Mobile QR Code QR CODE

References

1 
P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM J. Comput., vol. 26, pp. 1484-1509, Oct. 1997.URL
2 
National Institute of Standards and Technology, “PQC (Post-Quantum Cryptography) 3rd Round Submissions,” last modified June 14, 2021, accessed https://csrc.nist.gov/projects/post-quantum- cryptography/round-3-, Oct. 18. 2021.URL
3 
R. Avanzi, et. al. “CRYSTALS-Kyber Algorithm Specifications And Supporting Documentation (version 3.0),” NIST PQC Round 3 submission, Oct. 2020.URL
4 
National Institute of Standards and Technology, “Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process,” accessed https://doi.org/10.6028/NIST.IR.8413-upd1, July 2022.DOI
5 
O. Regev, “On lattices, learning with errors, random linear codes, and cryptography,” in Proceedings of the ACM Symposium on Theory of Computing, Baltimore, MD, USA, pp. 84-93, May. 2005.DOI
6 
V. Lyubashevsky, “On ideal lattices and learning with errors over rings,” Annual international conference on the theory and applications of cryptographic techniques, pp. 1-23, 2010.DOI
7 
Vitis High-Level Synthesis, “User Guide,” UG 1399, v2021.2, October 22, 2021.URL