Paper 2024/644
Jumping for Bernstein-Yang Inversion
Abstract
This paper achieves fast polynomial inverse operations specifically tailored for the NTRU Prime KEM on ARMv8 NEON instruction set benchmarking on four processor architectures: Cortex-A53, Cortex-A72, Cortex-A76 and Apple M1. We utilize the jumping divison steps of the constant-time GCD algorithm from Bernstein and Yang (TCHES’19) and optimize underlying polynomial multiplication of various lengths to improve the efficiency for computing polynomial inverse operations in NTRU Prime.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. ACISP 2024
- Keywords
- NTRU PrimeMultiplicationExtended GCDInversion
- Contact author(s)
-
jcuyo613 @ gmail com
deanwang88528 @ gmail com
by @ crypto tw
mschen @ crypto tw - History
- 2024-04-29: approved
- 2024-04-27: received
- See all versions
- Short URL
- https://ia.cr/2024/644
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/644, author = {Li-Jie Jian and Ting-Yuan Wang and Bo-Yin Yang and Ming-Shing Chen}, title = {Jumping for Bernstein-Yang Inversion}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/644}, year = {2024}, url = {https://eprint.iacr.org/2024/644} }