{"id":"https://openalex.org/W4411725275","doi":"https://doi.org/10.1109/iscas56072.2025.11043318","title":"A Unified FFT/NTT Design for Efficient NTRU Equation Solving in FALCON Cryptography","display_name":"A Unified FFT/NTT Design for Efficient NTRU Equation Solving in FALCON Cryptography","publication_year":2025,"publication_date":"2025-05-25","ids":{"openalex":"https://openalex.org/W4411725275","doi":"https://doi.org/10.1109/iscas56072.2025.11043318"},"language":"en","primary_location":{"id":"doi:10.1109/iscas56072.2025.11043318","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas56072.2025.11043318","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102219101","display_name":"Jyun-Jie Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Jun-Hao Liao","raw_affiliation_strings":["National Cheng Kung University,Department of Electrical Engineering,Tainan,Taiwan R.O.C,701"],"affiliations":[{"raw_affiliation_string":"National Cheng Kung University,Department of Electrical Engineering,Tainan,Taiwan R.O.C,701","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108880779","display_name":"Kuan-Ting Cho","orcid":null},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Kuan-Ting Cho","raw_affiliation_strings":["National Cheng Kung University,Department of Electrical Engineering,Tainan,Taiwan R.O.C,701"],"affiliations":[{"raw_affiliation_string":"National Cheng Kung University,Department of Electrical Engineering,Tainan,Taiwan R.O.C,701","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053167526","display_name":"Ming\u2010Der Shieh","orcid":"https://orcid.org/0000-0002-7361-1860"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ming-Der Shieh","raw_affiliation_strings":["National Cheng Kung University,Department of Electrical Engineering,Tainan,Taiwan R.O.C,701"],"affiliations":[{"raw_affiliation_string":"National Cheng Kung University,Department of Electrical Engineering,Tainan,Taiwan R.O.C,701","institution_ids":["https://openalex.org/I91807558"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102219101"],"corresponding_institution_ids":["https://openalex.org/I91807558"],"apc_list":null,"apc_paid":null,"fwci":3.2828,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.92646048,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11697","display_name":"Numerical Methods and Algorithms","score":0.9399999976158142,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11697","display_name":"Numerical Methods and Algorithms","score":0.9399999976158142,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9041000008583069,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ntru","display_name":"NTRU","score":0.822957456111908},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6909738779067993},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.68388831615448},{"id":"https://openalex.org/keywords/falcon","display_name":"Falcon","score":0.6433408856391907},{"id":"https://openalex.org/keywords/fast-fourier-transform","display_name":"Fast Fourier transform","score":0.4746026396751404},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.41952624917030334},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4012026786804199},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3483567237854004},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.28002360463142395},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2364148497581482},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10785794258117676},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.07457026839256287}],"concepts":[{"id":"https://openalex.org/C122368425","wikidata":"https://www.wikidata.org/wiki/Q6955493","display_name":"NTRU","level":4,"score":0.822957456111908},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6909738779067993},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.68388831615448},{"id":"https://openalex.org/C2775845381","wikidata":"https://www.wikidata.org/wiki/Q43489","display_name":"Falcon","level":2,"score":0.6433408856391907},{"id":"https://openalex.org/C75172450","wikidata":"https://www.wikidata.org/wiki/Q623950","display_name":"Fast Fourier transform","level":2,"score":0.4746026396751404},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.41952624917030334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4012026786804199},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3483567237854004},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.28002360463142395},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2364148497581482},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10785794258117676},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.07457026839256287}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscas56072.2025.11043318","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas56072.2025.11043318","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1580045882","https://openalex.org/W1976676268","https://openalex.org/W2144693841","https://openalex.org/W2920399571","https://openalex.org/W3013093367","https://openalex.org/W4226101078","https://openalex.org/W4399426035"],"related_works":["https://openalex.org/W4293172089","https://openalex.org/W3212142976","https://openalex.org/W3173021030","https://openalex.org/W4229818418","https://openalex.org/W4310449350","https://openalex.org/W2558478802","https://openalex.org/W2402064829","https://openalex.org/W2350092350","https://openalex.org/W2398072191","https://openalex.org/W4308642416"],"abstract_inverted_index":{"Post-Quantum":[0],"Cryptography":[1],"has":[2,20],"garnered":[3],"significant":[4],"attention":[5],"with":[6],"the":[7,24,30,98,127,140,144,154,173],"rapid":[8],"development":[9],"of":[10,42,63,100,112,122,147],"quantum":[11],"computing.":[12],"FALCON,":[13],"a":[14,61,73,120],"lattice-based":[15],"quantum-resistant":[16],"digital":[17],"signature":[18],"scheme,":[19],"been":[21],"standardized.":[22],"During":[23],"key":[25,178],"pair":[26,179],"generation":[27,180],"process,":[28],"solving":[29],"NTRU":[31],"equation":[32],"based":[33,125],"on":[34,83,126,138],"Galois":[35],"theory":[36],"is":[37,60],"required.":[38],"The":[39,89,106],"simultaneous":[40],"use":[41],"two":[43,174],"distinct":[44],"algebraic":[45],"structures,":[46],"$\\mathbb{Q}[x]/\\left(":[47],"{{x^n}":[48,54],"+":[49,55],"1}":[50,56],"\\right)$":[51],"and":[52,80,97,117,165],"$\\mathbb{Z}[x]/\\left(":[53],"\\right)$,":[57],"where":[58],"n":[59],"power":[62],"2,":[64],"presents":[65],"challenges":[66],"in":[67,181],"hardware":[68,74],"design.":[69],"This":[70,169],"paper":[71],"proposes":[72],"accelerator":[75],"specifically":[76],"customized":[77],"for":[78,94,177],"FFT/IFFT":[79,136],"NTT/INTT":[81],"operations":[82],"rings":[84],"under":[85],"different":[86],"point":[87],"numbers.":[88],"design":[90,108,137,160],"incorporates":[91],"conflict-free":[92],"scheduling":[93],"memory":[95],"access":[96],"selection":[99],"twiddle":[101],"factors":[102],"across":[103],"various":[104],"radices.":[105],"proposed":[107,141],"occupies":[109],"an":[110],"area":[111,145],"0.54":[113],"mm<sup":[114],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[115],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[116],"operates":[118],"at":[119],"frequency":[121],"333":[123],"MHz":[124],"synthesis":[128],"results":[129],"using":[130],"40nm":[131],"technology.":[132],"Compared":[133],"to":[134],"existing":[135],"rings,":[139],"one":[142],"reduces":[143],"requirement":[146],"processing":[148],"elements":[149],"by":[150],"33%":[151],"without":[152],"increasing":[153],"overall":[155],"execution":[156],"time.":[157],"Moreover,":[158],"our":[159],"supports":[161],"both":[162],"64-bit":[163],"radix-4":[164],"128-bit":[166],"radix-2":[167],"NTT/INTT.":[168],"solution":[170],"effectively":[171],"addresses":[172],"transformations":[175],"required":[176],"FALCON.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
