15 research outputs found
Analysis and Synthesis of Digital Dyadic Sequences
We explore the space of matrix-generated (0, m, 2)-nets and (0, 2)-sequences
in base 2, also known as digital dyadic nets and sequences. In computer
graphics, they are arguably leading the competition for use in rendering. We
provide a complete characterization of the design space and count the possible
number of constructions with and without considering possible reorderings of
the point set. Based on this analysis, we then show that every digital dyadic
net can be reordered into a sequence, together with a corresponding algorithm.
Finally, we present a novel family of self-similar digital dyadic sequences, to
be named -sequences, that spans a subspace with fewer degrees of freedom.
Those -sequences are extremely efficient to sample and compute, and we
demonstrate their advantages over the classic Sobol (0, 2)-sequence.Comment: 17 pages, 11 figures. Minor improvement of exposition; references to
earlier proofs of Theorems 3.1 and 3.3 adde
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
The GLV method of Gallant, Lambert and Vanstone~(CRYPTO 2001) computes any multiple of a point of prime order lying on an elliptic curve with a low-degree endomorphism (called GLV curve) over as , with for some explicit constant . Recently, Galbraith, Lin and Scott (EUROCRYPT 2009) extended this method to all curves over which are twists of curves defined over .
We show in this work how to merge the two approaches in order to get, for twists of any GLV curve over , a four-dimensional decomposition together with fast endomorphisms over acting on the group generated by a point of prime order , resulting in a proven decomposition for any scalar given by , with . Remarkably, taking the best , we obtain , independently of the curve, ensuring in theory an almost constant relative speedup. In practice, our experiments reveal that the use of the merged GLV-GLS approach supports a scalar multiplication that runs up to 50\% faster than the original GLV method. We then improve this performance even further by exploiting the Twisted Edwards model and show that curves originally slower may become extremely efficient on this model. In addition, we analyze the performance of the method on a multicore setting and describe how to efficiently protect GLV-based scalar multiplication against several side-channel attacks. Our implementations improve the state-of-the-art performance of point multiplication for a variety of scenarios including side-channel protected and unprotected cases with sequential and multicore execution
Covert timing channels, caching, and cryptography
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryptographic primitive but the implementation of it. Examples of side-channels include power consumption or timing measurements. This is a young but very active field within applied cryptography. Modern processors are equipped with numerous mechanisms to improve the average performance of a program, including but not limited to caches. These mechanisms can often be used as side-channels to attack software implementations of cryptosystems. This area within side-channel analysis is called microarchitecture attacks, and those dealing with caching mechanisms cache-timing attacks. This dissertation presents a number of contributions to the field of side-channel analysis. The introductory portion consists of a review of common cache architectures, a literature survey of covert channels focusing mostly on covert timing channels, and a literature survey of cache-timing attacks, including selective related results that are more generally categorized as side-channel attacks such as traditional timing attacks. This dissertation includes eight publications relating to this field. They contain contributions in areas such as side-channel analysis, data cache-timing attacks, instruction cache-timing attacks, traditional timing attacks, and fault attacks. Fundamental themes also include attack mitigations and efficient yet secure software implementation of cryptosystems. Concrete results include, but are not limited to, four practical side-channel attacks against OpenSSL, each implemented and leading to full key recovery