[PDF][PDF] The Galois/counter mode of operation (GCM)

D McGrew, J Viega - submission to NIST Modes of Operation Process, 2004 - Citeseer
Galois/Counter Mode (GCM) is a block cipher mode of operation that uses universal hashing
over a binary Galois field to provide authenticated encryption. It can be implemented in …

Low complexity bit parallel architectures for polynomial basis multiplication over GF (2m)

A Reyhani-Masoleh, MA Hasan - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
Representing the field elements with respect to the polynomial (or standard) basis, we
consider bit parallel architectures for multiplication over the finite field GF (2m). In this effect …

A new approach to subquadratic space complexity parallel multipliers for extended binary fields

H Fan, MA Hasan - IEEE Transactions on Computers, 2007 - ieeexplore.ieee.org
Based on Toeplitz matrix-vector products and coordinate transformation techniques, we
present a new scheme for subquadratic space complexity parallel multiplication in GF (2 n) …

Low-complexity bit-parallel systolic Montgomery multipliers for special classes of GF (2/sup m/)

CY Lee, JS Horng, IC Jou, EH Lu - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
Recently, cryptographic applications based on finite fields have attracted much interest. This
paper presents a transformation method to implement low-complexity Montgomery …

Parallel multipliers based on special irreducible pentanomials

F Rodriguez-Henriguez, ÇK Koç - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
The state-of-the-art Galois field GF (2/sup m/) multipliers offer advantageous space and time
complexities when the field is generated by so special irreducible polynomial. To date, the …

Pyjamask: Block cipher and authenticated encryption with highly efficient masked implementation

D Goudarzi, J Jean, S Kölbl, T Peyrin… - IACR Transactions on …, 2020 - tosc.iacr.org
This paper introduces Pyjamask, a new block cipher family and authenticated encryption
proposal submitted to the NIST lightweight cryptography standardization process. Pyjamask …

Fast bit-parallel GF (2/sup n/) multiplier for all trinomials

H Fan, Y Dai - IEEE Transactions on Computers, 2005 - ieeexplore.ieee.org
Based on a new representation of GF (2/sup n/), we present two multipliers for all irreducible
trinomials. Space complexities of the multipliers match the best results. The time complexity …

Overlap-free Karatsuba–Ofman polynomial multiplication algorithms

H Fan, J Sun, M Gu, KY Lam - IET Information security, 2010 - IET
The authors describe how a simple way to split input operands allows for fast VLSI
implementations of subquadratic GF (2)[x] Karatsuba–Ofman multipliers. The theoretical …

Fast arithmetic for public-key algorithms in Galois fields with composite exponents

C Paar, P Fleischmann… - IEEE Transactions on …, 1999 - ieeexplore.ieee.org
The article describes a novel class of arithmetic architectures for Galois fields GF (2/sup k/).
The main applications of the architecture are public key systems which are based on the …

Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations

P Pullonen, S Siim - Financial Cryptography and Data Security: FC 2015 …, 2015 - Springer
Two of the major branches in secure multi-party computation research are secret sharing
and garbled circuits. This work succeeds in combining these to enable seamlessly switching …