Efficient operation over F(24)2 for security technologies

Norito Jitsui, Yasuyuki Nogami, Hwajeong Seo, Nasima Begum

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Binary extension field F28 is recently used for AES encryption and IoT (Internet of Things) security with PUF (Physical Unclonable Function). The calculations over tower field such as F(24)2 or F((22)2)2 become more efficient than that of over F28. This paper focuses on the efficient calculations over F(24)2.

Original languageEnglish
Title of host publication2016 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509020737
DOIs
Publication statusPublished - Jul 25 2016
Event3rd IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016 - Nantou County, Taiwan, Province of China
Duration: May 27 2016May 30 2016

Other

Other3rd IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016
Country/TerritoryTaiwan, Province of China
CityNantou County
Period5/27/165/30/16

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Media Technology
  • Computer Networks and Communications
  • Signal Processing

Fingerprint

Dive into the research topics of 'Efficient operation over F(24)2 for security technologies'. Together they form a unique fingerprint.

Cite this