Lattice-based public-key cryptography in hardware / Sujoy Sinha Roy, Ingrid Verbauwhede.

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It in...

Full description

Saved in:
Bibliographic Details
Main Authors: Sinha Roy, Sujoy (Author), Verbauwhede, Ingrid (Author)
Format: eBook
Language:English
Published: Singapore : Springer, [2020]
Series:Computer architecture and design methodologies,
Subjects:
Online Access:Click for online access
Table of Contents:
  • Intro; Book_BookNotesTitle_1; Journals; Conferences and Workshops; Contents; Abbreviations; List of Figures; List of Tables; 1 Introduction; 1.1 Summary of the Book; References; 2 Background; 2.1 Introduction to Public-Key Cryptography; 2.1.1 The Elliptic-Curve Discrete Logarithm Problem; 2.1.2 Lattice Problems; 2.2 Elliptic-Curve Cryptography over mathbbF2m; 2.2.1 Koblitz Curves; 2.3 Primitives for Arithmetic in mathbbF2m; 2.3.1 Reduction; 2.3.2 Multiplication; 2.3.3 Squaring; 2.3.4 Inversion; 2.4 Ring-LWE-Based Cryptography; 2.4.1 The LPR Public-Key Encryption Scheme
  • 4.3.3 Storing the Probability Matrix Efficiently4.3.4 Fast Sampling Using a Lookup Table; 4.4 The Sampler Architecture; 4.4.1 The Bit-Scanning Unit; 4.4.2 Row-Number and Column-Length Counters; 4.4.3 The Distance Counter; 4.4.4 The Lookup Table for Fast Sampling; 4.5 Timing and Simple Power Analysis; 4.5.1 Strategies to Mitigate the Side-Channel Leakage; 4.5.2 Efficient Implementation of the Random Shuffling; 4.6 Experimental Results; 4.7 Summary; References; 5 Ring-LWE Public Key Encryption Processor; 5.1 Introduction; 5.2 Polynomial Multiplication; 5.3 Optimization of the NTT Computation
  • Appendix B Implementation of Operations Used by Algorithm 6Appendix Curriculum Vitae; Appendix References