Designing efficient dyadic operations for cryptographic applications (Q2191206)
From MaRDI portal
scientific article
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Designing efficient dyadic operations for cryptographic applications |
scientific article |
Statements
Designing efficient dyadic operations for cryptographic applications (English)
0 references
24 June 2020
0 references
The authors introduce a variety of techniques to improve operations on dyadic matrices which are related to certain linear codes. These matrices are useful in various code based cryptographic systems which would be secure in a post quantum setting. In particular, they show various multiplication techniques for these matrices and an improved inversion algorithm. They also show results obtained when these techniques are applied to DAGS, which is a candidate for post quantum key exchange, that uses quasi-dyadic matrices to reduce the size of the public key used in code based cryptographic systems.
0 references
post-quantum cryptography
0 references
code-based cryptography
0 references
dyadic matrices
0 references
0 references