2013
DOI: 10.1090/s0025-5718-2013-02704-4
|View full text |Cite
|
Sign up to set email alerts
|

Generalised Mersenne numbers revisited

Abstract: Abstract. Generalised Mersenne Numbers (GMNs) were defined by Solinas in 1999 and feature in the NIST and SECG standards for use in elliptic curve cryptography. Their form is such that modular reduction is extremely efficient, thus making them an attractive choice for modular multiplication implementation. However, the issue of residue multiplication efficiency seems to have been overlooked. Asymptotically, using a cyclic rather than a linear convolution, residue multiplication modulo a Mersenne number is twi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 56 publications
0
11
0
Order By: Relevance
“…More recently, prime moduli of the form 2 s ± δ have gained popularity where s, δ ∈ Z >0 and δ < 2 s such that δ is a (very) small integer. More precisely, the constant δ is small compared to the typical word-size of computer architectures used (e.g., less than 2 32 ) and often is chosen as the smallest integer such that one of 2 s ± δ is prime. One should be aware that the usage of such primes of a special form not only accelerates the cryptographic implementations, the cryptanalytic methods benefit as well.…”
Section: Using Primes Of a Special Formmentioning
confidence: 99%
See 4 more Smart Citations
“…More recently, prime moduli of the form 2 s ± δ have gained popularity where s, δ ∈ Z >0 and δ < 2 s such that δ is a (very) small integer. More precisely, the constant δ is small compared to the typical word-size of computer architectures used (e.g., less than 2 32 ) and often is chosen as the smallest integer such that one of 2 s ± δ is prime. One should be aware that the usage of such primes of a special form not only accelerates the cryptographic implementations, the cryptanalytic methods benefit as well.…”
Section: Using Primes Of a Special Formmentioning
confidence: 99%
“…Hence, this algorithm runs efficiently when using 2-way SIMD vector instructions as frequently found on modern computer architectures. For illustrative purposes we assume a radix-2 32 system, but this can be adjusted accordingly to any other radix system. Note that for efficiency considerations the choice of the radix system depends on the vector instructions available.…”
Section: Montgomery Multiplication Using Simd Extensionsmentioning
confidence: 99%
See 3 more Smart Citations