High-speed cryptography in characteristic 2

Introduction
Tools:
Linear maps
Polynomial multiplication:
Bit operations
Field multiplication:
Type-II bases
Message authentication:
Auth256
Elliptic curves:
Binary Edwards
Challenges
Error-correcting codes:
McBits

Auth256

[auth256] 20pp. (PDF) Daniel J. Bernstein, Tung Chou. Faster binary-field multiplication and faster binary-field MACs. Document ID: 393655eb413348f4e17c7ec451b9e159. URL: https://cr.yp.to/papers.html#auth256. Date: 2014.09.18.

Version

This is version 2017.01.22 of the auth256.html web page.