A fast algorithm for computing multiplicative inverses in \(\text{GF}(2^ m)\) using normal bases

From MaRDI portal
Publication:1120276

DOI10.1016/0890-5401(88)90024-7zbMath0672.68015OpenAlexW2007751412MaRDI QIDQ1120276

Toshiya Itoh, Shigeo Tsujii

Publication date: 1988

Published in: Information and Computation (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/0890-5401(88)90024-7




Related Items (48)

Effective compression maps for torus-based cryptographyAn extension of TYT algorithm for \(GF((2^n)^m)\) using precomputationLogic minimization techniques with applications to cryptologyImproved generalized Atkin algorithm for computing square roots in finite fieldsTowards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over $\mathbb{F}_{2^{1223}}$Efficient software-implementation of finite fields with applications to cryptographyA Euclidean algorithm for normal basesEfficient hardware implementation of finite fields with applications to cryptographyParallel Itoh-Tsujii multiplicative inversion algorithm for a special class of trinomialsOn design of circuits of logarithmic depth for inversion in finite fieldsComputing special powers in finite fieldsOn the structure of digital explicit nonlinear and inversive pseudorandom number generatorsStructure of parallel multipliers for a class of fields \(GF(2^ m)\)Complexity of computation in finite fieldsFast Implementation of Curve25519 Using AVX2Concrete quantum cryptanalysis of binary elliptic curves via addition chainFast Point Decompression for Standard Elliptic CurvesUnnamed ItemEfficiently masking polynomial inversion at arbitrary orderQuantum circuit implementations of AES with fewer qubitsA simple stream cipher with proven propertiesOptimal Extension Field Inversion in the Frequency DomainEfficient Finite Fields in the Maxima Computer Algebra SystemOn Fast Calculation of Addition Chains for Isogeny-Based CryptographyQuantum-assisted QD-CFS signaturesComputational problems in the theory of finite fieldsEfficient Multiplication in Finite Field Extensions of Degree 5Optimal software-implemented Itoh-Tsujii inversion for \(\mathbb{F}_{2^{m}}\)Tate and Ate pairings for \(y^2=x^5-\alpha x\) in characteristic fiveRecovering RSA Secret Keys from Noisy Key Bits with Erasures and ErrorsEfficient computation of roots in finite fieldsA comparison of different finite fields for elliptic curve cryptosystemsInteger Variable χ–Based Ate PairingA Comparison between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$An extension of TYT inversion algorithm in polynomial basisAn Analysis of Affine Coordinates for Pairing ComputationElliptic periods for finite fieldsHigh-performance Implementation of Elliptic Curve Cryptography Using Vector InstructionsFast polynomial inversion for post quantum QC-MDPC cryptographyCharacterization for a family of infinitely many irreducible equally spaced polynomialsKoblitz curves over quadratic fieldsParallelizing the Weil and Tate PairingsHigh-performance hardware architecture of elliptic curve cryptography processor over \(\text{GF}(2^{163})\)High Speed Compact Elliptic Curve Cryptoprocessor for FPGA PlatformsTaking roots over high extensions of finite fieldsSome efficient quantum circuit implementations of CamelliaDigital inversive vectors can achieve polynomial tractability for the weighted star discrepancy and for multivariate integrationImplementing Grover oracles for quantum key search on AES and LowMC



Cites Work


This page was built for publication: A fast algorithm for computing multiplicative inverses in \(\text{GF}(2^ m)\) using normal bases