{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:18:30Z","timestamp":1774538310997,"version":"3.50.1"},"reference-count":30,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Korean Government (MSIT)","award":["2020-0-01840"],"award-info":[{"award-number":["2020-0-01840"]}]},{"name":"Korean Government (MSIT)","award":["IITP-2023-RS-2023-00256081"],"award-info":[{"award-number":["IITP-2023-RS-2023-00256081"]}]},{"name":"Korean Government (MSIT)","award":["RS-2022-00166529"],"award-info":[{"award-number":["RS-2022-00166529"]}]},{"name":"Korean Government (MSIT)","award":["RS-2023-00277326"],"award-info":[{"award-number":["RS-2023-00277326"]}]},{"name":"Korean Government (MSIT)","award":["GCU-202208860001"],"award-info":[{"award-number":["GCU-202208860001"]}]},{"name":"National Research Foundation of Korea (NRF)","award":["2020-0-01840"],"award-info":[{"award-number":["2020-0-01840"]}]},{"name":"National Research Foundation of Korea (NRF)","award":["IITP-2023-RS-2023-00256081"],"award-info":[{"award-number":["IITP-2023-RS-2023-00256081"]}]},{"name":"National Research Foundation of Korea (NRF)","award":["RS-2022-00166529"],"award-info":[{"award-number":["RS-2022-00166529"]}]},{"name":"National Research Foundation of Korea (NRF)","award":["RS-2023-00277326"],"award-info":[{"award-number":["RS-2023-00277326"]}]},{"name":"National Research Foundation of Korea (NRF)","award":["GCU-202208860001"],"award-info":[{"award-number":["GCU-202208860001"]}]},{"name":"Gachon University research fund of 2022","award":["2020-0-01840"],"award-info":[{"award-number":["2020-0-01840"]}]},{"name":"Gachon University research fund of 2022","award":["IITP-2023-RS-2023-00256081"],"award-info":[{"award-number":["IITP-2023-RS-2023-00256081"]}]},{"name":"Gachon University research fund of 2022","award":["RS-2022-00166529"],"award-info":[{"award-number":["RS-2022-00166529"]}]},{"name":"Gachon University research fund of 2022","award":["RS-2023-00277326"],"award-info":[{"award-number":["RS-2023-00277326"]}]},{"name":"Gachon University research fund of 2022","award":["GCU-202208860001"],"award-info":[{"award-number":["GCU-202208860001"]}]},{"name":"IC Design Education Center (IDEC)","award":["2020-0-01840"],"award-info":[{"award-number":["2020-0-01840"]}]},{"name":"IC Design Education Center (IDEC)","award":["IITP-2023-RS-2023-00256081"],"award-info":[{"award-number":["IITP-2023-RS-2023-00256081"]}]},{"name":"IC Design Education Center (IDEC)","award":["RS-2022-00166529"],"award-info":[{"award-number":["RS-2022-00166529"]}]},{"name":"IC Design Education Center (IDEC)","award":["RS-2023-00277326"],"award-info":[{"award-number":["RS-2023-00277326"]}]},{"name":"IC Design Education Center (IDEC)","award":["GCU-202208860001"],"award-info":[{"award-number":["GCU-202208860001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>This paper focuses on enhancing the performance of the Nth-degree truncated-polynomial ring units key encapsulation mechanism (NTRU-KEM) algorithm, which ensures post-quantum resistance in the field of key establishment cryptography. The NTRU-KEM, while robust, suffers from increased storage and computational demands compared to classical cryptography, leading to significant memory and performance overheads. In environments with limited resources, the negative impacts of these overheads are more noticeable, leading researchers to investigate ways to speed up processes while also ensuring they are efficient in terms of area utilization. To address this, our research carefully examines the detailed functions of the NTRU-KEM algorithm, adopting a software\/hardware co-design approach. This approach allows for customized computation, adapting to the varying requirements of operational timings and iterations. The key contribution is the development of a novel hardware acceleration technique focused on optimizing bus utilization. This technique enables parallel processing of multiple sub-functions, enhancing the overall efficiency of the system. Furthermore, we introduce a unique integrated register array that significantly reduces the spatial footprint of the design by merging multiple registers within the accelerator. In experiments conducted, the results of our work were found to be remarkable, with a time-area efficiency achieved that surpasses previous work by an average of 25.37 times. This achievement underscores the effectiveness of our optimization in accelerating the NTRU-KEM algorithm.<\/jats:p>","DOI":"10.3390\/computers12120259","type":"journal-article","created":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T04:14:42Z","timestamp":1702440882000},"page":"259","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Optimizing Hardware Resource Utilization for Accelerating the NTRU-KEM Algorithm"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9717-620X","authenticated-orcid":false,"given":"Yongseok","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering and Inter-University Semiconductor Research Center, Seoul National University, Seoul 08826, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7408-3804","authenticated-orcid":false,"given":"Jonghee","family":"Youn","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Yeungnam University, Gyeongsan-si 38541, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4621-2434","authenticated-orcid":false,"given":"Kevin","family":"Nam","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering and Inter-University Semiconductor Research Center, Seoul National University, Seoul 08826, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5123-4921","authenticated-orcid":false,"given":"Hyunyoung","family":"Oh","sequence":"additional","affiliation":[{"name":"Department of AI\u00b7Software, Gachon University, Seongnam-si 13120, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6412-2926","authenticated-orcid":false,"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering and Inter-University Semiconductor Research Center, Seoul National University, Seoul 08826, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2023,12,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Nielsen, M.A., and Chuang, I.L. (2011). Quantum Computation and Quantum Information: 10th Anniversary Edition, Cambridge University Press.","DOI":"10.1017\/CBO9780511976667"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"41","author":"Shor","year":"1999","journal-title":"SIAM Rev."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Kumar, M., and Pattnaik, P. (2020, January 22\u201324). Post quantum cryptography (PQC)-An overview. Proceedings of the 2020 IEEE High Performance Extreme Computing Conference (HPEC), Waltham, MA, USA.","DOI":"10.1109\/HPEC43674.2020.9286147"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Raheman, F. (2022). The future of cybersecurity in the age of quantum computers. Future Internet, 14.","DOI":"10.3390\/fi14110335"},{"key":"ref_5","unstructured":"Shinohara, N., and Moriai, S. (2023, November 14). Trends in Post-Quantum Cryptography: Cryptosystems for the Quantum Computing Era. The Magazine of New Breeze, 2019, pp. 9\u201311. Available online: https:\/\/www.ituaj.jp\/wp-content\/uploads\/2019\/01\/nb31-1_web-05-Special-TrendsPostQuantum.pdf."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Yaman, F., Mert, A.C., \u00d6zt\u00fcrk, E., and Sava\u015f, E. (2021, January 1\u20135). A hardware accelerator for polynomial multiplication operation of CRYSTALS-KYBER PQC scheme. Proceedings of the 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France.","DOI":"10.23919\/DATE51398.2021.9474139"},{"key":"ref_7","unstructured":"Hoffstein, J., Pipher, J., and Silverman, J.H. (2006). Algorithmic Number Theory, Proceedings of the Third International Symposiun, ANTS-III, Portland, OR, USA, 21\u201325 June 1998, Springer."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_9","unstructured":"Diffie, W., and Hellman, M.E. (2022). Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, Morgan & Claypool."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Dang, V.B., Farahmand, F., Andrzejczak, M., and Gaj, K. (2019, January 9\u201313). Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software\/hardware codesign. Proceedings of the 2019 International Conference on Field-Programmable Technology (ICFPT), Tianjin, China.","DOI":"10.1109\/ICFPT47387.2019.00032"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Kannwischer, M.J., Rijneveld, J., and Schwabe, P. (2019, January 5\u20137). Faster multiplication in on Cortex-M4 to speed up NIST PQC candidates. Proceedings of the International Conference on Applied Cryptography and Network Security, Bogota, Colombia.","DOI":"10.1007\/978-3-030-21568-2_14"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"He, P., Tu, Y., Khalid, A., O\u2019Neill, M., and Xie, J. (2022, January 19\u201321). HPMA-NTRU: High-Performance Polynomial Multiplication Accelerator for NTRU. Proceedings of the 2022 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), Austin, TX, USA.","DOI":"10.1109\/DFT56152.2022.9962336"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Qin, Z., Tong, R., Wu, X., Bai, G., Wu, L., and Su, L. (2021, January 14\u201316). A compact full hardware implementation of PQC algorithm NTRU. Proceedings of the 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), Beijing, China.","DOI":"10.1109\/CISCE52179.2021.9446042"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Farahmand, F., Dang, V.B., Nguyen, D.T., and Gaj, K. (2019, January 8\u201310). Evaluating the potential for hardware acceleration of four NTRU-based key encapsulation mechanisms using software\/hardware codesign. Proceedings of the Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China.","DOI":"10.1007\/978-3-030-25510-7_2"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Antognazza, F., Barenghi, A., Pelosi, G., and Susella, R. (2023, January 16\u201319). A Flexible ASIC-oriented Design for a Full NTRU Accelerator. Proceedings of the 28th Asia and South Pacific Design Automation Conference, Tokyo, Japan.","DOI":"10.1145\/3566097.3567916"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kostalabros, V., Ribes-Gonz\u00e1lez, J., Farr\u00e0s, O., Moret\u00f3, M., and Hernandez, C. (September, January 30). Hls-based hw\/sw co-design of the post-quantum classic mceliece cryptosystem. Proceedings of the 2021 31st International Conference on Field-Programmable Logic and Applications (FPL), Dresden, Germany.","DOI":"10.1109\/FPL53798.2021.00017"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Sch\u00f6ffel, M., Feldmann, J., and Wehn, N. (2023). Code-based Cryptography in IoT: A HW\/SW Co-Design of HQC. arXiv.","DOI":"10.1109\/WF-IoT54382.2022.10152031"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lee, Y., Nam, K., Joo, Y., Kim, J., Oh, H., and Paek, Y. (2023, January 3\u20136). Area-Efficient Accelerator for the Full NTRU-KEM Algorithm. Proceedings of the International Conference on Computational Science and Its Applications, Athens, Greece.","DOI":"10.1007\/978-3-031-37111-0_14"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Riazi, M., Laine, K., Pelton, B., and Dai, W. (2020, January 16\u201320). HEAX: An Architecture for Computing on Encrypted Data. Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland.","DOI":"10.1145\/3373376.3378523"},{"key":"ref_20","unstructured":"Nam, K., Oh, H., Moon, H., and Paek, Y. (November, January 30). Accelerating N-Bit Operations over TFHE on Commodity CPU-FPGA. Proceedings of the 41st IEEE\/ACM International Conference on Computer-Aided Design, San Diego, CA, USA."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Kim, A., Kim, M., and Song, Y. (2017, January 3\u20137). Homomorphic Encryption for Arithmetic of Approximate Numbers. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Hong Kong, China.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00145-019-09319-x","article-title":"TFHE: Fast Fully Homomorphic Encryption over the Torus","volume":"33","author":"Chillotti","year":"2020","journal-title":"J. Cryptol."},{"key":"ref_23","unstructured":"Prest, T., Fouque, P.A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Ricosset, T., Seiler, G., Whyte, W., and Zhang, Z. (2023, November 14). Falcon. Post-Quantum Cryptography Project of NIST, Available online: https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/selected-algorithms-2022."},{"key":"ref_24","unstructured":"Zhang, N., Yang, B., Chen, C., Yin, S., Wei, S., and Liu, L. (2020). IACR Transactions on Cryptographic Hardware and Embedded Systems, IACR. Available online: https:\/\/ches.iacr.org\/2020\/index.php."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., and Mozaffari-Kermani, M. (2021, January 14\u201316). High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography. Proceedings of the 2021 IEEE 28th Symposium on Computer Arithmetic (ARITH), Lyngby, Denmark.","DOI":"10.1109\/ARITH51176.2021.00028"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/0022-460X(70)90075-1","article-title":"The fast Fourier transform algorithm: Programming considerations in the calculation of sine, cosine and Laplace transforms","volume":"12","author":"Cooley","year":"1970","journal-title":"J. Sound Vib."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1109\/TSP.2021.3060279","article-title":"A depth-first iterative algorithm for the conjugate pair fast fourier transform","volume":"69","author":"Becoulet","year":"2021","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_28","unstructured":"Chung, C.M.M., Hwang, V., Kannwischer, M.J., Seiler, G., Shih, C.J., and Yang, B.Y. (2021). IACR Transactions on Cryptographic Hardware and Embedded Systems, ICAR. Available online: https:\/\/ches.iacr.org\/2021\/index.php."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Schroeppel, R., Orman, H., o\u2019Malley, S., and Spatscheck, O. (1995, January 27\u201331). Fast key exchange with elliptic curve systems. Proceedings of the Advances in Cryptology\u2014CRYPT0\u201995: 15th Annual International Cryptology Conference, Santa Barbara, CA, USA. Proceedings.","DOI":"10.1007\/3-540-44750-4_4"},{"key":"ref_30","unstructured":"Standaert, F.X. (2010). Secure Integrated Circuits and Systems, Springer."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/12\/12\/259\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:37:39Z","timestamp":1760132259000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/12\/12\/259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,13]]},"references-count":30,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["computers12120259"],"URL":"https:\/\/doi.org\/10.3390\/computers12120259","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,13]]}}}