High- and Half-Degree Quantum Multiplication for Post-Quantum Security Evaluation

This paper provides a thorough examination of strategies related to the design of the polynomial multiplication approach, which is essential to resolving large number operations, including multiplication in the post-quantum cryptography algorithm. Our research specifically centers on the implementat...

Full description

Bibliographic Details
Main Authors: Rini Wisnu Wardhani, Dedy Septono Catur Putranto, Howon Kim
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10387320/