Articles with "dyadic operations" as a keyword



Photo from academic.microsoft.com

Designing Efficient Dyadic Operations for Cryptographic Applications

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Mathematical Cryptology"

DOI: 10.1515/jmc-2015-0054

Abstract: Abstract Cryptographic primitives from coding theory are some of the most promising candidates for NIST’s Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a… read more here.

Keywords: dyadic operations; cryptographic applications; operations cryptographic; designing efficient ... See more keywords