Generalizing Block LU Factorization: a Lower–Upper–Lower Block Triangular Decomposition with Minimal Off-Diagonal Ranks
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
FACTORING POLYNOMIALS OVER NUMBER FIELDS Contents 1
FACTORING POLYNOMIALS OVER NUMBER FIELDS ANDREA MUNARO Graduate Seminar Contents 1. Introduction 1 2. Lattices 1 2.1. Two-dimensional lattice reduction 5 2.2. Lattice reduction in any dimension 6 3. Factoring over Q[X] 13 3.1. Zassenhaus' algorithm 14 3.2. Factoring using LLL algorithm 23 4. Factoring over number fields 26 References 27 1. Introduction The purpose of these notes is to give a substantially self-contained introduction to the factori- zation of polynomials over number fields. In particular, we present Zassenhaus' algorithm and a factoring algorithm using lattice reduction, which were, respectively, the best in practice and in theory, before 2002. We give references for the van Hoeij-Novocin algorithm, currently the best both in practice and in theory. The next section is devoted to introduce lattices, which are relevant for the algorithms. 2. Lattices n We consider R as a metric space with the Euclidean metric. Then, as in any topological space, we have the notion of discretness. We can reformulate it as follows. n Definition 1. A subset D of R is called discrete if it has no limit points, that is, for all x 2 D, there exists ρ > 0 such that B(x; ρ) \ D = fxg. n n n ∗ Example 1. Z is discrete (take ρ = 1=2), while Q and R are not. The set f1=n : n 2 N g is ∗ discrete but the set f0g [ f1=n : n 2 N g is not. n n Definition 2. A lattice L in R is a discrete subgroup of the additive group R . -
Constant-Time Algorithms for ROLLO
Constant-time algorithms for ROLLO Carlos Aguilar-Melchor2, Emanuele Bellini1, Florian Caullery1, Rusydi H. Makarim1, Marc Manzano1, Chiara Marcolla1, and Victor Mateu1 1 Darkmatter LLC, Abu Dhabi, UAE 2 ISAE-SUPAERO, Universit´e de Toulouse, France Table of Contents Constant-time algorithms for ROLLO :::::::::::::::::::::::::::::: 1 Carlos Aguilar-Melchor, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Marc Manzano, Chiara Marcolla, and Victor Mateu 1 Introduction ................................................... 3 2 Preliminaries .................................................. 4 2.1 Ideal codes ............................................... 5 3 Description of the scheme ....................................... 6 4 Proposed algorithms ........................................... 8 4.1 Binary field arithmetic ..................................... 8 Carryless multiplication .................................... 9 Reduction ................................................ 11 Inversion ................................................. 11 4.2 Binary vector space arithmetic .............................. 12 Gauss elimination algorithm ................................ 12 Zassenhaus algorithm ...................................... 13 Generation of vectors of given rank .......................... 14 4.3 Composite Galois field arithmetic ........................... 14 Matrix multiplication with lazy reduction .................... 14 Polynomial inversion ....................................... 15 4.4 Rank Syndrome Recovery algorithm and -
Constant Time Algorithms for ROLLO-I-128
Constant time algorithms for ROLLO-I-128 Carlos Aguilar-Melchor1, Nicolas Aragon2†, Emanuele Bellini3, Florian Caullery3, Rusydi H. Makarim3 and Chiara Marcolla3 1 ISAE-SUPAERO, Université de Toulouse, Toulouse, France [email protected] 2 Université de Limoges, Limoges Cedex, France [email protected] 3 Cryptography Research Centre, Technology Innovation Institute, Abu Dhabi, UAE [email protected] Abstract. In this work, we propose different techniques that can be used to implement the ROLLO, and partially RQC, family of algorithms in a standalone, efficient and constant time library. For simplicity, we focus our attention on one specific instance of this family, ROLLO-I-128. For each of these techniques, we present explicit code (with intrinsics when required), or pseudo-code and performance measures to show their impact. More precisely, we use a combination of original and known results and describe procedures for Gaussian reduction of binary matrices, generation of vectors of given rank, multiplication with lazy reduction and inversion of polynomials in a composite Galois field. We also carry out a global performance analysis to show the impact of these improvements on ROLLO-I-128. Through the SUPERCOP framework, we compare it to other 128-bit secure KEMs in the NIST competition. To our knowledge, this is the first optimized full constant time implementation of ROLLO-I-128. Keywords: code-based cryptography · KEM · post-quantum cryptography · rank metric · constant time †This work was partially funded by French DGA 2 Constant time algorithms for ROLLO-I-128 Contents 1 Introduction2 1.1 Our contribution . .3 1.2 Structure of the paper .