59
Views
1
CrossRef citations to date
0
Altmetric
Section A

Fast modular multiplication based on complement representation and canonical recoding

, &
Pages 2871-2879 | Received 26 Mar 2008, Accepted 07 May 2009, Published online: 20 Aug 2010

References

  • Arno, S. , and Wheeler, F. S. , 1993. Signed digit representations of minimal Hamming weight , IEEE Trans. Comput. 42 (8) (1993), pp. 1007–1010.
  • Avizienis, A. , 1961. Signed-digit number representations for fast parallel arithmetic , IRE Trans. Electron. Comput. 10 (1961), pp. 389–400.
  • Chang, C.-C. , and Lou, D.-C. , 1997. Parallel computation of multi-exponentiation for cryptosystems , Int. J. Comput. Math. 63 (1–2) (1997), pp. 9–26.
  • Chang, C.-C. , Kuo, Y.-T. , and Lin, C.-H. , 2003. Fast algorithms for common multiplicand multiplication and exponentiation by performing complements . Presented at Proceeding of 17th International Conference on Advanced Information Networking and Application, IEEE Computer Society.
  • Diffie, W. , and Hellmen, E. , 1976. New directions in cryptography , IEEE Trans. Inf. Theory 22 (6) (1976), pp. 644–654.
  • ElGamal, T. , 1985. A public key cryptosystem and a signature scheme based on discrete logarithms , IEEE Trans. Inf. Theory 31 (4) (1985), pp. 469–472.
  • Ha, J. C. , and Moon, S. J. , 1998. A common-multiplicand method to the Montgomery algorithm for speeding up exponentiation , Inf. Process. Lett. 66 (2) (1998), pp. 105–107.
  • Joye, M. , and Yen, S.-M. , 2000. Optimal left-to-right binary signed-digit recoding , IEEE Trans. Comput. 49 (7) (2000), pp. 740–748.
  • Knuth, D. E. , 1997. The Art of Computer Programming, Volume 2: Seminumerical Algorithms . MA: Addison-Wesley; 1997.
  • Koc, C. K. , and Johnson, S. , 1994. Multiplication of signed-digit numbers , Electron. Lett. 30 (11) (1994), pp. 840–841.
  • Kooshesh, A. , and Ravikumar, B. , 2008. Efficient implementation of algorithms for approximate exponentiation , Inf. Process. Lett. 105 (4) (2008), pp. 131–137.
  • Lou, D.-C. , and Chang, C.-C. , 1996. Fast exponentiation method obtained by folding the exponent in half , Electron. Lett. 32 (11) (1996), pp. 984–985.
  • Lou, D.-C. , Wu, C.-L. , and Chen, C.-Y. , 2003. Fast exponentiation by folding the signed-digit exponent in half , Int. J. Comput. Math. 80 (10) (2003), pp. 1251–1259.
  • Montgomery, P. L. , 1985. Modular multiplication without trial division , Math. Comput. 44 (170) (1985), pp. 519–521.
  • Rivest, R. L. , Shamir, A. , and Adleman, L. , 1978. A method for obtaining digital signatures and public key cryptosystems , Commun. ACM 21 (2) (1978), pp. 120–126.
  • Stallings, W. , 2002. "Cryptography and Network Security Principles and Practice". NY: Prentice-Hall; 2002.
  • Tenca, A. F. , and Koc, C. K. , 2003. A scalable architecture for modular multiplication based on Montgomery's algorithm , IEEE Trans. Comput. 52 (9) (2003), pp. 1215–1221.
  • Wright, S. , 2008. Quadratic residues and the combinatorics of sign multiplication , J. Number Theory 128 (4) (2008), pp. 918–925.
  • Wu, T.-C. , and Chang, Y.-S. , 1995. Improved generalization common -multiplicand-multiplications algorithm of Yen and Laih , Electron. Lett. 31 (20) (1995), pp. 1738–1739.
  • Wu, C.-L. , Lou, D.-C. , and Chang, T.-J. , 2007. Fast binary multiplication by performing dot counting and complement recoding , Appl. Math. Comput. 191 (1) (2007), pp. 132–139.
  • Yang, J.-H. , and Chang, C.-C. , 2008. Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation , IET Comput. Digit. Tech. 2 (1) (2008), pp. 1–5.
  • Yen, S.-M. , 1997. Improved common-multiplicand-multiplication and fast exponentiation by exponent decomposition , IEICE Trans. Fund. E80-A(6) (1997), pp. 1160–1163.
  • Yen, S.-M. , and Laih, C.-S. , 1993. Common-multiplicand-multiplication and its applications to public key cryptography , Electron. Lett. 29 (17) (1993), pp. 1583–1584.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.