFT Hashing
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: SWIFFT: A Modest Proposal for FFT Hashing. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 54-72. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 54-72
-
-
Lyubashevsky, V.1
Micciancio, D.2
Peikert, C.3
Rosen, A.4
-
40
-
-
77954639468
-
On Ideal Lattices and Learning with Errors over Rings
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 1-23
-
-
Lyubashevsky, V.1
Peikert, C.2
Regev, O.3
-
41
-
-
38749089099
-
Generalized compact knapsacks, cyclic lattices, and efficient oneway functions
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions. Computational Complexity 16(4), 365-411 (2007)
-
(2007)
Computational Complexity
, vol.16
, Issue.4
, pp. 365-411
-
-
Micciancio, D.1
-
43
-
-
80955157888
-
Can homomorphic encryption be practical?
-
ACM, New York
-
Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACMWorkshop on Cloud Computing Security Workshop, CCSW 2011, pp. 113-124. ACM, New York (2011)
-
(2011)
Proceedings of the 3rd ACMWorkshop on Cloud Computing Security Workshop, CCSW 2011
, pp. 113-124
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
44
-
-
0001316941
-
An adaptation of the fast fourier transform for parallel processing
-
Pease, M.C.: An adaptation of the fast fourier transform for parallel processing. J. ACM 15(2), 252-264 (1968)
-
(1968)
J. ACM
, vol.15
, Issue.2
, pp. 252-264
-
-
Pease, M.C.1
-
45
-
-
0037236535
-
Rapid multiplication modulo the sum and difference of highly composite numbers
-
Percival, C.: Rapid multiplication modulo the sum and difference of highly composite numbers. Mathematics of Computation 72(241), 387-396 (2003)
-
(2003)
Mathematics of Computation
, vol.72
, Issue.241
, pp. 387-396
-
-
Percival, C.1
-
46
-
-
84968484267
-
The fast fourier transform in a finite field
-
Pollard, J.M.: The fast fourier transform in a finite field. Mathematics of Computation 25(114), 365-374 (1971)
-
(1971)
Mathematics of Computation
, vol.25
, Issue.114
, pp. 365-374
-
-
Pollard, J.M.1
-
47
-
-
0015482478
-
Discrete convolutions via mersenne transforms
-
Rader, C.M.: Discrete convolutions via mersenne transforms. IEEE Transactions on Computers 100(12), 1269-1273 (1972)
-
(1972)
IEEE Transactions on Computers
, vol.100
, Issue.12
, pp. 1269-1273
-
-
Rader, C.M.1
-
48
-
-
33745571012
-
On lattices, learning with errors, random linear codes, and cryptography
-
ACM Press
-
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: STOC 2005: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, Maryland, USA, May 22-24, p. 84. ACM Press (2005)
-
(2005)
STOC 2005: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, Maryland, USA, May 22-24
, pp. 84
-
-
Regev, O.1
-
49
-
-
77955253445
-
The learning with errors problem
-
Regev, O.: The learning with errors problem. Invited Survey in CCC (2010)
-
(2010)
Invited Survey in CCC
-
-
Regev, O.1
-
50
-
-
80052005297
-
Estimating the security of lattice-based cryptosystems
-
ePrint Archive, Report 2010/137
-
Rückert, M., Schneider, M.: Estimating the security of lattice-based cryptosystems. Cryptology ePrint Archive, Report 2010/137 (2010), http://eprint.iacr.org/
-
(2010)
Cryptology
-
-
Rückert, M.1
Schneider, M.2
-
51
-
-
34250459760
-
Schnelle Multiplikation Grosser Zahlen
-
Schönhage, A., Strassen, V.: Schnelle Multiplikation Grosser Zahlen. Computing 7(3), 281-292 (1971)
-
(1971)
Computing
, vol.7
, Issue.3
, pp. 281-292
-
-
Schönhage, A.1
Strassen, V.2
-
52
-
-
85115374351
-
Algorithms for quantum computation: Discrete logarithms and factoring
-
IEEE Computer Society Press, Los Alamitos
-
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 1994 Proceedings of 35th Annual Symposium on Foundations of Computer Science, pp. 124-134. IEEE Computer Society Press, Los Alamitos (1994)
-
(1994)
1994 Proceedings of 35th Annual Symposium on Foundations of Computer Science
, pp. 124-134
-
-
Shor, P.W.1
-
54
-
-
79958014767
-
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Stehlé, D., Steinfeld, R.: Making NTRU as Secure as Worst-Case Problems Over Ideal Lattices. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 27-47. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 27-47
-
-
Stehlé, D.1
Steinfeld, R.2
-
55
-
-
62349090509
-
A family of scalable FFT architectures and an implementation of 1024-point radix-2 FFT for real-time communications
-
October
-
Suleiman, A., Saleh, H., Hussein, A., Akopian, D.: A family of scalable FFT architectures and an implementation of 1024-point radix-2 FFT for real-time communications. In: IEEE International Conference on Computer Design, ICCD 2008, pp. 321-327 (October 2008)
-
(2008)
IEEE International Conference on Computer Design, ICCD 2008
, pp. 321-327
-
-
Suleiman, A.1
Saleh, H.2
Hussein, A.3
Akopian, D.4
-
58
-
-
47649084341
-
Efficient memory-based FFT processors for OFDM applications
-
May
-
Wey, C.-L., Lin, S.-Y., Tang, W.-C.: Efficient memory-based FFT processors for OFDM applications. In: 2007 IEEE International Conference on Electro/Information Technology, pp. 345-350 (May 2007)
-
(2007)
2007 IEEE International Conference on Electro/Information Technology
, pp. 345-350
-
-
Wey, C.-L.1
Lin, S.-Y.2
Tang, W.-C.3
|