FACTORING POLYNOMIALS OVER NUMBER FIELDS Contents 1
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Generalizing Block LU Factorization: a Lower–Upper–Lower Block Triangular Decomposition with Minimal Off-Diagonal Ranks
Linear Algebra and its Applications 509 (2016) 114–142 Contents lists available at ScienceDirect Linear Algebra and its Applications www.elsevier.com/locate/laa Generalizing block LU factorization: A lower–upper–lower block triangular decomposition with minimal off-diagonal ranks François Serre ∗, Markus Püschel Department of Computer Science, ETH Zurich, Switzerland a r t i c l e i n f o a b s t r a c t Article history: We propose a novel factorization of a non-singular matrix P , Received 6 March 2015 viewed as a 2 × 2-blocked matrix. The factorization Accepted 23 July 2016 decomposes P into a product of three matrices that are Available online 28 July 2016 lower block-unitriangular, upper block-triangular, and lower Submitted by A. Frommer block-unitriangular, respectively. Our goal is to make this MSC: factorization “as block-diagonal as possible” by minimizing 15A23 the ranks of the off-diagonal blocks. We give lower bounds 15A03 on these ranks and show that they are sharp by providing an algorithm that computes an optimal solution. The proposed Keywords: decomposition can be viewed as a generalization of the well- Block matrices known Block LU factorization using the Schur complement. Block triangular decomposition Finally, we briefly explain one application of this factorization: LU factorization the design of optimal circuits for a certain class of streaming Rank minimization permutations. Circuit complexity © 2016 Elsevier Inc. All rights reserved. Schur complement * Corresponding author. E-mail addresses: [email protected] (F. Serre), [email protected] (M. Püschel). http://dx.doi.org/10.1016/j.laa.2016.07.020 0024-3795/© 2016 Elsevier Inc. -
Constant-Time Algorithms for ROLLO
Constant-time algorithms for ROLLO Carlos Aguilar-Melchor2, Emanuele Bellini1, Florian Caullery1, Rusydi H. Makarim1, Marc Manzano1, Chiara Marcolla1, and Victor Mateu1 1 Darkmatter LLC, Abu Dhabi, UAE 2 ISAE-SUPAERO, Universit´e de Toulouse, France Table of Contents Constant-time algorithms for ROLLO :::::::::::::::::::::::::::::: 1 Carlos Aguilar-Melchor, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Marc Manzano, Chiara Marcolla, and Victor Mateu 1 Introduction ................................................... 3 2 Preliminaries .................................................. 4 2.1 Ideal codes ............................................... 5 3 Description of the scheme ....................................... 6 4 Proposed algorithms ........................................... 8 4.1 Binary field arithmetic ..................................... 8 Carryless multiplication .................................... 9 Reduction ................................................ 11 Inversion ................................................. 11 4.2 Binary vector space arithmetic .............................. 12 Gauss elimination algorithm ................................ 12 Zassenhaus algorithm ...................................... 13 Generation of vectors of given rank .......................... 14 4.3 Composite Galois field arithmetic ........................... 14 Matrix multiplication with lazy reduction .................... 14 Polynomial inversion ....................................... 15 4.4 Rank Syndrome Recovery algorithm and -
Constant Time Algorithms for ROLLO-I-128
Constant time algorithms for ROLLO-I-128 Carlos Aguilar-Melchor1, Nicolas Aragon2†, Emanuele Bellini3, Florian Caullery3, Rusydi H. Makarim3 and Chiara Marcolla3 1 ISAE-SUPAERO, Université de Toulouse, Toulouse, France [email protected] 2 Université de Limoges, Limoges Cedex, France [email protected] 3 Cryptography Research Centre, Technology Innovation Institute, Abu Dhabi, UAE [email protected] Abstract. In this work, we propose different techniques that can be used to implement the ROLLO, and partially RQC, family of algorithms in a standalone, efficient and constant time library. For simplicity, we focus our attention on one specific instance of this family, ROLLO-I-128. For each of these techniques, we present explicit code (with intrinsics when required), or pseudo-code and performance measures to show their impact. More precisely, we use a combination of original and known results and describe procedures for Gaussian reduction of binary matrices, generation of vectors of given rank, multiplication with lazy reduction and inversion of polynomials in a composite Galois field. We also carry out a global performance analysis to show the impact of these improvements on ROLLO-I-128. Through the SUPERCOP framework, we compare it to other 128-bit secure KEMs in the NIST competition. To our knowledge, this is the first optimized full constant time implementation of ROLLO-I-128. Keywords: code-based cryptography · KEM · post-quantum cryptography · rank metric · constant time †This work was partially funded by French DGA 2 Constant time algorithms for ROLLO-I-128 Contents 1 Introduction2 1.1 Our contribution . .3 1.2 Structure of the paper .