Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Chen, Ming Shing"'
Google's CECPQ1 experiment in 2016 integrated a post-quantum key-exchange algorithm, newhope1024, into TLS 1.2. The Google-Cloudflare CECPQ2 experiment in 2019 integrated a more efficient key-exchange algorithm, ntruhrss701, into TLS 1.3. This paper
Externí odkaz:
http://arxiv.org/abs/2106.08759
We show a new algorithm and its implementation for multiplying bit-polynomials of large degrees. The algorithm is based on evaluating polynomials at a specific set comprising a natural set for evaluation with additive FFT and a high order element und
Externí odkaz:
http://arxiv.org/abs/1803.11301
In ISSAC 2017, van der Hoeven and Larrieu showed that evaluating a polynomial P in GF(q)[x] of degree
Externí odkaz:
http://arxiv.org/abs/1802.03932
We set new speed records for multiplying long polynomials over finite fields of characteristic two. Our multiplication algorithm is based on an additive FFT (Fast Fourier Transform) by Lin, Chung, and Huang in 2014 comparing to previously best result
Externí odkaz:
http://arxiv.org/abs/1708.09746
Autor:
Chen, Ming Shing, Hülsing, Andreas, Rijneveld, Joost, Samardjiska, Simona, Schwabe, Peter, Abdalla, Michel, Dahab, Ricardo
Publikováno v:
Public-Key Cryptography-PKC 2018-21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, 3-33
STARTPAGE=3;ENDPAGE=33;TITLE=Public-Key Cryptography-PKC 2018-21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings
STARTPAGE=3;ENDPAGE=33;TITLE=Public-Key Cryptography-PKC 2018-21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings
We propose SOFIA, the first MQ -based signature scheme provably secure in the quantum-accessible random oracle model (QROM). Our construction relies on an extended version of Unruh’s transform for 5-pass identification schemes that we describe and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::66df83575df5318efec9e7fe5fcd01d1
https://research.tue.nl/nl/publications/c2db2bce-8107-4a94-abd1-590e13e4835a
https://research.tue.nl/nl/publications/c2db2bce-8107-4a94-abd1-590e13e4835a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Advances in Cryptology - ASIACRYPT 2016: 22nd International Conference on the Theory & Application of Cryptology & Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II; 2016, p135-165, 31p
Publikováno v:
Advances in Cryptology - ASIACRYPT 2015: 21st International Conference on the Theory & Application of Cryptology & Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I; 2015, p311-334, 24p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2014 IEEE 7th International Conference on Service-Oriented Computing & Applications; 2014, p266-270, 5p