Detail View

Fast polynomial inversion algorithms for the post-quantum cryptography
Citations

WEB OF SCIENCE

Citations

SCOPUS

Metadata Downloads

DC Field Value Language
dc.contributor.author Seo, Eun-Young -
dc.contributor.author Kim, Young-Sik -
dc.contributor.author No, Jong-Seon -
dc.date.accessioned 2025-09-15T20:10:10Z -
dc.date.available 2025-09-15T20:10:10Z -
dc.date.created 2025-09-05 -
dc.date.issued 2025-09 -
dc.identifier.issn 2190-8508 -
dc.identifier.uri https://scholar.dgist.ac.kr/handle/20.500.11750/59056 -
dc.description.abstract Several cryptosystems suggested for the post-quantum cryptography candidates, including Falcon, BIKE, and NTRU, are defined in a polynomial ring. They must derive the inverse polynomial of any given polynomial for generating a public key. This process consumes considerable processing time; therefore, reducing the time to derive the inverse polynomial significantly improves many cryptosystems’ performance. In this paper, we primarily suggest two polynomial inversion algorithms, combined-variable-time and combined-constant-time algorithms, based on the modification of the extended Euclidean algorithm. The combined-variable-time algorithm shows how to calculate the inverse polynomial by introducing the combined matrix fast, which is generated by merging several steps of the polynomial operations. In cryptosystems, to defend against side-channel attacks, the implementation with constant running time is essential in preventing information leakage. Thus, we propose the combined-constant-time polynomial inversion algorithm, which expends less running time than the conventional NTRU inversion algorithm. For binary polynomial inversion, the proposed combined-variable-time algorithm is 1.95 times faster than the variable-time algorithm used in the previous NTRU (Silverman Almost inverses and fast NTRU key creation, NTRU Tech Report, no. 014v1, Mar. 15, 1999), and the combined-constant-time algorithms are 1.43 times faster than the reference constant-time algorithms submitted to round 3 of the NIST PQC standardization, respectively. For ternary polynomial inversion, the proposed combined-variable-time and combined-constant-time algorithms are 1.59 and 1.29 times faster than the corresponding reference algorithms. © 2025 Elsevier B.V., All rights reserved. -
dc.language English -
dc.publisher Springer Nature -
dc.title Fast polynomial inversion algorithms for the post-quantum cryptography -
dc.type Article -
dc.identifier.doi 10.1007/s13389-025-00380-w -
dc.identifier.wosid 001563113100001 -
dc.identifier.scopusid 2-s2.0-105013850479 -
dc.identifier.bibliographicCitation Journal of Cryptographic Engineering, v.15, no.3 -
dc.description.isOpenAccess TRUE -
dc.subject.keywordAuthor Key Encapsulation Mechanisms -
dc.subject.keywordAuthor Lattice-based Cryptography -
dc.subject.keywordAuthor NTRU -
dc.subject.keywordAuthor Inverse polynomial -
dc.subject.keywordAuthor Post-quantum Cryptography -
dc.subject.keywordAuthor Public-key Encryption -
dc.subject.keywordAuthor Side-channel Attacks -
dc.citation.number 3 -
dc.citation.title Journal of Cryptographic Engineering -
dc.citation.volume 15 -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.relation.journalResearchArea Computer Science -
dc.relation.journalWebOfScienceCategory Computer Science, Theory & Methods -
dc.type.docType Article -
Show Simple Item Record

File Downloads

  • There are no files associated with this item.

공유

qrcode
공유하기

Related Researcher

김영식
Kim, Young-Sik김영식

Department of Electrical Engineering and Computer Science

read more

Total Views & Downloads