On the Performance and Security of Multiplication in GF(2N)
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ). In this paper, we present a set of optimizations applied to DAGS, a code-based post-quantum cryptographic algo...
Main Authors: | Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh T. Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-09-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | http://www.mdpi.com/2410-387X/2/3/25 |
Similar Items
-
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
by: Mohd Ali, Fakariah Hani
Published: (2004) -
A speed‐area‐efficient hardware ECPM‐engine in GF(p) over generic Weierstrass curves
by: Yujun Xie, et al.
Published: (2024-02-01) -
Low‐space bit‐serial systolic array architecture for interleaved multiplication over GF(2m)
by: Atef Ibrahim
Published: (2021-05-01) -
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
by: Edoardo Persichetti
Published: (2018-10-01) -
A RSA-type cryptosystem based on quartic polynomials
by: Wong, Tze Jin
Published: (2011)