Efficient operation over F(24)2 for security technologies

Norito Jitsui, Yasuyuki Nogami, Hwajeong Seo, Nasima Begum

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Binary extension field F28 is recently used for AES encryption and IoT (Internet of Things) security with PUF (Physical Unclonable Function). The calculations over tower field such as F(24)2 or F((22)2)2 become more efficient than that of over F28. This paper focuses on the efficient calculations over F(24)2.

Original languageEnglish
Title of host publication2016 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509020737
DOIs
Publication statusPublished - Jul 25 2016
Event3rd IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016 - Nantou County, Taiwan, Province of China
Duration: May 27 2016May 30 2016

Other

Other3rd IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016
CountryTaiwan, Province of China
CityNantou County
Period5/27/165/30/16

Fingerprint

Towers
Cryptography
Internet of things
Hardware security

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Media Technology
  • Computer Networks and Communications
  • Signal Processing

Cite this

Jitsui, N., Nogami, Y., Seo, H., & Begum, N. (2016). Efficient operation over F(24)2 for security technologies. In 2016 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016 [7520896] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICCE-TW.2016.7520896

Efficient operation over F(24)2 for security technologies. / Jitsui, Norito; Nogami, Yasuyuki; Seo, Hwajeong; Begum, Nasima.

2016 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016. Institute of Electrical and Electronics Engineers Inc., 2016. 7520896.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jitsui, N, Nogami, Y, Seo, H & Begum, N 2016, Efficient operation over F(24)2 for security technologies. in 2016 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016., 7520896, Institute of Electrical and Electronics Engineers Inc., 3rd IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016, Nantou County, Taiwan, Province of China, 5/27/16. https://doi.org/10.1109/ICCE-TW.2016.7520896
Jitsui N, Nogami Y, Seo H, Begum N. Efficient operation over F(24)2 for security technologies. In 2016 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016. Institute of Electrical and Electronics Engineers Inc. 2016. 7520896 https://doi.org/10.1109/ICCE-TW.2016.7520896
Jitsui, Norito ; Nogami, Yasuyuki ; Seo, Hwajeong ; Begum, Nasima. / Efficient operation over F(24)2 for security technologies. 2016 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016. Institute of Electrical and Electronics Engineers Inc., 2016.
@inproceedings{267303d7d691479bb03c5857af20e407,
title = "Efficient operation over F(24)2 for security technologies",
abstract = "Binary extension field F28 is recently used for AES encryption and IoT (Internet of Things) security with PUF (Physical Unclonable Function). The calculations over tower field such as F(24)2 or F((22)2)2 become more efficient than that of over F28. This paper focuses on the efficient calculations over F(24)2.",
author = "Norito Jitsui and Yasuyuki Nogami and Hwajeong Seo and Nasima Begum",
year = "2016",
month = "7",
day = "25",
doi = "10.1109/ICCE-TW.2016.7520896",
language = "English",
booktitle = "2016 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Efficient operation over F(24)2 for security technologies

AU - Jitsui, Norito

AU - Nogami, Yasuyuki

AU - Seo, Hwajeong

AU - Begum, Nasima

PY - 2016/7/25

Y1 - 2016/7/25

N2 - Binary extension field F28 is recently used for AES encryption and IoT (Internet of Things) security with PUF (Physical Unclonable Function). The calculations over tower field such as F(24)2 or F((22)2)2 become more efficient than that of over F28. This paper focuses on the efficient calculations over F(24)2.

AB - Binary extension field F28 is recently used for AES encryption and IoT (Internet of Things) security with PUF (Physical Unclonable Function). The calculations over tower field such as F(24)2 or F((22)2)2 become more efficient than that of over F28. This paper focuses on the efficient calculations over F(24)2.

UR - http://www.scopus.com/inward/record.url?scp=84983483194&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84983483194&partnerID=8YFLogxK

U2 - 10.1109/ICCE-TW.2016.7520896

DO - 10.1109/ICCE-TW.2016.7520896

M3 - Conference contribution

BT - 2016 IEEE International Conference on Consumer Electronics-Taiwan, ICCE-TW 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -