skip to main content
10.5555/648254.752549guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

NTRU in Constrained Devices

Published: 14 May 2001 Publication History

Abstract

The growing connectivity offered by constrained computing devices signals a critical need for public-key cryptography in such environments. By their nature, however, public-key systems have been difficult to implement in systems with limited computational power. The NTRU public-key cryptosystem addresses this problem by offeringb etter computational performance than previous practical systems. The efficiency of NTRU is applied to a wide variety of constrained devices in this paper, includingthe Palm ComputingPlatform, Advanced RISC Machines ARM7TDMI, the Research in Motion pager, and finally, the Xilinx Virtex 1000 family of FPGAs. On each of these platforms, NTRU offers exceptional performance, enablinga new range of applications to make use of the power of public-key cryptography.

References

[1]
D. V. Bailey and C. Paar. Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. Journal of Cryptology, to appear.
[2]
D. Coppersmith and A. Shamir. Lattice attacks on NTRU. In Advances in Cryptography -- EUROCRYPT '97, pages 52-61. Springer-Verlag, 1997. LNCS 1233.
[3]
J. Hoffstein, J. Pipher, and J. Silverman. NTRU: A new high speed public key cryptosystem. In J. Buhler, editor, Lecture Notes in Computer Science 1423: Algorithmic Number Theory (ANTS III), pages 267-288. Springer-Verlag, Berlin, 1998.
[4]
J. Hoffstein and J. Silverman. Optimizations for NTRU. In Proceedings of Public-Key Cryptography and Computational Number Theory. de Gruyter, Warsaw, September 2000.
[5]
J. Hoffstein and J. Silverman. Small hamming weight products in cryptography. preprint, September 2000.
[6]
J. S. J. Hoffstein, J. Pipher. NSS: An NTRU lattice-based signature scheme. In Advances in Cryptography -- EUROCRYPT 2001. Springer-Verlag, 2001. to appear.
[7]
A. J. Menezes. Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston, 1993.
[8]
Xilinx Inc. Virtex 2.5V Field Programmable Gate Arrays, 1998.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CHES '01: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
May 2001
409 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 14 May 2001

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media