Paper 2024/644

Jumping for Bernstein-Yang Inversion

Li-Jie Jian, Academia Sinica
Ting-Yuan Wang, Academia Sinica
Bo-Yin Yang, Academia Sinica
Ming-Shing Chen, Academia Sinica
Abstract

This paper achieves fast polynomial inverse operations specifically tailored for the NTRU Prime KEM on ARMv8 NEON instruction set benchmarking on four processor architectures: Cortex-A53, Cortex-A72, Cortex-A76 and Apple M1. We utilize the jumping divison steps of the constant-time GCD algorithm from Bernstein and Yang (TCHES’19) and optimize underlying polynomial multiplication of various lengths to improve the efficiency for computing polynomial inverse operations in NTRU Prime.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. ACISP 2024
Keywords
NTRU PrimeMultiplicationExtended GCDInversion
Contact author(s)
jcuyo613 @ gmail com
deanwang88528 @ gmail com
by @ crypto tw
mschen @ crypto tw
History
2024-04-29: approved
2024-04-27: received
See all versions
Short URL
https://ia.cr/2024/644
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/644,
      author = {Li-Jie Jian and Ting-Yuan Wang and Bo-Yin Yang and Ming-Shing Chen},
      title = {Jumping for Bernstein-Yang Inversion},
      howpublished = {Cryptology ePrint Archive, Paper 2024/644},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/644}},
      url = {https://eprint.iacr.org/2024/644}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.