Designing Efficient Dyadic Operations For Cryptographic Applications

JOURNAL OF MATHEMATICAL CRYPTOLOGY(2020)

引用 2|浏览58
暂无评分
摘要
Cryptographic primitives from coding theory are some of the most promising candidates for NIST's Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a particular type of symmetric matrices that appear in the automorphism group of certain linear codes. Besides the independent interest, these techniques find an immediate application in practice. In fact, one of the candidates for the Key Exchange functionality, called DAGS, makes use of quasi-dyadic matrices to provide compact keys for the scheme.
更多
查看译文
关键词
post-quantum cryptography, code-based cryptography, dyadic matrices
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要