Designing Efficient Dyadic Operations for Cryptographic Applications

  • Gustavo Banegas (Corresponding author)
  • , Paulo S.L.M. Barreto
  • , Edoardo Persichetti
  • , Paolo Santini

Research output: Contribution to journalArticleAcademicpeer-review

6 Citations (Scopus)
70 Downloads (Pure)

Abstract

Cryptographic primitives from coding theory are some of the most promising candidates for NIST's Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a particular type of symmetric matrices that appear in the automorphism group of certain linear codes. Besides the independent interest, these techniques find an immediate application in practice. In fact, one of the candidates for the Key Exchange functionality, called DAGS, makes use of quasi-dyadic matrices to provide compact keys for the scheme.

Original languageEnglish
Pages (from-to)95-109
Number of pages15
JournalJournal of Mathematical Cryptology
Volume14
Issue number1
DOIs
Publication statusPublished - 1 Jan 2020

Bibliographical note

Funding Information:
Edoardo Persichetti and Paolo Santini were supported by NSF grant CNS-1906360.

Publisher Copyright:
© 2020 G. Banegas et al., published by De Gruyter 2020.

Funding

Edoardo Persichetti and Paolo Santini were supported by NSF grant CNS-1906360.

FundersFunder number
National Science FoundationCNS-1906360
European Union's Horizon 2020 - Research and Innovation Framework Programme643161

    Keywords

    • code-based cryptography
    • dyadic matrices
    • post-quantum cryptography

    Fingerprint

    Dive into the research topics of 'Designing Efficient Dyadic Operations for Cryptographic Applications'. Together they form a unique fingerprint.

    Cite this