Skip to search formSkip to main contentSkip to account menuSemantic Scholar Semantic Scholar's Logo Search 205,565,653 papers from all fields of science

Search

Semantic Scholar uses AI to extract papers important to this topic.

2020

2020

The NIST PQC standardization project evaluates multiple new designs for post-quantum Key Encapsulation Mechanisms (KEMs). Some of…

2016

2016

Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate…

2016

2016

Finite fields of characteristic 2 -- "binary fields" -- are used in a variety of applications in cryptography and data storage…

2015

2015

This paper presents an efficient and side-channel-protected software implementation of scalar multiplication for the standard…

Highly Cited

2015

Highly Cited

2015

Authenticated encryption schemes guarantee both privacy and integrity, and have become the default level of encryption in modern…

2014

2014

This paper shows how to securely authenticate messages using just \(29\) bit operations per authenticated bit, plus a constant…

2012

2010

2010

3 Executive Summary This paper presents a fast and efficient method of computing CRC on IA processors with generic polynomials…

Highly Cited

2010

Highly Cited

2010

The Intel ® PCLMULQDQ instruction is a new instruction available beginning with the all new 2010 Intel ® Core™ processor family…