نتایج جستجو برای: same base multiplication

تعداد نتایج: 925821  

2011
Hugo Labrande Michael J. Jacobson

Recently, Dimitrov et. al. [4] proposed a novel algorithm for scalar multiplication of points on elliptic Koblitz curves that requires a provably sublinear number of point additions in the size of the scalar. Following some ideas used by this article, most notably double-base expansions for integers, we generalize their methods to hyperelliptic Koblitz curves of arbitrary genus over any nite el...

Journal: :IEICE Transactions 2007
Erik Dahmen Katsuyuki Okeya Tsuyoshi Takagi

The most time consuming operation to verify a signature with the Elliptic Curve Digital Signature Algorithm is a multi-scalar multiplication with two scalars. Efficient methods for its computation are the Shamir method and the Interleave method, whereas the performance of those methods can be improved by using general base-2 representations of the scalars. In exchange for the speed-up, those re...

2006
Christophe Doche Laurent Imbert

We investigate the impact of larger digit sets on the length of Double-Base Number system (DBNS) expansions. We present a new representation system called extended DBNS whose expansions can be extremely sparse. When compared with double-base chains, the average length of extended DBNS expansions of integers of size in the range 200– 500 bits is approximately reduced by 20% using one precomputed...

Let R be a commutative ring. An R-module M is called co-multiplication provided that foreach submodule N of M there exists an ideal I of R such that N = (0 : I). In this paper weshow that co-multiplication modules are a generalization of strongly duo modules. Uniserialmodules of finite length and hence valuation Artinian rings are some distinguished classes ofco-multiplication rings. In additio...

Journal: :IACR Cryptology ePrint Archive 2011
Ming Li Ali Miri Daming Zhu

Scalar multiplication is an important operation in elliptic curve cryptosystems(ECC). The algorithms for computing scalar multiplication are mostly based on the binary expansions of scalars, such as the non-adjacent form (NAF) and wNAF(sliding window method). Representing scalars using more bases can speed up the scalar multiplication, such as mbNAF, wmbNAF and extended wmbNAF, which was propos...

2014
Zhe Liu Erich Wenger Johann Großschädl

Wireless Sensor Networks (WSNs) are susceptible to a wide range of malicious attacks, which has stimulated a body of research on “light-weight” security protocols and cryptographic primitives that are suitable for resource-restricted sensor nodes. In this paper we introduce MoTE-ECC, a highly optimized yet scalable ECC library for Memsic’s MICAz motes and other sensor nodes equipped with an 8-b...

2003
P. Ambrož C. Frougny Z. Masáková E. Pelantová

For irrational β > 1 we consider the set Fin(β) of real numbers for which |x| has a finite number of non-zero digits in its expansion in base β. In particular, we consider the set of β-integers, i.e. numbers whose β-expansion is of the form ∑n i=0 xiβ , n ≥ 0. We discuss some necessary and some sufficient conditions for Fin(β) to be a ring. We also describe methods to estimate the number of fra...

Journal: :CoRR 2013
Shri Prakash Dwivedi

Multiplication is one of the most important operation in computer arithmetic. Many integer operations such as squaring, division and computing reciprocal require same order of time as multiplication whereas some other operations such as computing GCD and residue operation require at most a factor of logn time more than multiplication. We propose an integer multiplication algorithm using Nikhila...

2010
Deepak Kapur Andrew M. Marshall Paliath Narendran

Modular exponentiation is a common mathematical operation in modern cryptography. This, along with modular multiplication at the base and exponent levels (to different moduli) plays an important role in a large number of key agreement protocols. In our earlier work [5, 6] we gave many decidability as well as undecidability results for multiple equational theories, involving various properties o...

Journal: :IEICE Transactions 2011
Naoki Kanayama Tadanori Teruya Eiji Okamoto

Efficient computation of elliptic curve scalar multiplication has been a significant problem since Koblitz [13] and Miller [14] independently proposed elliptic curve cryptography, and several efficient methods of scalar multiplication have been proposed (e.g., [8], [9], [12]). A standard approach for computing scalar multiplication is to use the Frobenius endomorphism. If we compute the s-multi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید