{"id":"https://openalex.org/W4310501990","doi":"https://doi.org/10.1109/dft56152.2022.9962361","title":"Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography","display_name":"Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography","publication_year":2022,"publication_date":"2022-10-19","ids":{"openalex":"https://openalex.org/W4310501990","doi":"https://doi.org/10.1109/dft56152.2022.9962361"},"language":"en","primary_location":{"id":"doi:10.1109/dft56152.2022.9962361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft56152.2022.9962361","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024767859","display_name":"Antian Wang","orcid":"https://orcid.org/0000-0002-2271-486X"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Antian Wang","raw_affiliation_strings":["Clemson University,Department of Electrical and Computer Engineering,Clemson,SC,USA,29634"],"affiliations":[{"raw_affiliation_string":"Clemson University,Department of Electrical and Computer Engineering,Clemson,SC,USA,29634","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002861851","display_name":"Weihang Tan","orcid":"https://orcid.org/0000-0002-2560-1481"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weihang Tan","raw_affiliation_strings":["Clemson University,Department of Electrical and Computer Engineering,Clemson,SC,USA,29634"],"affiliations":[{"raw_affiliation_string":"Clemson University,Department of Electrical and Computer Engineering,Clemson,SC,USA,29634","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007884053","display_name":"Keshab K. Parhi","orcid":"https://orcid.org/0000-0001-6543-2793"},"institutions":[{"id":"https://openalex.org/I130238516","display_name":"University of Minnesota","ror":"https://ror.org/017zqws13","country_code":"US","type":"education","lineage":["https://openalex.org/I130238516"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Keshab K. Parhi","raw_affiliation_strings":["University of Minnesota,Department of Electrical and Computer Engineering,Minneapolis,MN,USA,55455"],"affiliations":[{"raw_affiliation_string":"University of Minnesota,Department of Electrical and Computer Engineering,Minneapolis,MN,USA,55455","institution_ids":["https://openalex.org/I130238516"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071172709","display_name":"Yingjie Lao","orcid":"https://orcid.org/0000-0002-9413-2455"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yingjie Lao","raw_affiliation_strings":["Clemson University,Department of Electrical and Computer Engineering,Clemson,SC,USA,29634"],"affiliations":[{"raw_affiliation_string":"Clemson University,Department of Electrical and Computer Engineering,Clemson,SC,USA,29634","institution_ids":["https://openalex.org/I8078737"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024767859"],"corresponding_institution_ids":["https://openalex.org/I8078737"],"apc_list":null,"apc_paid":null,"fwci":0.398,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67597042,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7133064270019531},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7015645503997803},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based cryptography","score":0.6430563926696777},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.527269721031189},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.47899600863456726},{"id":"https://openalex.org/keywords/adder","display_name":"Adder","score":0.4524102210998535},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.4376063942909241},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4092622995376587},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.3798978924751282},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3490801453590393},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3381727337837219},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.271121084690094},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.2176274061203003},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15992966294288635},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.09666937589645386},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.084841787815094}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7133064270019531},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7015645503997803},{"id":"https://openalex.org/C137660015","wikidata":"https://www.wikidata.org/wiki/Q6497083","display_name":"Lattice-based cryptography","level":5,"score":0.6430563926696777},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.527269721031189},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.47899600863456726},{"id":"https://openalex.org/C164620267","wikidata":"https://www.wikidata.org/wiki/Q376953","display_name":"Adder","level":3,"score":0.4524102210998535},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.4376063942909241},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4092622995376587},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.3798978924751282},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3490801453590393},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3381727337837219},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.271121084690094},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2176274061203003},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15992966294288635},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.09666937589645386},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.084841787815094},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dft56152.2022.9962361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dft56152.2022.9962361","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W54610431","https://openalex.org/W179223734","https://openalex.org/W1014461153","https://openalex.org/W1513904472","https://openalex.org/W2007466965","https://openalex.org/W2050982428","https://openalex.org/W2098290658","https://openalex.org/W2106970188","https://openalex.org/W2117106078","https://openalex.org/W2127673207","https://openalex.org/W2137147061","https://openalex.org/W2159044902","https://openalex.org/W2563052397","https://openalex.org/W2736980685","https://openalex.org/W2792220042","https://openalex.org/W2866028610","https://openalex.org/W2900370870","https://openalex.org/W2901232240","https://openalex.org/W2962697447","https://openalex.org/W2996041333","https://openalex.org/W3023641472","https://openalex.org/W3036379937","https://openalex.org/W3092489368","https://openalex.org/W3114666254","https://openalex.org/W3121011012","https://openalex.org/W3133594818","https://openalex.org/W3202423328","https://openalex.org/W4200387775","https://openalex.org/W4213335259","https://openalex.org/W4225682136","https://openalex.org/W4250492047","https://openalex.org/W4251710990","https://openalex.org/W4280615783","https://openalex.org/W6602249827","https://openalex.org/W6683004686","https://openalex.org/W6765874320","https://openalex.org/W6771398125","https://openalex.org/W6777067054","https://openalex.org/W6784137253","https://openalex.org/W6802233522"],"related_works":["https://openalex.org/W4235564189","https://openalex.org/W2411027466","https://openalex.org/W3194469932","https://openalex.org/W2295565109","https://openalex.org/W4385627932","https://openalex.org/W2591713603","https://openalex.org/W3201289751","https://openalex.org/W2895169885","https://openalex.org/W2945072089","https://openalex.org/W4389982864"],"abstract_inverted_index":{"With":[0],"the":[1,4,11,24,30,35,43,55,60,66,71,82,88],"surge":[2],"of":[3,27,45],"powerful":[5],"quantum":[6,21],"computer,":[7],"lattice-based":[8,28],"cryptography":[9,13],"proliferated":[10],"latest":[12],"hardware":[14],"implementation":[15],"due":[16],"to":[17],"its":[18],"resistance":[19],"against":[20],"computers.":[22],"Among":[23],"computational":[25],"blocks":[26],"cryptography,":[29],"random":[31],"errors":[32],"produced":[33],"by":[34,64],"sampler":[36],"play":[37],"a":[38],"key":[39],"role":[40],"in":[41,93],"ensuring":[42],"security":[44],"these":[46],"schemes.":[47],"This":[48],"paper":[49],"proposes":[50],"an":[51],"integral":[52],"architecture":[53],"for":[54],"sampler,":[56],"which":[57],"can":[58,85],"reduce":[59,87],"overall":[61],"resource":[62],"consumption":[63],"reusing":[65],"multipliers":[67],"and":[68],"adders":[69],"within":[70],"modular":[72],"polynomial":[73],"computation.":[74],"For":[75],"instance,":[76],"our":[77],"experimental":[78],"results":[79],"show":[80],"that":[81],"proposed":[83],"design":[84],"effectively":[86],"discrete":[89],"Ziggurat":[90],"sampling":[91],"method":[92],"DSP":[94],"usage.":[95]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
