Low-cost implementations of NTRU for pervasive security
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design that is suitable for pervasive security applications such as RFIDs and sensor nodes. We have designed two architectures,...
Saved in:
| Published in | 2008 International Conference on Application-Specific Systems, Architectures and Processors pp. 79 - 84 |
|---|---|
| Main Authors | , , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.07.2008
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781424418978 1424418976 |
| ISSN | 1063-6862 |
| DOI | 10.1109/ASAP.2008.4580158 |
Cover
| Abstract | NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design that is suitable for pervasive security applications such as RFIDs and sensor nodes. We have designed two architectures, one is only capable of encryption and the other one performs both encryption and decryption. The strategy for the designs includes clock gating of registers, operand isolation and precomputation. This work is also the first one to present a complete NTRU design with encryption/decryption circuitry. Our encryption-only NTRU design has a gate-count of 2.8 kgates and dynamic power consumption of 1.72 muW. Moreover, encryption-decryption NTRU design consumes about 6 muW dynamic power and consists of 10.5 kgates. |
|---|---|
| AbstractList | NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design that is suitable for pervasive security applications such as RFIDs and sensor nodes. We have designed two architectures, one is only capable of encryption and the other one performs both encryption and decryption. The strategy for the designs includes clock gating of registers, operand isolation and precomputation. This work is also the first one to present a complete NTRU design with encryption/decryption circuitry. Our encryption-only NTRU design has a gate-count of 2.8 kgates and dynamic power consumption of 1.72 muW. Moreover, encryption-decryption NTRU design consumes about 6 muW dynamic power and consists of 10.5 kgates. |
| Author | Yalcin, S.B.O. Batina, L. Atici, A.C. Verbauwhede, I. Junfeng Fan |
| Author_xml | – sequence: 1 givenname: A.C. surname: Atici fullname: Atici, A.C. organization: Inst. of Sci. & Technol., Istanbul Tech. Univ., Istanbul – sequence: 2 givenname: L. surname: Batina fullname: Batina, L. – sequence: 3 surname: Junfeng Fan fullname: Junfeng Fan – sequence: 4 givenname: I. surname: Verbauwhede fullname: Verbauwhede, I. – sequence: 5 givenname: S.B.O. surname: Yalcin fullname: Yalcin, S.B.O. |
| BookMark | eNpVUNtKw0AUXLEFm9oPEF_2BxLP3s8-huINgoq2z2Ubd2GluZCNlf69AfvivAwzMMMwGZm1XesJuWFQMAb2rvwo3woOgIVUCEzhBVlZg0xyKRlaVJf_tMEZWTDQIteo-ZxkU9RYQOT2imQpfQFwIzQuiKm6n7zu0khj0x9849vRjbFrE-0Cfdm8b2noBtr74ehSPHqafP09xPF0TebBHZJfnXlJtg_3m_VTXr0-Pq_LKo_MqDFX6I01sJ-gJKJ2AaSzIWjnjNFOunraxRnC3jimJeOfGCDU2kqhJ0eIJbn9643e-10_xMYNp935BPELR7lMow |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ASAP.2008.4580158 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 9781424418985 1424418984 |
| EndPage | 84 |
| ExternalDocumentID | 4580158 |
| Genre | orig-research |
| GroupedDBID | 29P 6IE 6IK 6IL AAJGR AAWTH ADZIZ AFFNX ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IPLJI OCL RIE RIL RNS |
| ID | FETCH-LOGICAL-i175t-58e7970bbbb54886af04a9ff6aa776a4ac0792180b7a16412d8f0fc694367a133 |
| IEDL.DBID | RIE |
| ISBN | 9781424418978 1424418976 |
| ISSN | 1063-6862 |
| IngestDate | Wed Aug 27 02:23:08 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2007908829 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-58e7970bbbb54886af04a9ff6aa776a4ac0792180b7a16412d8f0fc694367a133 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_4580158 |
| PublicationCentury | 2000 |
| PublicationDate | 2008-July |
| PublicationDateYYYYMMDD | 2008-07-01 |
| PublicationDate_xml | – month: 07 year: 2008 text: 2008-July |
| PublicationDecade | 2000 |
| PublicationTitle | 2008 International Conference on Application-Specific Systems, Architectures and Processors |
| PublicationTitleAbbrev | ASAP |
| PublicationYear | 2008 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0027368 ssj0000453411 |
| Score | 1.5163463 |
| Snippet | NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 79 |
| SubjectTerms | Clocks Computer architecture Cryptography Logic gates Polynomials Power demand Registers |
| Title | Low-cost implementations of NTRU for pervasive security |
| URI | https://ieeexplore.ieee.org/document/4580158 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JTwIxFG6Qk15cwLinB48WOkyny5EYCTFCiELCjbSlTYiRITLExF_v6yygxoNzaGZ6mWmn7du-7z2EbhPpO456SjqOGQIrhBFpoRGcGulsIuY5mnAw5P0Je5wm0xq623JhnHM5-My1wm0ey5-ndhNcZW2WwHmayD20JyQvuFpbfwqoJnAgRztjKy5pcDwmgQVRkboiCQK4yvVUPssy3BlR1e6-dEcFxLJ824-yK7nU6R2iQfW9BdjktbXJTMt-_krl-N8BHaHmjt-HR1vJdYxqbnmCDr6lJmwg8ZR-EJuuM7x4qyDm-RLFqcfD8fMEg7aLV8GlGwDweF3WwWuiSe9hfN8nZZEFsgDNISOJdEIJauAC40Vy7SnTynuutRBcM22pUKAHUCM0mFZRZy499ZYrFnPoieNTVF-mS3eGsApRT9jgxgrOEko1ZUzHVkdWGSOMO0eNMAWzVZFHY1aO_uLv7ku0X2AzAjT2CtWz9427BgUgMzf5n_8CLTem6A |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BPKgXP8D4bQ8eHXSsXzsSI0EFQhQSbqQtbUKMjMiIiX-97TZAjQd3aLZeti6vfV-_33sAN1TYhsEWBw1DVOAkhARCu4EzrITRlE8yNGG3x9pD8jiioxLcrrkwxpgMfGZq_jbL5U8SvfShsjqh7jylYgu2KSGE5mytdUTFGSfuSA437lZUEOFYFHgexIrWFQqnglfVnopnUSQ8QxzXmy_Nfg6yLN73o_FKpnda-9BdfXEON3mtLVNV05-_ijn-d0kHUN0w_FB_rbsOoWRmR7D3rThhBXgn-Qh0skjR9G0FMs-EFCUW9QbPQ-TsXTT3QV0PgUeLohNeFYat-8FdOyjaLARTZzukARWGxxwrdzn3RTBpMZGxtUxKzpkkUmMeO0sAKy6dcxU2JsJiq1lMIuZmougYyrNkZk4AxT7v6ba40pwRirHEhMhIy1DHSnFlTqHif8F4nlfSGBerP_t7-hp22oNuZ9x56D2dw26O1PBA2Qsop-9Lc-nMgVRdZVLwBSUdqjU |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2008+International+Conference+on+Application-Specific+Systems%2C+Architectures+and+Processors&rft.atitle=Low-cost+implementations+of+NTRU+for+pervasive+security&rft.au=Atici%2C+A.C.&rft.au=Batina%2C+L.&rft.au=Junfeng+Fan&rft.au=Verbauwhede%2C+I.&rft.date=2008-07-01&rft.pub=IEEE&rft.isbn=9781424418978&rft.issn=1063-6862&rft.spage=79&rft.epage=84&rft_id=info:doi/10.1109%2FASAP.2008.4580158&rft.externalDocID=4580158 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6862&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6862&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6862&client=summon |