Cryptographic primitives from coding theory are some of the most promising candidates for NIST's Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a particular type of symmetric matrices that appear in the automorphism group of certain linear codes. Besides the independent interest, these techniques find an immediate application in practice. In fact, one of the candidates for the Key Exchange functionality, called DAGS, makes use of quasi-dyadic matrices to provide compact keys for the scheme.

Designing Efficient Dyadic Operations for Cryptographic Applications / Banegas, G; Barreto, Pslm; Persichetti, E; Santini, P. - In: JOURNAL OF MATHEMATICAL CRYPTOLOGY. - ISSN 1862-2976. - 14:1(2020), pp. 95-109. [10.1515/jmc-2015-0054]

Designing Efficient Dyadic Operations for Cryptographic Applications

Persichetti, E;
2020

Abstract

Cryptographic primitives from coding theory are some of the most promising candidates for NIST's Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a particular type of symmetric matrices that appear in the automorphism group of certain linear codes. Besides the independent interest, these techniques find an immediate application in practice. In fact, one of the candidates for the Key Exchange functionality, called DAGS, makes use of quasi-dyadic matrices to provide compact keys for the scheme.
2020
post-quantum cryptography; code-based cryptography; dyadic matrices
01 Pubblicazione su rivista::01a Articolo in rivista
Designing Efficient Dyadic Operations for Cryptographic Applications / Banegas, G; Barreto, Pslm; Persichetti, E; Santini, P. - In: JOURNAL OF MATHEMATICAL CRYPTOLOGY. - ISSN 1862-2976. - 14:1(2020), pp. 95-109. [10.1515/jmc-2015-0054]
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1667091
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 4
  • ???jsp.display-item.citation.isi??? 3
social impact