2018
DOI: 10.1201/9781439821916
|View full text |Cite
|
Sign up to set email alerts
|

Handbook of Applied Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
452
0
28

Year Published

2018
2018
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 2,380 publications
(531 citation statements)
references
References 0 publications
0
452
0
28
Order By: Relevance
“…As the problem of finding the shortest addition chain is NPcomplete [17], practical algorithms for exponentiation without a division operation have been studied such as the binary method, the m-ary method, window methods [31,34,41,52], exponent-folding methods [33,49], and precomputation methods [7,32]. For a group where the inversion operation is efficient like elliptic curve cryptosystems [30,35], an addition-subtraction chain can yield a good performance [38].…”
Section: Introductionmentioning
confidence: 99%
“…As the problem of finding the shortest addition chain is NPcomplete [17], practical algorithms for exponentiation without a division operation have been studied such as the binary method, the m-ary method, window methods [31,34,41,52], exponent-folding methods [33,49], and precomputation methods [7,32]. For a group where the inversion operation is efficient like elliptic curve cryptosystems [30,35], an addition-subtraction chain can yield a good performance [38].…”
Section: Introductionmentioning
confidence: 99%
“…-Encryption requires only two exponentiations (and not three), because most of the work done to compute V r can be reused to compute V r/π(B) , regardless of the exponentiation algorithm used (whether straight double-and-add, or one of the many efficient window methods; cf., e.g., [30]). -Decryption can similarly be performed in about a single exponentiation (instead of two), by computingC π(B) asD π(B)·Sk , which uses the same generator asD Sk and thus shares the same intermediate powers.…”
Section: Operational Efficiencymentioning
confidence: 99%
“…Now the standard continuation is to use the method of multi-exponentiation combined with the Frobenius [12], so that the final exponentiation is the calculation of…”
Section: Final Exponentiationmentioning
confidence: 99%
“…We made the choice of multiplication and squaring algorithms based on the exhaustive testing described in [10]. Karatsuba Chung-Hasan SQR2 F p 12 Karatsuba Complex…”
Section: Finite Field Arithmeticmentioning
confidence: 99%