Semantic Scholar uses AI to extract papers important to this topic.
The NIST PQC standardization project evaluates multiple new designs for post-quantum Key Encapsulation Mechanisms (KEMs). Some of… Expand Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate… Expand Finite fields of characteristic 2 -- "binary fields" -- are used in a variety of applications in cryptography and data storage… Expand Authenticated encryption schemes guarantee both privacy and integrity, and have become the default level of encryption in modern… Expand This paper presents an efficient and side-channel-protected software implementation of scalar multiplication for the standard… Expand This paper shows how to securely authenticate messages using just \(29\) bit operations per authenticated bit, plus a constant… Expand PCLMULQDQ, a new instruction that supports GF(2)[x] multiplication, was introduced by Intel in 2010. This instruction brings… Expand Executive Summary Galois-Counter-Mode (GCM) is a block cipher mode of operation that uses universal hashing over a binary Galois… Expand 3 Executive Summary This paper presents a fast and efficient method of computing CRC on IA processors with generic polynomials… Expand The Intel ® PCLMULQDQ instruction is a new instruction available beginning with the all new 2010 Intel ® Core™ processor family… Expand