Exponent Recoding and Regular Exponentiation Algorithms
From MaRDI portal
Publication:3637149
DOI10.1007/978-3-642-02384-2_21zbMATH Open1246.94031OpenAlexW1507823573MaRDI QIDQ3637149FDOQ3637149
Authors: Marc Joye, Michael Tunstall
Publication date: 7 July 2009
Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02384-2_21
Recommendations
- scientific article; zbMATH DE number 2085203
- Algorithms for exponentiation in finite fields
- An Algorithm for Computing Optimal Exponent Pairs
- The complexity of computing exponents
- Efficient implementation of algorithms for approximate exponentiation
- Redundant integer representations and fast exponentiation
- Efficient algorithms for remainder computation and exponentiation of long numbers
- A Survey of Fast Exponentiation Methods
- Aspects of algebraic exponentiation
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Survey of Fast Exponentiation Methods
- Checking before output may not be enough against fault-based cryptanalysis
- Title not available (Why is that?)
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- Title not available (Why is that?)
- The doubling attack -- why upwards is better than downwards.
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Power Analysis Attacks
- Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation
- Title not available (Why is that?)
- Progress in Cryptology – Mycrypt 2005
- Power analysis to ECC using differential power between multiplication and squaring
- Distinguishing Multiplications from Squaring Operations
- SPA Resistant Left-to-Right Integer Recodings
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security Practice and Experience
- A more flexible countermeasure against side channel attacks using window method.
- Cryptographic Hardware and Embedded Systems - CHES 2004
Cited In (15)
- An Algorithm for Computing Optimal Exponent Pairs
- Scalar recoding and regular \(2^w\)-ary right-to-left EC scalar multiplication algorithm
- Koblitz curves over quadratic fields
- Title not available (Why is that?)
- Improvement on Ha-Moon Randomized Exponentiation Algorithm
- A fast parallel modular exponentiation algorithm
- Cryptographic Hardware and Embedded Systems - CHES 2004
- 2DT-GLS: faster and exception-free scalar multiplication in the GLS254 binary curve
- Extending the signed non-zero bit and sign-aligned columns methods to general bases for use in cryptography
- Four-dimensional Gallant-Lambert-Vanstone scalar multiplication
- Small scalar multiplication on Weierstrass curves using division polynomials
- Speeding up regular elliptic curve scalar multiplication without precomputation
- A duality in space usage between left-to-right and right-to-left exponentiation
- Code Offset in the Exponent.
- Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
This page was built for publication: Exponent Recoding and Regular Exponentiation Algorithms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3637149)