Mobile QR Code QR CODE

REFERENCES

1 
Shor P. W., Feb 1997, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SILAM J. Computing, Vol. 26, No. 5, pp. 1484-1509Google Search
2 
Regev O., May 2005, On lattices, learning with errors, random linear codes, and cryptography, Annual ACM Symp. Theory of Computing, pp. 84-93DOI
3 
Tan T. N., Lee H., Feb 2019, High-secure fingerprint authentication system using ring-LWE crypto-graphy, IEEE Access, Vol. 7, No. 1, pp. 23379-23387DOI
4 
Chen D. D., Jan 2015, High-speed polynomial multiplication architecture for ring-LWE and SHE cryptosystems, IEEE Trans. Circuits Syst. I, Reg. Papers,, Vol. 62, No. 1, pp. 157-166DOI
5 
Rentería-Mejía C. P., Velasco-Medina J., 2014, Hardware design of an NTT-based polynomial multiplier, 2014 IX Southern Conf. Programmable Logic, Buenos Aires, pp. 1-5DOI
6 
Du C., Bai G., 2016, Efficient polynomial multiplier architecture for ring-LWE based public key cryptosystem, 2016 IEEE Int. Symp. Circuits Syst. (ISCAS2016), Montreal, QC, pp. 1162-1165DOI