We consider the problem of securely generating useful instances of two-party correlations, such as many independent copies of a random oblivious transfer (OT) correlation, using a …
BIKE is a key encapsulation mechanism that entered the third round of the NIST post- quantum cryptography standardization process. This paper presents two constant-time …
G Couteau, M Zarezadeh - International Conference on the Theory and …, 2022 - Springer
We put forth a new cryptographic primitive for securely computing inner-products in a scalable, non-interactive fashion: any party can broadcast a public (computationally hiding) …
N Coxon - Journal of Symbolic Computation, 2021 - Elsevier
We describe new fast algorithms for evaluation and interpolation on the “novel” polynomial basis over finite fields of characteristic two introduced by Lin et al.(2014). Fast algorithms are …
S Covanov - Theoretical Computer Science, 2019 - Elsevier
Abstract In 2012, Barbulescu, Detrey, Estibals and Zimmermann proposed a new framework to exhaustively search for optimal formulas for evaluating bilinear maps over finite fields …
The multiplication of polynomials is a fundamental operation in complexity theory. Indeed, for many arithmetic problems, the complexity of algorithms is expressed in terms of the …
A Mathieu-Mahias, M Quisquater - Proceedings of the 45th International …, 2020 - dl.acm.org
Lin, Chung and Han introduced in 2014 the LCH-basis in order to derive FFT-based multipoint evaluation and interpolation algorithms with respect to this polynomial basis …