Abstract. We describe a new technique for evaluating polynomials over binary finite fields. This is useful in the context of anti-DPA counter-measures when an S-box is expressed as a polynomial over a binary finite field. For n-bit S-boxes our new technique has heuristic complexity O(2n/2/√n) instead of O(2n/2) proven complexity for the Parity-Split method. We also prove a lower bound of Ω(2n/2/ n) on the complexity of any method to evaluate n-bit S-boxes; this shows that our method is asymptotically optimal. Here, complexity refers to the number of non-linear multiplications required to evaluate the polynomial corresponding to an S-box. In practice we can evaluate any 8-bit S-box in 10 non-linear multiplica-tions instead of 16 in the Roy-V...
We study various combinatorial complexity measures of Boolean functions related to some natural arit...
When implementing a cryptographic algorithm, efficient operations have high relevance both in hardwa...
This paper deals with binary field multiplication. We use the bivariate representation of binary fie...
We describe a new technique for evaluating polynomials over binary finite fields. This is useful in ...
An efficient evaluation method is described for polynomials in finite fields. Its complexity is show...
This paper presents several methods for reducing the number of bit operations for multiplication of ...
This thesis studies the secure polynomial multiplication methods related to the article Batch Binary...
An efficient evaluation method is described for polynomials in finite fields. Its complexity is show...
Masking is a widespread countermeasure to protect implementations of block-ciphers against side-chan...
Masking is a sound countermeasure to protect implementations of block- cipher algorithms against Sid...
International audienceThis paper deals with binary field multiplication. We use the bivariate repres...
We propose an algorithm for quickly evaluating polynomials. It pre-conditions a complex polynomial $...
International audienceThe best known asymptotic bit complexity bound for factoring univariate polyno...
In this paper, the method of constructing algorithm for the implementation of large-scale S-box is p...
Efficient arithmetic over finite fields has high relevance both in hardware and software implementat...
We study various combinatorial complexity measures of Boolean functions related to some natural arit...
When implementing a cryptographic algorithm, efficient operations have high relevance both in hardwa...
This paper deals with binary field multiplication. We use the bivariate representation of binary fie...
We describe a new technique for evaluating polynomials over binary finite fields. This is useful in ...
An efficient evaluation method is described for polynomials in finite fields. Its complexity is show...
This paper presents several methods for reducing the number of bit operations for multiplication of ...
This thesis studies the secure polynomial multiplication methods related to the article Batch Binary...
An efficient evaluation method is described for polynomials in finite fields. Its complexity is show...
Masking is a widespread countermeasure to protect implementations of block-ciphers against side-chan...
Masking is a sound countermeasure to protect implementations of block- cipher algorithms against Sid...
International audienceThis paper deals with binary field multiplication. We use the bivariate repres...
We propose an algorithm for quickly evaluating polynomials. It pre-conditions a complex polynomial $...
International audienceThe best known asymptotic bit complexity bound for factoring univariate polyno...
In this paper, the method of constructing algorithm for the implementation of large-scale S-box is p...
Efficient arithmetic over finite fields has high relevance both in hardware and software implementat...
We study various combinatorial complexity measures of Boolean functions related to some natural arit...
When implementing a cryptographic algorithm, efficient operations have high relevance both in hardwa...
This paper deals with binary field multiplication. We use the bivariate representation of binary fie...