Number theoretic transform: generalization, optimization, concrete analysis and applications
From MaRDI portal
Publication:2057175
DOI10.1007/978-3-030-71852-7_28zbMath1479.94210OpenAlexW3137525851MaRDI QIDQ2057175
Guoyun Zhang, Dongni Sun, Shiyu Shen, Yunlei Zhao, Zhichuang Liang, Zhixiang Zhao, Yuantao Shi, Chongxuan Zhang
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-71852-7_28
latticeapplied cryptographykey encapsulation mechanismnumber theoretic transformimplementations of cryptosystemspractical post-quantum security
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- Compact and simple RLWE based key encapsulation mechanism
- Preprocess-then-NTT Technique and its applications to Kyber and NewHope
- An Algorithm for the Machine Calculation of Complex Fourier Series
- On the Minimum Computation Time of Functions
This page was built for publication: Number theoretic transform: generalization, optimization, concrete analysis and applications