{"id":"https://openalex.org/W7108209347","doi":"https://doi.org/10.1109/access.2025.3638925","title":"Lightweight FPGA-Based Number-Theoretic Transform for ML-KEM in Post-Quantum Cryptography","display_name":"Lightweight FPGA-Based Number-Theoretic Transform for ML-KEM in Post-Quantum Cryptography","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7108209347","doi":"https://doi.org/10.1109/access.2025.3638925"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3638925","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3638925","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3638925","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mohammed O. Alshomrany","orcid":"https://orcid.org/0009-0003-4394-7499"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mohammed O. Alshomrany","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Muhammad Al-Hashimi","orcid":null},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Al-Hashimi","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Fawaz Alsolami","orcid":"https://orcid.org/0000-0002-0396-1347"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Fawaz Alsolami","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mostafa Saleh","orcid":"https://orcid.org/0000-0003-1140-6973"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mostafa Saleh","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Osama Abulnaja","orcid":"https://orcid.org/0000-0003-3431-6890"},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Osama Abulnaja","raw_affiliation_strings":["Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Turki F. Al-Somani","orcid":"https://orcid.org/0000-0001-5571-2150"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Turki F. Al-Somani","raw_affiliation_strings":["Department of Computer Engineering, Umm Al-Qura University, Mecca, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Umm Al-Qura University, Mecca, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]},{"author_position":"last","author":{"id":null,"display_name":"Abdullah Altuwaijri","orcid":"https://orcid.org/0009-0003-4757-9822"},"institutions":[{"id":"https://openalex.org/I4210103399","display_name":"Saudi Heart Association","ror":"https://ror.org/01nrq5w30","country_code":"SA","type":"nonprofit","lineage":["https://openalex.org/I4210103399"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdullah Altuwaijri","raw_affiliation_strings":["National Company of Telecommunications and Information Security (NTIS), Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"National Company of Telecommunications and Information Security (NTIS), Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I4210103399"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I185163786"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.70677814,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"203620","last_page":"203632"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.847599983215332,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.847599983215332,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.046300001442432404,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11697","display_name":"Numerical Methods and Algorithms","score":0.03959999978542328,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.7156999707221985},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.5482000112533569},{"id":"https://openalex.org/keywords/logic-synthesis","display_name":"Logic synthesis","score":0.48420000076293945},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4724999964237213},{"id":"https://openalex.org/keywords/logic-block","display_name":"Logic block","score":0.4629000127315521},{"id":"https://openalex.org/keywords/digital-signal-processing","display_name":"Digital signal processing","score":0.4519999921321869},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4422000050544739},{"id":"https://openalex.org/keywords/multiplexing","display_name":"Multiplexing","score":0.43149998784065247},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.40959998965263367}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.804099977016449},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.7156999707221985},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.5482000112533569},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.506600022315979},{"id":"https://openalex.org/C157922185","wikidata":"https://www.wikidata.org/wiki/Q173198","display_name":"Logic synthesis","level":3,"score":0.48420000076293945},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4724999964237213},{"id":"https://openalex.org/C2778325283","wikidata":"https://www.wikidata.org/wiki/Q1125244","display_name":"Logic block","level":3,"score":0.4629000127315521},{"id":"https://openalex.org/C84462506","wikidata":"https://www.wikidata.org/wiki/Q173142","display_name":"Digital signal processing","level":2,"score":0.4519999921321869},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.44620001316070557},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4422000050544739},{"id":"https://openalex.org/C19275194","wikidata":"https://www.wikidata.org/wiki/Q222903","display_name":"Multiplexing","level":2,"score":0.43149998784065247},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.40959998965263367},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3991999924182892},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.3921999931335449},{"id":"https://openalex.org/C104267543","wikidata":"https://www.wikidata.org/wiki/Q208163","display_name":"Signal processing","level":3,"score":0.33649998903274536},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3280999958515167},{"id":"https://openalex.org/C70970002","wikidata":"https://www.wikidata.org/wiki/Q189434","display_name":"Multiplexer","level":3,"score":0.3190999925136566},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.313400000333786},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3125},{"id":"https://openalex.org/C28449271","wikidata":"https://www.wikidata.org/wiki/Q6667469","display_name":"Logic optimization","level":4,"score":0.2973000109195709},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2971000075340271},{"id":"https://openalex.org/C134835016","wikidata":"https://www.wikidata.org/wiki/Q690265","display_name":"Lookup table","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C100276221","wikidata":"https://www.wikidata.org/wiki/Q192903","display_name":"Arithmetic logic unit","level":2,"score":0.2770000100135803},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.2727000117301941},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.26829999685287476},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C52773712","wikidata":"https://www.wikidata.org/wiki/Q175022","display_name":"Digital signal","level":3,"score":0.26089999079704285},{"id":"https://openalex.org/C74524168","wikidata":"https://www.wikidata.org/wiki/Q1074539","display_name":"Integrated circuit design","level":2,"score":0.2538999915122986},{"id":"https://openalex.org/C2779478453","wikidata":"https://www.wikidata.org/wiki/Q6889748","display_name":"Modularity (biology)","level":2,"score":0.25099998712539673}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3638925","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3638925","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d8e9fcc8e28c4362a68106b1291ffab4","is_oa":true,"landing_page_url":"https://doaj.org/article/d8e9fcc8e28c4362a68106b1291ffab4","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 203620-203632 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3638925","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3638925","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"introduces":[2],"a":[3,36,74,111,129],"lightweight,":[4],"energy-efficient":[5],"Number":[6],"Theoretic":[7],"Transform":[8],"(NTT)":[9],"implementation":[10],"tailored":[11],"for":[12,64,170],"the":[13,29,33,114,142],"ML-KEM":[14],"scheme":[15],"in":[16,121,125,132],"post-quantum":[17],"cryptography.":[18],"Unlike":[19],"prior":[20],"efforts":[21],"focusing":[22],"mainly":[23],"on":[24,110,161],"multipliers":[25],"and":[26,50,59,67,73,101,128,159,168],"modular":[27,76,81],"reduction,":[28],"proposed":[30],"design":[31,115],"emphasizes":[32],"address":[34,146],"generator,":[35],"critical":[37],"yet":[38],"often":[39],"overlooked":[40],"component.":[41],"A":[42],"compact":[43],"counter-based":[44],"mechanism":[45],"integrated":[46],"with":[47,136],"XOR":[48],"logic":[49,163],"multiplexing":[51],"eliminates":[52],"large":[53],"lookup":[54],"tables,":[55],"reduces":[56],"redundant":[57],"operations,":[58],"ensures":[60],"efficient":[61],"memory":[62],"access":[63],"both":[65],"NTT":[66],"INTT.":[68],"The":[69,94,153],"unified":[70],"butterfly":[71],"unit":[72],"LUT-based":[75,162],"reduction":[77,120],"circuit":[78],"enable":[79],"multi-cycle":[80],"operations":[82],"without":[83],"requiring":[84],"digital":[85],"signal":[86],"processing":[87],"(DSP)":[88],"or":[89],"block":[90],"RAM":[91],"(BRAM)":[92],"resources.":[93],"complete":[95],"architecture":[96],"occupies":[97],"only":[98],"147":[99],"slices":[100],"557":[102],"LUTs,":[103],"achieving":[104],"very":[105],"low":[106],"power":[107],"consumption.":[108],"Implemented":[109],"Virtex-7":[112],"platform,":[113],"demonstrates":[116],"up":[117],"to":[118,148],"88.8%":[119],"area,":[122],"22%":[123],"decrease":[124],"dynamic":[126],"power,":[127],"17.57\u00d7":[130],"improvement":[131],"A\u00b2T":[133],"efficiency":[134],"compared":[135],"state-of-the-art":[137],"implementations.":[138],"These":[139],"results":[140],"highlight":[141],"significance":[143],"of":[144,156],"optimizing":[145],"generation":[147],"achieve":[149],"compact,":[150],"power-aware":[151],"accelerators.":[152],"architecture\u2019s":[154],"elimination":[155],"memory-intensive":[157],"components":[158],"reliance":[160],"make":[164],"it":[165],"highly":[166],"portable":[167],"suitable":[169],"resource-constrained":[171],"devices.":[172]},"counts_by_year":[],"updated_date":"2025-12-06T23:10:59.065948","created_date":"2025-12-03T00:00:00"}
