Designing Efficient Dyadic Operations for Cryptographic Applications
Cryptographic primitives from coding theory are some of the most promising candidates for NIST’s Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a particular type of symmetric matrices that appear in the...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2020-06-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2015-0054 |
id |
doaj-500fba8fc29744f884cf71ffa4245688 |
---|---|
record_format |
Article |
spelling |
doaj-500fba8fc29744f884cf71ffa42456882021-09-06T19:40:44ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842020-06-011419510910.1515/jmc-2015-0054jmc-2015-0054Designing Efficient Dyadic Operations for Cryptographic ApplicationsBanegas Gustavo0Barreto Paulo S. L. M.1Persichetti Edoardo2Santini Paolo3Technische Universiteit Eindhoven, Eindhoven, NetherlandsInstitute of Technology, University of Washington at Tacoma, Tacoma, United States of AmericaDepartment of Mathematical Sciences, Florida Atlantic University, Boca Raton, United States of AmericaUniversità Politecnica delle Marche, Ancona, ItalyCryptographic primitives from coding theory are some of the most promising candidates for NIST’s Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a particular type of symmetric matrices that appear in the automorphism group of certain linear codes. Besides the independent interest, these techniques find an immediate application in practice. In fact, one of the candidates for the Key Exchange functionality, called DAGS, makes use of quasi-dyadic matrices to provide compact keys for the scheme.https://doi.org/10.1515/jmc-2015-0054post-quantum cryptographycode-based cryptographydyadic matrices11t7194a60 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Banegas Gustavo Barreto Paulo S. L. M. Persichetti Edoardo Santini Paolo |
spellingShingle |
Banegas Gustavo Barreto Paulo S. L. M. Persichetti Edoardo Santini Paolo Designing Efficient Dyadic Operations for Cryptographic Applications Journal of Mathematical Cryptology post-quantum cryptography code-based cryptography dyadic matrices 11t71 94a60 |
author_facet |
Banegas Gustavo Barreto Paulo S. L. M. Persichetti Edoardo Santini Paolo |
author_sort |
Banegas Gustavo |
title |
Designing Efficient Dyadic Operations for Cryptographic Applications |
title_short |
Designing Efficient Dyadic Operations for Cryptographic Applications |
title_full |
Designing Efficient Dyadic Operations for Cryptographic Applications |
title_fullStr |
Designing Efficient Dyadic Operations for Cryptographic Applications |
title_full_unstemmed |
Designing Efficient Dyadic Operations for Cryptographic Applications |
title_sort |
designing efficient dyadic operations for cryptographic applications |
publisher |
De Gruyter |
series |
Journal of Mathematical Cryptology |
issn |
1862-2976 1862-2984 |
publishDate |
2020-06-01 |
description |
Cryptographic primitives from coding theory are some of the most promising candidates for NIST’s Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a particular type of symmetric matrices that appear in the automorphism group of certain linear codes. Besides the independent interest, these techniques find an immediate application in practice. In fact, one of the candidates for the Key Exchange functionality, called DAGS, makes use of quasi-dyadic matrices to provide compact keys for the scheme. |
topic |
post-quantum cryptography code-based cryptography dyadic matrices 11t71 94a60 |
url |
https://doi.org/10.1515/jmc-2015-0054 |
work_keys_str_mv |
AT banegasgustavo designingefficientdyadicoperationsforcryptographicapplications AT barretopauloslm designingefficientdyadicoperationsforcryptographicapplications AT persichettiedoardo designingefficientdyadicoperationsforcryptographicapplications AT santinipaolo designingefficientdyadicoperationsforcryptographicapplications |
_version_ |
1717767895165960192 |