Skip to search formSkip to main content>Semantic Scholar Semantic Scholar's Logo

Search

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

2020

2020

The NIST PQC standardization project evaluates multiple new designs for post-quantum Key Encapsulation Mechanisms (KEMs). Some of… Expand

2016

2016

Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate… Expand

2016

2016

Finite fields of characteristic 2 -- "binary fields" -- are used in a variety of applications in cryptography and data storage… Expand

Highly Cited

2015

Highly Cited

2015

Authenticated encryption schemes guarantee both privacy and integrity, and have become the default level of encryption in modern… Expand

2015

2015

This paper presents an efficient and side-channel-protected software implementation of scalar multiplication for the standard… Expand

2014

2014

This paper shows how to securely authenticate messages using just \(29\) bit operations per authenticated bit, plus a constant… Expand

2012

2012

PCLMULQDQ, a new instruction that supports GF(2)[x] multiplication, was introduced by Intel in 2010. This instruction brings… Expand

2010

2010

Executive Summary Galois-Counter-Mode (GCM) is a block cipher mode of operation that uses universal hashing over a binary Galois… Expand

2010

2010

3 Executive Summary This paper presents a fast and efficient method of computing CRC on IA processors with generic polynomials… Expand

Highly Cited

2010

Highly Cited

2010

The Intel ® PCLMULQDQ instruction is a new instruction available beginning with the all new 2010 Intel ® Core™ processor family… Expand