نتایج جستجو برای: same base multiplication

تعداد نتایج: 925821  

2009
Matthias Künzer

We show by an example that in a Verdier triangulated category, there may exist two mutually nonisomorphic Verdier octahedra containing the same commutative triangle.

Journal: :Matrix science mathematic 2022

The different methods used in the multiplication of numbers are long method (column method) multiplication, grid and addition multiplication. utilization mentioned to solve power (index) base number (number that multiply itself a times) horrendous, outrageous, tedious, time consuming too be carried out. This study develops computation using Kifilideen (matrix, combination distributive (MCD)) ap...

2009
MATTHIAS KÜNZER Antonio Cegarra

0 Introduction 7 0.1 Is being a 3-triangle characterised by 2-triangles? . . . . . . . . . . . . . . . . . . . 7 0.2 Is being an n-triangle characterised by (n− 1)-triangles? . . . . . . . . . . . . . . . 8 0.3 An appendix on transport of structure . . . . . . . . . . . . . . . . . . . . . . . . . 9 0.4 Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 ...

2008
Haibao Duan

In the Grothendieck cohomology of a flag variety G/H there are two canonical additive bases, namely, the Demazure basis [D] and the Grothendieck basis [KK]. We present explicit formulae that reduce the multiplication of these basis elements to the Cartan numbers of G.

2005
Johann Großschädl Roberto Maria Avanzi Erkay Savas Stefan Tillich

This paper investigates performance and energy characteristics of software algorithms for long integer arithmetic. We analyze and compare the number of RISC-like processor instructions (e.g. singleprecision multiplication, addition, load, and store instructions) required for the execution of different algorithms such as Schoolbook multiplication, Karatsuba and Comba multiplication, as well as M...

2015
Robert Granger Michael Scott

In this paper we present a new multiplication algorithm for residues modulo the Mersenne prime 2 − 1. Using this approach, on an Intel Haswell Core i7-4770, constant-time variable-base scalar multiplication on NIST’s (and SECG’s) curve P-521 requires 1,108,000 cycles, while on the recently proposed Edwards curve E-521 it requires just 943,000 cycles. As a comparison, on the same architecture op...

2008
Hao Chen Ronald Cramer Robbert de Haan Ignacio Cascudo

In this work we introduce a novel paradigm for the construction of ramp schemes with strong multiplication that allows the secret to be chosen in an extension field, whereas the shares lie in a base field. When applied to the setting of Shamir’s scheme, for example, this leads to a ramp scheme with strong multiplication from which protocols can be constructed for atomic secure multiplication wi...

2016
Thomaz Oliveira Julio López Hernandez Francisco Rodríguez-Henríquez

In this work, we retake an old idea that Koblitz presented in his landmark paper [21], where he suggested the possibility of defining anomalous elliptic curves over the base field F4. We present a careful implementation of the base and quadratic field arithmetic required for computing the scalar multiplication operation in such curves. In order to achieve a fast reduction procedure, we adopted ...

2000
Shin-ichi Kawamura Masanobu Koike Fumihiko Sano Atsushi Shimbo

This paper proposes a fast parallel Montgomery multiplication algorithm based on Residue Number Systems (RNS). It is easy to construct a fast modular exponentiation by applying the algorithm repeatedly. To realize an efficient RNS Montgomery multiplication, the main contribution of this paper is to provide a new RNS base extension algorithm. Cox-Rower Architecture described in this paper is a h...

Journal: :IACR Cryptology ePrint Archive 2005
Vassil S. Dimitrov Laurent Imbert P. K. Mishra

Among the various arithmetic operations required in implementing public key cryptographic algorithms, the elliptic curve point multiplication has probably received the maximum attention from the research community in the last decade. Many methods for efficient and secure implementation of point multiplication have been proposed. The efficiency of these methods mainly depends on the representati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید