Loading...
Search for: finite-fields
0.006 seconds

    Division Algebras with Radicable Multiplicative Groups

    , Article Communications in Algebra ; Volume 39, Issue 11 , 2011 , Pages 4084-4096 ; 00927872 (ISSN) Mahdavi Hezavehi, M ; Motiee, M ; Sharif University of Technology
    Abstract
    Given a divisible finite field extension K/F, the structure of Br(F), the Brauer group of F, is investigated. It is shown that, if F is indivisible, then Br(F) ≅ ℤ 2, which generalizes the Frobenius Theorem. As a consequence, when F is indivisible, the class of all finite dimensional non-commutative F-central division algebras D having radicable multiplicative groups D* is determined. In fact, it is proved that the following statements are equivalent: (1) D is radicable, (2) D contains a divisible subfield K/F, and (3) D is the ordinary quaternion division algebra and F(√-1) is divisible  

    High-throughput low-complexity systolic montgomery multiplication over GF(2m) Based on Trinomials

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; Volume 62, Issue 4 , January , 2015 , Pages 377-381 ; 15497747 (ISSN) Bayat Sarmadi, S ; Farmani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Cryptographic computation exploits finite field arithmetic and, in particular, multiplication. Lightweight and fast implementations of such arithmetic are necessary for many sensitive applications. This brief proposed a low-complexity systolic Montgomery multiplication over GF(2m). Our complexity analysis shows that the area complexity of the proposed architecture is reduced compared with the previous work. This has also been confirmed through our application-specific integrated circuit area and time equivalent estimations and implementations. Hence, the proposed architecture appears to be very well suited for high-throughput low-complexity cryptographic applications  

    Division Algebra with Radicable Multiplicative Groups

    , M.Sc. Thesis Sharif University of Technology Fakharan, Mohammad Hossein (Author) ; Mahdavi Hazavehi, Mohammad (Supervisor)
    Abstract
    Given a divisible finite field extension KjF, the structure of Br(F), the Brauer group of F, is investigated. It is shown that, if F is indivisible, then Br(F) = Z2, which generalizes the Frobenius Theorem. As a consequence, when F is indivisible, the class of all finite dimensional non-commutative F-central division algebras D having radicable multiplicative groups D is determined. In fact, it is proved that the following statements are equivalent: (1) D is radicable, (2) D contains a divisible subfield KjF, and (3) D is the ordinary quaternion division algebra and F(p 1) is divisible  

    High Speed Implementation of Finite Field Multiplier Suitable for Isogeny-Based Protocols

    , M.Sc. Thesis Sharif University of Technology Alivand, Armin (Author) ; Bayat Sarmadi, Siavash (Supervisor)
    Abstract
    Classic public key cryptographic systems are based on difficult mathematical problems that will lose their security with the advent of high-speed quantum computers. Isogeny-based cryptography is one of the five main methods in post-quantum cryptography, the hard problem of which is finding large-degree isogenies between elliptic curves. The most important advantage of isogeny-based protocols is the shorter public key length and the main problem is their low speed and low performance compared to other cryptographic systems. Due to the fact that these protocols are implemented on a finite field using basic operations, such as multiplication, squaring, addition, and subtraction, improving the... 

    High-throughput low-complexity unified multipliers over GF(2m) in dual and triangular bases

    , Article IEEE Transactions on Circuits and Systems I: Regular Papers ; Volume PP, Issue 99 , 2016 ; 15498328 (ISSN) Salarifard, R ; Bayat Sarmadi, S ; Farmani, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Multiplication is an essential operation in cryptographic computations. One of the important finite fields for such computations is the binary extension field. High-throughput low-complexity multiplication architectures lead to more efficient cryptosystems. In this paper, a high-throughput low-complexity unified multiplier for triangular and dual bases is presented, and is referred to as basic architecture. This multiplier enjoys slightly simpler and more regular structure due to use of the mentioned bases. Additionally, structurally improved architectures have been proposed, which have smaller time complexity than basic ones. This is achieved by the use of parallel processing method.... 

    Division Algebras with Radicable Multiplicative Groups

    , M.Sc. Thesis Sharif University of Technology Bahari Salim, Sajad (Author) ; Mahdavi Hezavehi, Mohammad (Supervisor)
    Abstract
    Given a divisible finite field extension K/F, the structure of Br(F), the Brauer group of F, is investigated. It is shown that, if F is indivisible, then Br(F) ≃ Z_2, which generalizes the Frobenius Theorem. As a consequence, when F is indivisible, the class of all finite dimensional non-commutative F-central division algebras D having radicable multiplicative groups is determined. In fact, it is proved that the following statements are equivalent: (1) D is radicable, (2) D contains a divisible subfield K/F, and (3) D is the ordinary quaternion division algebra and F(√-1) is divisible  

    Investigating and Improving the Efficiency of the Implementations for the Finite Field Inversion Operation

    , M.Sc. Thesis Sharif University of Technology Rooh Ghalandari, Reza (Author) ; Bayat Sarmadi, Siavash (Co-Supervisor)
    Abstract
    Public-key cryptography is one of the most practical cryptographic systems today, featuring no need for pre-established secure channel for key exchange. In recent years, major operations in PKE domain such as exponentiation, pairing, ECC and isogeny have been subject of research and numerous studies towards temporal or spatial optimizations. Inversion, being one of the most important operations in this area, requires heavy processing and is considered very time consuming. Hence, aiming to increase performance and speed in PKE processors, addressing Inversion operation in finite fields for improved area and speed is deemed necessary. In cryptographic systems, binary fields are very convenient... 

    On The Weil Conjectures

    , M.Sc. Thesis Sharif University of Technology Rezaee, Fatemeh (Author) ; Jafari, Amir (Supervisor)
    Abstract
    ” The story of the "Weil conjectures" is a marvelous example of mathematical imagination, and one of the most striking instances exhibiting the fundamental unity of mathematics.”In 1949,Andre Weil stated some conjectures on the zeta function of Algebraic varieties over finite fields .These conjectures were analogue of the properties of Riemann zeta function ,in particular Riemann hypothesis.In fact ,Weil built a bridge between Diophantine structure on varieties over finite fields (Counting of rational points on varieties) and cohomological structure of them over the field of complex numbers(topology of variety).In this thesis, first we state Weil’s motivations for these conjectures and state... 

    Dual-basis superserial multipliers for secure applications and lightweight cryptographic architectures

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; Vol. 61, Issue. 2 , February , 2014 , pp. 125-129 ; ISSN: 15497747 Bayat-Sarmadi, S ; Mozaffari Kermani, M ; Azarderakhsh, R ; Lee, C. Y ; Sharif University of Technology
    Abstract
    Cryptographic algorithms utilize finite-field arithmetic operations in their computations. Due to the constraints of the nodes which benefit from the security and privacy advantages of these algorithms in sensitive applications, these algorithms need to be lightweight. One of the well-known bases used in sensitive computations is dual basis (DB). In this brief, we present low-complexity superserial architectures for the DB multiplication over GF (2m). To the best of our knowledge, this is the first time that such a multiplier is proposed in the open literature. We have performed complexity analysis for the proposed lightweight architectures, and the results show that the hardware complexity... 

    A self-synchronized chaotic image encryption scheme

    , Article Signal Processing: Image Communication ; Volume 36 , August , 2015 , Pages 106-114 ; 09235965 (ISSN) Daneshgar, A ; Khadem, B ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Abstract In this paper, a word based chaotic image encryption scheme for gray images is proposed that can be used in both synchronous and self-synchronous modes. The encryption scheme operates in a finite field where we have also analyzed its performance according to numerical precision used in implementation. We show that the scheme not only passes a variety of security tests, but also it is verified that the proposed scheme operates faster than other existing schemes of the same type even when using lightweight short key sizes  

    Fundamental limits of distributed encoding

    , Article 2020 IEEE International Symposium on Information Theory, ISIT 2020, 21 July 2020 through 26 July 2020 ; Volume 2020-June , August , 2020 , Pages 798-803 Abadi Khooshemehr, N ; Maddah Ali, M. A ; IEEE Information Theory Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In general coding theory, we often assume that error is observed in transferring or storing encoded symbols, while the process of encoding itself is error-free. Motivated by recent applications of coding theory, we introduce the problem of distributed encoding which is comprised of a set of K ϵ isolated source nodes and N ϵ encoding nodes. Each source node has one symbol from a finite field, which is sent to each of the encoding nodes. Each encoding node stores an encoded symbol from the same field, as a function of the received symbols. However, some of the source nodes are controlled by the adversary and may send different symbols to different encoding nodes. Depending on the number of... 

    Anonymous Mutual Authentication: An Information Theoretic Framework

    , Article 9th Iran Workshop on Communication and Information Theory, IWCIT 2021, 19 May 2021 through 20 May 2021 ; 2021 ; 9781665400565 (ISBN) Kazempour, N ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    We consider the anonymous mutual authentication problem, which consists of a certificate authority, single or multiple verifiers, many legitimate users (provers) and any arbitrary number of illegitimate users. The legal verifier and a legitimate user must be mutually authenticated to each other using the user's key, while the identity of the user must stay unrevealed. An attacker (illegitimate prover) as well as an illegal verifier must fail in authentication. A general interactive information theoretic framework in a finite field is proposed, where the normalized total key rate as a metric for reliability is defined. Maximizing this rate has a trade-off with establishing anonymity. The... 

    Fundamental limits of distributed linear encoding

    , Article IEEE Transactions on Information Theory ; Volume 67, Issue 12 , 2021 , Pages 7985-7998 ; 00189448 (ISSN) Khooshemehr, N. A ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    In general coding theory, we often assume that error is observed in transferring or storing encoded symbols, while the process of encoding itself is error-free. Motivated by recent applications of coding theory, in this paper, we consider the case where the process of encoding is distributed and prone to error. We introduce the problem of distributed encoding, comprised of a set of K ∈ N isolated source nodes and N ∈ N encoding nodes. Each source node has one symbol from a finite field, which is sent to each of the encoding nodes. Each encoding node stores an encoded symbol from the same field, as a function of the received symbols. However, some of the source nodes are controlled by the... 

    Design of Deterministic Matrices for Compressed Sensing Using Finite Fields

    , M.Sc. Thesis Sharif University of Technology Abin, Hamidreza (Author) ; Amini, Arash (Supervisor)
    Abstract
    The design of deterministic sensing matrices is an important issue in compressive sensing in sparse signal processing. Various designs using finite field structures, combinatorics, and coding theory have been presented. The contribution of this thesis is designing many codes with large minimum distance using algebraic curves. Here, we initially design a algebraic-geometric code over a maximal curve in a Galoi field Fpm Afterwards, we map the code to the field Fp using trace map. This code has a large minimum distance. Using this code, we design a matrix with low coherence. One of the main issues in presented designs is that the number of matrix rows is considered to specific integers near... 

    Linear index coding via graph homomorphism

    , Article Proceedings - 2014 International Conference on Control, Decision and Information Technologies, CoDIT 2014 ; 2014 , pp. 158-163 ; ISBN: 9781479967735 Ebrahimi, J. B ; Siavoshani, M. J ; Sharif University of Technology
    Abstract
    In [1], [2] it is shown that the minimum broadcast rate of a linear index code over a finite field Fq is equal to an algebraic invariant of the underlying digraph, called minrankq. In [3], it is proved that for F2 and any positive integer k, minrankq(G) ≤ k if and only if there exists a homomorphism from the complement of the graph G to the complement of a particular undirected graph family called 'graph family {Gk}'. As observed in [2], by combining these two results one can relate the linear index coding problem of undirected graphs to the graph homomorphism problem. In [4], a direct connection between linear index coding problem and graph homomorphism problem is introduced. In contrast to... 

    Slepian-Wolf coding over cooperative relay networks

    , Article IEEE Transactions on Information Theory ; Volume 57, Issue 6 , June , 2011 , Pages 3462-3482 ; 00189448 (ISSN) Yassaee, M. H ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    This paper deals with the problem of multicasting a set of discrete memoryless correlated sources (DMCS) over a cooperative relay network. Necessary conditions with cut-set interpretation are presented. A Joint source-Wyner-Ziv encoding/sliding window decoding scheme is proposed, in which decoding at each receiver is done with respect to an ordered partition of other nodes. For each ordered partition a set of feasibility constraints is derived. Then, utilizing the submodular property of the entropy function and a novel geometrical approach, the results of different ordered partitions are consolidated, which lead to sufficient conditions for our problem. The proposed scheme achieves... 

    Performance analysis of network coding-based content distribution in vehicular ad-hoc networks

    , Article IET Communications ; Vol. 8, issue. 9 , 2014 , p. 1447-1458 Amerimehr, M. H ; Ashtiani, F ; Sharif University of Technology
    Abstract
    The authors investigate the content distribution among the vehicles of a cluster in a vehicular ad-hoc network, exploiting network coding. The vehicles collaborate to disseminate the coded data packets, received from a roadside info-station based on IEEE 802.11 medium access control (MAC) protocol. Two types of network coding are considered: random linear network coding (RLNC) over a large finite field and random XORed network coding (RXNC). An analytical model is proposed to address the effect of random access MAC as well as the correlation among received coded packets on the performance of content distribution. First, a p-persistent carrier sense multiple access approximation for IEEE... 

    Network coding based reliable broadcasting in wireless ad-hoc networks

    , Article 15th IEEE International Conference on Networks, ICON 2007, Adelaide, SA, 19 November 2007 through 21 November 2007 ; January , 2007 , Pages 525-530 ; 1424412307 (ISBN); 9781424412303 (ISBN) Mansouri, H. S ; Pakravan, M. R ; Sharif University of Technology
    2007
    Abstract
    Some Applications need to propagate important and critical data to all nodes in a wireless ad-hoc network. Flooding and its variants are good and simple protocols to achieve this target, but they are not efficient. Network coding can improve the performance of these algorithms. In designing such algorithms there are some important parameters which should be taken into account. Energy consumption, coverage and total delay are the most important parameters in a wireless ad-hoc network. Also in the network coding based algorithms, complexity of coding and packet overhead that network coding inserts to the system are important design parameters. In this article, XRBCast, a reliable and energy...