High-speed cryptography in characteristic 2

Introduction
Tools:
Linear maps
Polynomial multiplication:
Bit operations
Field multiplication:
Type-II bases
Message authentication:
Auth256
Elliptic curves:
Binary Edwards
Challenges
Reversible
Error-correcting codes:
McBits

The Certicom challenges

[ecc2x] 32pp. (PDF) Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Gueneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel. The Certicom challenges ECC2-X. Document ID: f47cf4150cce66b99dcaa02733bc08b2. URL: https://cr.yp.to/papers.html#ecc2x. Date: 2009.09.01.

[ecc2k130] 20pp. (PDF) Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier van Damme, Giacomo de Meulenaer, Luis Julian Dominguez Perez, Junfeng Fan, Tim Gueneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang. Breaking ECC2K-130. URL: https://cr.yp.to/papers.html#ecc2k130. Date: 2009.11.18. Supersedes: (PDF) 2009.11.05.

Version

This is version 2017.01.22 of the challenges.html web page.