This paper shows how to securely authenticate messages using just 29 bit operations per authenticated bit, plus a constant overhead per message. The authenticator is a standard type of universal hash function providing information-theoretic security; what is new is computing this type of hash function at very high speed. At a lower level, this paper shows how to multiply two elements of a field of size 2^128 using just 9062 \approx 71 * 128 bit operations, and how to multiply two elements of a field of size 2^256 using just 22164 \approx 87 * 256 bit operations. This performance relies on a new representation of field elements and new FFT-based multiplication techniques. This paper's constant-time software uses just 1.89 Core 2 cycles per...
This paper presents extremely fast algorithms for code-based public-key cryptography, including full...
We present the Galois Message Authentication Code (GMAC), a generic construction based on universal ...
© Springer International Publishing Switzerland 2014. We propose Chaskey: a very efficient Message A...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
Abstract. This paper shows how to securely authenticate messages us-ing just 29 bit operations per a...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
We present an architecture level optimization technique called divide-and-concatenate based on two o...
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Us...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
This paper presents extremely fast algorithms for code-based public-key cryptography, including full...
We present the Galois Message Authentication Code (GMAC), a generic construction based on universal ...
© Springer International Publishing Switzerland 2014. We propose Chaskey: a very efficient Message A...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
Abstract. This paper shows how to securely authenticate messages us-ing just 29 bit operations per a...
This paper shows how to securely authenticate messages using just 29 bit operations per authenticate...
We present an architecture level optimization technique called divide-and-concatenate based on two o...
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Us...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
This paper presents extremely fast algorithms for code-based public-key cryptography, including full...
We present the Galois Message Authentication Code (GMAC), a generic construction based on universal ...
© Springer International Publishing Switzerland 2014. We propose Chaskey: a very efficient Message A...