Correlated pseudorandomness from the hardness of quasi-abelian decoding

M Bombar, G Couteau, A Couvreur… - Annual International …, 2023 - Springer
A recent paradigm put forth by Boyle et al.(CCS 2018, Crypto 2019) showed how
pseudorandom correlation generators (PCG) can be used to generate large amounts of …

Optimizing bike for the intel haswell and arm cortex-m4

MS Chen, T Chou, M Krausz - Cryptology ePrint Archive, 2021 - eprint.iacr.org
BIKE is a key encapsulation mechanism that entered the third round of the NIST post-
quantum cryptography standardization process. This paper presents two constant-time …

The discrete Fourier transform over the binary finite field

SV Fedorenko - IEEE Access, 2023 - ieeexplore.ieee.org
The novel methods for binary discrete Fourier transform (DFT) computation over the finite
field have been proposed. The methods are based on a binary trace calculation over the …

Uni/multi variate polynomial embeddings for zkSNARKs

G Gong - Cryptography and Communications, 2024 - Springer
A zero-knowledge proof is a cryptographic primitive that enables a prover to convince a
verifier the validity of a mathematical statement (an NP statement) without revealing any …

Multiplying boolean polynomials with Frobenius partitions in additive fast Fourier transform

MS Chen, CM Cheng, PC Kuo, WD Li… - arXiv preprint arXiv …, 2018 - arxiv.org
We show a new algorithm and its implementation for multiplying bit-polynomials of large
degrees. The algorithm is based on evaluating polynomials at a specific set comprising a …

Polylogarithmic Proofs for Multilinears over Binary Towers

BE Diamond, J Posen - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We introduce a polylogarithmic-verifier polynomial commitment scheme for multilinears over
towers of binary fields. To achieve this, we adapt an idea of Zeilberger, Chen and Fisch's …

Fast transforms over finite fields of characteristic two

N Coxon - Journal of Symbolic Computation, 2021 - Elsevier
We describe new fast algorithms for evaluation and interpolation on the “novel” polynomial
basis over finite fields of characteristic two introduced by Lin et al.(2014). Fast algorithms are …

An Efficient Reed-Solomon Erasure Code over Cantor-constructed Binary Extension Finite Fields

Z Li, YS Han, SJ Lin, C Chen - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
In this paper, we investigate the properties of the novel polynomial basis proposed by Lin,
Chung, and Han over Cantor-constructed binary extension finite fields and propose an …

Side-channel security for post-quantum cryptography

M Krausz - 2024 - hss-opus.ub.ruhr-unibochum.de
Post-quantum cryptography addresses the threat to our established asymmetric
cryptography posed by quantum computers. Like conventional cryptography …

[PDF][PDF] Structured Codes for Cryptography: from Source of Hardness to Applications

M BOMBAR - 2023 - maximebombar.fr
Remote communications are taking more and more importance in our everyday lives: from
accessing our bank accounts and health data, communicating with family, friends and co …