Efficiently masking polynomial inversion at arbitrary order
From MaRDI portal
Publication:6166989
Recommendations
Cites work
- scientific article; zbMATH DE number 3948147 (Why is no real title available?)
- scientific article; zbMATH DE number 1186948 (Why is no real title available?)
- scientific article; zbMATH DE number 1878339 (Why is no real title available?)
- A fast algorithm for computing multiplicative inverses in \(\text{GF}(2^ m)\) using normal bases
- A method for obtaining digital signatures and public-key cryptosystems
- Advances in Cryptology - CRYPTO 2003
- Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto
- Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices
- High-speed key encapsulation from NTRU
- Leakage assessment methodology. A clear roadmap for side-channel evaluations
- NTRU prime: reducing attack surface at low cost
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Towards sound approaches to counteract power-analysis attacks
Cited in
(3)
This page was built for publication: Efficiently masking polynomial inversion at arbitrary order
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6166989)