Publication:
Compact and Simple RLWE-Based Key Encapsulation Mechanism

dc.authorscopusid43261000900
dc.authorscopusid57211169344
dc.authorscopusid6504402955
dc.authorwosidAlkim, Erdem/Jzu-0054-2024
dc.authorwosidCenk, Murat/Agu-7577-2022
dc.contributor.authorAlkim, Erdem
dc.contributor.authorBilgin, Yusuf Alper
dc.contributor.authorCenk, Murat
dc.contributor.authorIDCenk, Murat/0000-0003-4941-8734
dc.contributor.authorIDAlkim, Erdem/0000-0003-4638-2422
dc.date.accessioned2020-06-21T09:05:55Z
dc.date.available2020-06-21T09:05:55Z
dc.date.issued2019
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Alkim, Erdem] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkey; [Bilgin, Yusuf Alper] Aselsan Inc, Ankara, Turkey; [Bilgin, Yusuf Alper; Cenk, Murat] Middle East Tech Univ, Inst Appl Math, Ankara, Turkeyen_US
dc.descriptionCenk, Murat/0000-0003-4941-8734; Alkim, Erdem/0000-0003-4638-2422;en_US
dc.description.abstractIn this paper, we propose a key encapsulation scheme based on NewHope and Kyber, two NIST post-quantum standardization project candidates. Our scheme is based on NewHope, thus it is simple and has fast implementation while it is making use of smaller key sizes and easily changeable security level advantages of Kyber. The scheme heavily use recent advances on Number Theoretic Transform (NTT) in a way that transformation from one degree polynomial to another is easy. To make it possible, we changed the definition of component in component-wise multiplication during polynomial multiplication and show that changing security level only requires to change the size of polynomial and the definition of component. Our scheme has 11.5% smaller communication cost for the same security level comparing with NewHope. In addition, it is at least 17% faster C implementation comparing with non-optimized Kyber implementation from the first round of the NIST standardization process.en_US
dc.description.woscitationindexConference Proceedings Citation Index - Science
dc.identifier.doi10.1007/978-3-030-30530-7_12
dc.identifier.endpage256en_US
dc.identifier.isbn9783030305307
dc.identifier.isbn9783030305291
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.scopus2-s2.0-85072850891
dc.identifier.scopusqualityQ3
dc.identifier.startpage237en_US
dc.identifier.urihttps://doi.org/10.1007/978-3-030-30530-7_12
dc.identifier.volume11774en_US
dc.identifier.wosWOS:000568097000012
dc.language.isoenen_US
dc.publisherSpringer International Publishing AGen_US
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.relation.ispartofseriesLecture Notes in Computer Science
dc.relation.journalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectPost-Quantum Key Encapsulationen_US
dc.subjectLattice-Based Cryptographyen_US
dc.subjectRLWEen_US
dc.subjectNTTen_US
dc.titleCompact and Simple RLWE-Based Key Encapsulation Mechanismen_US
dc.typeConference Objecten_US
dspace.entity.typePublication

Files