Designing efficient dyadic operations for cryptographic applications (Q2191206)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Designing efficient dyadic operations for cryptographic applications
scientific article

    Statements

    Designing efficient dyadic operations for cryptographic applications (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    24 June 2020
    0 references
    The authors introduce a variety of techniques to improve operations on dyadic matrices which are related to certain linear codes. These matrices are useful in various code based cryptographic systems which would be secure in a post quantum setting. In particular, they show various multiplication techniques for these matrices and an improved inversion algorithm. They also show results obtained when these techniques are applied to DAGS, which is a candidate for post quantum key exchange, that uses quasi-dyadic matrices to reduce the size of the public key used in code based cryptographic systems.
    0 references
    post-quantum cryptography
    0 references
    code-based cryptography
    0 references
    dyadic matrices
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references