63
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

Fast exponentiation by folding the signed-digit exponent in half

Pages 1251-1259 | Received 10 Jun 2002, Accepted 02 Apr 2003, Published online: 12 May 2010

References

  • Rivest , R. L. , Shamir , A. and Adleman , L. (1978) . A method for obtaining digital signatures and public key cryptosystems. . Communications of the ACM , 21 ( 2 ) : 120 – 126 .
  • Montgomery , P. L. (1985) . Modular multiplication without trial division. . Mathematics of Computation , 44 ( 170 ) : 519 – 521 .
  • Yacobi Y. (1990) Exponentiating faster with addition chains. Proceedings of EUROCRYPT' 90 pp. 222–229
  • Knuth D. E. (1997) The Art of Computer Programming: Seminumerical Algorithms II 3rd ed. Addison-Wesley MA
  • Koc , C. K. and Johnson , S. (1994) . Multiplication of signed-digit numbers. . Electronics Letters , 30 ( 11 ) : 840 – 841 .
  • Lou , D.-C. and Chang , C.-C. (1996) . Fast exponentiation method obtained by folding the exponent in half. . Electronics Letters , 32 ( 11 ) : 984 – 985 .
  • Lou , D.-C. and Chang , C.-C. (1998) . A fast modular multiplication method. . International Journal of Computer Systems Science and Engineering , 13 ( 6 ) : 353 – 358 .
  • Lou , D.-C. and Chang , C.-C. (1998) . An adaptive exponentiation method. . The Journal of Systems and Software , 42 ( 1 ) : 59 – 69 .
  • Dimitrov , V. S. , Jullien , G. A. and Miller , W. C. (2000) . Complexity and fast algorithms for multiexponentiations. . IEEE Transactions on Computers , 49 ( 2 ) : 141 – 147 .
  • Chang , C.-C. and Lou , D.-C. (1997) . Parallel computation of the multi-exponentiation for cryptosystems. . International Journal of Computer Mathematics , 63 ( 1/2 ) : 9 – 26 .
  • Gordon , D. M. (1998) . A survey of fast exponentiation methods. . Journal of Algorithms , 27 ( 1 ) : 129 – 146 .
  • Diffie , W. and Hellmen , E. (1976) . New directions in cryptography. . IEEE Transactions on Information Theory , 22 ( 6 ) : 644 – 654 .
  • ElGamal , T. (1985) . A public key cryptosystem and a signature scheme based on discrete logarithms. . IEEE Transactions on Information Theory , 31 : 469 – 472 .
  • Boneh , D. (1999) . Twenty years of attacks on the RSA cryptosystem. . Notices of the AMS , 46 ( 2 ) : 203 – 213 .
  • Stallings W. (1999) Cryptography and Network Security: Principles And Practice Prentice-Hall
  • Yan S. Y. (2000) Number Theory for Computing 2nd ed. Springer-Verlag
  • Koren I. (2002) Computer Arithmetic Algorithms 2nd ed., Peters, A.K.
  • Arno , S. and Wheeler , F. (1993) . Signed digit representations of minimal hamming weight. . IEEE Transactions on Computers , 42 ( 8 ) : 1007 – 1010 .
  • Booth , A. D. (1951) . A signed binary multiplication technique. . Quarterly Journal Mechanics and Applied Mathematics , 4 : 236 – 240 .
  • Joye , M. and Yen , S.-M. (2000) . Optimal left-to-right binary signed-digit recoding. . IEEE Transactions on Computers , 49 ( 7 ) : 740 – 748 .
  • Dimitrov , V. S. , Jullien , G. A. and Miller , W. C. (2000) . Complexity and fast algorithms for multiplications. . IEEE Transactions on Computers , 49 ( 2 ) : 141 – 147 .
  • Hasan M. A. (2001) Efficient computation of multiplicative inverses for cryptographic applications. Proceedings of the 15th IEEE Symposium on Computer Arithmetic June 2001 pp. 66–72
  • Takagi , N. , Yoshiki , J. and Takagi , K. (2001) . A fast algorithm for multiplicative inversion in GF(2n) using normal basis. . IEEE Transactions on Computers , 50 ( 5 ) : 394 – 398 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.