This thesis is concerned with GF(2m) Polynomial Residue Number Systems (PRNS) and their application in cryptography to provide resistance against side-channel- analysis and protection against fault attacks. PRNS operations over GF(2m) required in a number of cryptography primitives are investigated. A partial-conversion method is introduced to simplify the costly conversion operation and this is then combined with a partial modular reduction technique and applied to design and implement a PRNS based GF(2m) multiplier with improved performance. The Advanced Encryption Standard (AES) is used as vehicle to analyse and quantify the PRNS overhead where different AES architectures are proposed and implemented. The PRNS based AES is shown to achie...
Cryptographic and coding theory algorithms use arithmetic operations over finite fields. Finite fiel...
We present a novel method of parallelization of the multiplication operation in GF(2 k) for an arbit...
Abstract: Problem statement: In this study we propose a group re-keying protocol based on modular po...
A new method using polynomial residue number systems (PRNS) is introduced in this paper to protect t...
There has been a tendency to use the theory of finite Galois fields, or GF(2n), in cryptographic cip...
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on...
A brand new methodology for embedding residue arithmetic inside a dual-field Montgomery modular mult...
Many stream ciphers employ linear feedback shift registers (LFSRs) to generate pseudorandom sequence...
Abstract: Problem statement: A fundamental building block for digital communication is the Public-ke...
In this paper we present an improved algorithm for finding low-weight multiples of polynomials over ...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
Abstract: Noise-resistant modular cryptographic system that functions in polynomial residue classes ...
Residue number systems provide efficient techniques for speeding up calculations and/or protecting a...
Title: Applications of Gröbner bases in cryptography Author: Aleš Fuchs Department: Department of Al...
In this work we propose a novel technique for known plaintext attack based on polynomial fitting ove...
Cryptographic and coding theory algorithms use arithmetic operations over finite fields. Finite fiel...
We present a novel method of parallelization of the multiplication operation in GF(2 k) for an arbit...
Abstract: Problem statement: In this study we propose a group re-keying protocol based on modular po...
A new method using polynomial residue number systems (PRNS) is introduced in this paper to protect t...
There has been a tendency to use the theory of finite Galois fields, or GF(2n), in cryptographic cip...
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on...
A brand new methodology for embedding residue arithmetic inside a dual-field Montgomery modular mult...
Many stream ciphers employ linear feedback shift registers (LFSRs) to generate pseudorandom sequence...
Abstract: Problem statement: A fundamental building block for digital communication is the Public-ke...
In this paper we present an improved algorithm for finding low-weight multiples of polynomials over ...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
Abstract: Noise-resistant modular cryptographic system that functions in polynomial residue classes ...
Residue number systems provide efficient techniques for speeding up calculations and/or protecting a...
Title: Applications of Gröbner bases in cryptography Author: Aleš Fuchs Department: Department of Al...
In this work we propose a novel technique for known plaintext attack based on polynomial fitting ove...
Cryptographic and coding theory algorithms use arithmetic operations over finite fields. Finite fiel...
We present a novel method of parallelization of the multiplication operation in GF(2 k) for an arbit...
Abstract: Problem statement: In this study we propose a group re-keying protocol based on modular po...