Abstract: This paper compares the performance of activation function hardware under exponential function approximation techniques. The activation function is a key component of deep neural networks, ...
Abstract: The ML-KEM post-quantum cryptography (PQC) scheme requires matrix-vector polynomial multiplication and polynomial arithmetic operations in the number theoretic transform (NTT) domain. Prior ...