Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine for encryption and signature verification in multivariate public-key cryptography (MPKC). The security of MPKC definitely becomes lower if a larger field is used instead of ?F(2) given the same number of bits in the key. However, we still would like to use larger fields because MPKC tends to run faster at the same level of security if a larger field is used. The heaviest computation of evaluating non-linear multivariate polynomial system is multiplication. Therefore, we must find the best way of multiplications. Nowadays, graphics processing units (GPUs) have over 100 times computational power than CPU. They are constructed by hundreds cores....
In the field of cryptography, public key algorithms are widely known to be slower than symmetric key...
In this paper we present a hardware-software hybrid technique for modular multiplication over large ...
The evolution of quantum algorithms threatens to break public key cryptography in polynomial time. T...
Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine ...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
Abstract. We analyze how fast we can solve general systems of multivariate equations of various low ...
Polynomial multiplication is the most time-consuming part of cryptographic schemes whose security is...
We present the algorithm to multiply univariate polynomials with integer coefficients efficiently us...
Abstract Multivariate signature belongs to Multivariate-Quadratic-Equations Public Key Cryptography ...
In this paper, we present an optimized FPGA implementation of a novel, fast and highly parallelized ...
144 p.The security strength of Public Key Cryptosystems (PKCs) is attributed to the complex computat...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
Pairings on hyperelliptic curves have been applied to many cryptographic schemes, and it is importan...
Abstract—Graphics processing units (GPUs) have become increasingly popular over the last years as a ...
AbstractMultivariate polynomial multiplication is a fundamental operation which is used in many scie...
In the field of cryptography, public key algorithms are widely known to be slower than symmetric key...
In this paper we present a hardware-software hybrid technique for modular multiplication over large ...
The evolution of quantum algorithms threatens to break public key cryptography in polynomial time. T...
Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine ...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
Abstract. We analyze how fast we can solve general systems of multivariate equations of various low ...
Polynomial multiplication is the most time-consuming part of cryptographic schemes whose security is...
We present the algorithm to multiply univariate polynomials with integer coefficients efficiently us...
Abstract Multivariate signature belongs to Multivariate-Quadratic-Equations Public Key Cryptography ...
In this paper, we present an optimized FPGA implementation of a novel, fast and highly parallelized ...
144 p.The security strength of Public Key Cryptosystems (PKCs) is attributed to the complex computat...
Part 2: Security EngineeringInternational audienceEfficient algorithms for binary field operations a...
Pairings on hyperelliptic curves have been applied to many cryptographic schemes, and it is importan...
Abstract—Graphics processing units (GPUs) have become increasingly popular over the last years as a ...
AbstractMultivariate polynomial multiplication is a fundamental operation which is used in many scie...
In the field of cryptography, public key algorithms are widely known to be slower than symmetric key...
In this paper we present a hardware-software hybrid technique for modular multiplication over large ...
The evolution of quantum algorithms threatens to break public key cryptography in polynomial time. T...