On the Performance and Security of Multiplication in GF(2N)

Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ). In this paper, we present a set of optimizations applied to DAGS, a code-based post-quantum cryptographic algo...

Full description

Bibliographic Details
Main Authors: Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh T. Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub
Format: Article
Language:English
Published: MDPI AG 2018-09-01
Series:Cryptography
Subjects:
Online Access:http://www.mdpi.com/2410-387X/2/3/25