Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daniel V. Bailey is active.

Publication


Featured researches published by Daniel V. Bailey.


international cryptology conference | 1998

Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms

Daniel V. Bailey; Christof Paar

This contribution introduces a class of Galois field used to achieve fast finite field arithmetic which we call an Optimal Extension Field (OEF). This approach is well suited for implementation of public-key cryptosystems based on elliptic and hyperelliptic curves. Whereas previous reported optimizations focus on finite fields of the form GF(p) and GF(2 m ), an OEF is the class of fields GF(p m ), for p a prime of special form and m a positive integer. Modern RISC workstation processors are optimized to perform integer arithmetic on integers of size up to the word size of the processor. Our construction employs well-known techniques for fast finite field arithmetic which fully exploit the fast integer arithmetic found on these processors. In this paper, we describe our methods to perform the arithmetic in an OEF and the methods to construct OEFs. We provide a list of OEFs tailored for processors with 8, 16, 32, and 64 bit word sizes. We report on our application of this approach to construction of elliptic curve cryptosystems and demonstrate a substantial performance improvement over all previous reported software implementations of Galois field arithmetic for elliptic curves.


Journal of Cryptology | 2001

Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography

Daniel V. Bailey; Christof Paar

Abstract. This contribution focuses on a class of Galois field used to achieve fast finite field arithmetic which we call an Optimal Extension Field (OEF), first introduced in [3]. We extend this work by presenting an adaptation of Itoh and Tsujiis algorithm for finite field inversion applied to OEFs. In particular, we use the facts that the action of the Frobenius map in GF (pm) can be computed with only m-1 subfield multiplications and that inverses in GF (p) may be computed cheaply using known techniques. As a result, we show that one extension field inversion can be computed with a logarithmic number of extension field multiplications. In addition, we provide new extension field multiplication formulas which give a performance increase. Further, we provide an OEF construction algorithm together with tables of Type I and Type II OEFs along with statistics on the number of pseudo-Mersenne primes and OEFs. We apply this new work to provide implementation results using these methods to construct elliptic curve cryptosystems on both DEC Alpha workstations and Pentium-class PCs. These results show that OEFs when used with our new inversion and multiplication algorithms provide a substantial performance increase over other reported methods.


smart card research and advanced application conference | 2001

Elliptic curve cryptography on smart cards without coprocessors

Adam D. Woodbury; Daniel V. Bailey; Christof Paar

This contribution describes how an elliptic curve cryptosystem can be imple- mented on very low cost microprocessors with reasonable performance. We focus in this paper on the Intel 8051 family of microcontrollers popular in smart cards and other cost-sensitive devices. The implementation is based on the use of the finite field GF ((2 8 17) 17 ) which is particularly suited for low end 8-bit processors. Two advantages of our method are that subfield modular reduction can be performed infrequently, and that an adaption of Itoh and Tsujiis inversion algorithm is used for the group operation. We show that an elliptic curve scalar multiplication with a fixed point, which is the core operation for a signature generation, can be performed in a group of order approximately 2 134 in less than 2 seconds. Unlike other implementations, we do not make use of curves defined over a subfield such as Koblitz curves.


international conference on security and cryptography | 2014

Statistics on Password Re-use and Adaptive Strength for Financial Accounts

Daniel V. Bailey; Markus Dürmuth; Christof Paar

Multiple studies have demonstrated that users select weak passwords. However, the vast majority of studies on password security uses password lists that only have passwords for one site, which means that several important questions cannot be studied. For example, how much stronger are password choices for different categories of sites? We use a dataset which we extracted from a large dump of malware records. It contains multiple accounts (and passwords) per user and thus allows us to study both password re-use and the correlation between the value of an account and the strength of the passwords for those accounts.


IACR Cryptology ePrint Archive | 2009

Breaking ECC2K-130

Daniel V. Bailey; Lejla Batina; Daniel J. Bernstein; Peter Birkner; Joppe W. Bos; Hsieh-Chung Chen; Chen-Mou Cheng; Gauthier Van Damme; Giacomo de Meulenaer; Luis Julian Dominguez Perez; Junfeng Fan; Tim Güneysu; Frank K. Gürkaynak; Thorsten Kleinjung; Tanja Lange; Nele Mentens; Ruben Niederhagen; Christof Paar; Francesco Regazzoni; Peter Schwabe; Leif Uhsadel; Anthony Van Herrewege; Bo-Yin Yang


Archive | 2001

Method for efficient computation of odd characteristic extension fields

Christof Paar; Adam D. Woodbury; Daniel V. Bailey


IACR Cryptology ePrint Archive | 2009

The Certicom challenges ECC2-X

Daniel V. Bailey; Brian Baldwin; Lejla Batina; Daniel J. Bernstein; Peter Birkner; Joppe W. Bos; G. De Meulenaer; Junfeng Fan; Tim Güneysu; Frank K. Gürkaynak; Thorsten Kleinjung; Tanja Lange; Nele Mentens; Christof Paar; Francesco Regazzoni; Peter Schwabe; Leif Uhsadel; G. Van Damme


Archive | 1999

Cryptography in Modern Communication Systems

Daniel V. Bailey; William Cammack; Jorge Guajardo; Christof Paar


symposium on usable privacy and security | 2017

I want my money back! Limiting Online Password-Guessing Financially.

Maximilian Golla; Daniel V. Bailey; Markus Dürmuth


international conference on security and cryptography | 2009

ONE-TOUCH FINANCIAL TRANSACTION AUTHENTICATION

Daniel V. Bailey; John G. Brainard; Sebastian Rohde; Christof Paar

Collaboration


Dive into the Daniel V. Bailey's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Adam D. Woodbury

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Daniel J. Bernstein

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Junfeng Fan

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Nele Mentens

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Lejla Batina

Radboud University Nijmegen

View shared research outputs
Researchain Logo
Decentralizing Knowledge