Addition-based exponentiation modulo 2/sup k/ - Electronics Letters
نویسندگان
چکیده
Introduction and background: The basic integer arithmetic operations of addition=subtraction, multiplication and division are implemented typically in hardware using k bits of precision with k usually 16, 32, or 64, and up to 1024 in the case of cryptography. Having a precision limited to k bits makes the arithmetic operations equivalent to their corresponding residue arithmetic modulo 2 operations along with appropriate overflow handling. When the hardware support does not include a large multiplier, there is a particular need for additive bit-serial algorithms for these and additional residue operations. In this Letter we present a bit-serial algorithm for the fundamental residue arithmetic operation of powering (or exponentiation). Following [1] we herein employ jnj2k 1⁄4 j to denote the congruence relation n j (mod 2) with the residue j satisfying 0 j 2 1. When computing the exponentiation operation b (mod 2) of a basis b (our preferred case is b1⁄4 3), usually some variation of the square-andmultiply algorithm is being employed. In this method the squaring operation is performed sequentially obtaining j31j2k, j3 2j2k, j3 3j2k, . . . , j3k 1j2k. From these residues a subset is selected to be part of the product corresponding to j3ej2k:
منابع مشابه
Additive bit-serial algorithm for discrete logarithm modulo 2/sup k/ - Electronics Letters
Introduction and summary: Hardware capabilities for integer arithmetic generally include addition, multiplication, and division with precision k typically chosen as 16, 32 or 64. Multiplication and division are often implemented by recursive bit serial algorithms employing O(k) serial additions to avoid the size and power requirements of a large multiplier. The integer addition and multiplicati...
متن کاملSpeeding up Exponentiation using an Untrusted Computational Resource
We present protocols for speeding up fixed-base exponentiation and variablebase exponentiation using an untrusted computation resource. In the fixed-base protocols, the base and exponent may be blinded. If the exponent is fixed, the base may be blinded in the variable-base exponentiation protocols. The protocols are the first ones for accelerating exponentiation with the aid of an untrusted res...
متن کاملRandomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation
When secure arithmetic is required, computation based on secure multiplication (MULT) is much more efficient than computation based on secure boolean circuits. However, a typical application can also require other building blocks, such as comparison, exponentiation and the modulo (MOD) operation. Secure solutions for these functions proposed in the literature rely on bit-decomposition or other ...
متن کاملModulo quantifiers over functional vocabularies extending addition
We show that first order logic (FO) and first order logic extended with modulo counting quantifiers (FOMOD) over purely functional vocabularies which extend addition, satisfy the Crane beach property (CBP) if the logic satisfies a normal form (called positional normal form). This not only shows why logics over the addition vocabulary have the CBP but also gives new CBP results, for example for ...
متن کاملIterative modular multiplication algorithm without magnitude comparison - Electronics Letters
A fast iterative modular multiplication algorithm is proposed for modular exponentiation with a large modulus, such as the RSA cryptosystem. The limit on partial products is raised to become less than 2” instead of modulus N with n-bit length. The naturally generated carry signifies when the computed partial product is greater than or equal to 2”. and a subtraction is subsequently performed. No...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001