An Efficient Implementation of Two-Term Exponentiation
スポンサーリンク
概要
- 論文の詳細を見る
We define the 'operational chain' and propose a new algorithm using two operational chains to compute a two-term exponentiation. To obtain an add / sub chain, we propose an efficient algorithm using 2's complement of a given exponent. The proposed exponentiation algorithm is more efficient than Yen-Laih's by about 9% in some examples. Our algorithm is applicable to computing not only two-term scalar multiplication in elliptic curves but also two-term exponentiation over integral modulus. The proposed can be combined with algorithms using Frobenius map and other methods obtaining add chain or add / sub chain.
- 社団法人電子情報通信学会の論文
- 2000-01-25
著者
-
LEE Pil
Department of Electronic and Electrical Engineering, POSTECH
-
Lee Pil
Department Of Electronic And Electrical Engineering Pohang University Of Science & Technology(po
-
SIM Sang
Department of Pathophysiology, College of Pharmacy, Chung Ang University
-
Lee Pil
Department Of Electronic And Electrical Engineering
-
Sim Sang
Department Of Chemical Engineering Polymer Technology Institute Sungkyunkwan University
-
Sim Sang
Department Of Electronic And Electrical Engineering Pohang University Of Science & Technology(po
-
LEE Pil
Department of Creative IT Excellence Engineering and the Department of Electrical Engineering, POSTECH
関連論文
- Generalized Hash Chain Traversal with Selective Output
- Fast Verification of Hash Chains with Reduced Storage
- Sanitizable Signatures Reconsidered
- Protective Effects of Epicatechin Against the Toxic Effects of Streptozotocin on Rat Pancreatic Islets : In Vivo and in Vitro
- Site-Specific Distribution of Phospholipase D Isoforms in the Rat Pancreas
- Residual Stress Behavior of Polyimide Thin Films : Effect of Precursors
- Preparation and Properties of PHEA/Chitosan Composite Hydrogel
- Security Analysis of Yeh-Tsai Security Mechanism
- IS-60 Fetal hydronephrosis : prenatal diagnosis and postnatal management and outcome
- Efficient Fair Exchange from Identity-Based Signature
- Invisibly Sanitizable Signature without Pairings
- Generalized Hash Chain Traversal with Selective Output
- Generalized Combinatoric Accumulator
- An Efficient Implementation of Two-Term Exponentiation
- Security Analysis of Zhu-Bao's Verifiably Committed Signature(Information Security)
- P-IS-80 The value of matrix metalloproteinase-8 (MMP-8) level of amniotic fluid as a diagnostic tool of maternal chorioamnionitis(Perinatology 3,Group 108,International Session)
- Production and Secretion of Indole Alkaloids in Hairy Root Culrures of Catharanthus roseus : Effects of In Situ Adsorption, Fungal Elicitation and Permeabilization
- Fast Verification of Hash Chains with Reduced Storage
- Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme(Fundamental Theories for Communications)
- Effect of dehydroepiandrosterone on the lipopolysaccharide-induced interleukin-6 production in canine macrophage cell line (DH-82)(Perinatology 1)
- Energy-Efficient Hash Chain Traversal
- Sanitizable Signatures Reconsidered
- Lightweight One-Time Signature for Short Messages
- Security Condition for Exact Localization in Wireless Ad Hoc Networks
- Unilateral Distance Bounding Protocol with Bidirectional Challenges
- Secure and Lightweight Localization Method for Wireless Sensor Networks