A Survey of Fast Exponentiation Methods

From MaRDI portal
Publication:4209277

DOI10.1006/jagm.1997.0913zbMath0915.11064OpenAlexW2099317248WikidataQ55924007 ScholiaQ55924007MaRDI QIDQ4209277

Daniel M. Gordon

Publication date: 23 June 1999

Published in: Journal of Algorithms (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/482da61cfb06aaad135bd0df0c367d2bbec0686b




Related Items (72)

Evaluating the Cache Side Channel Attacks Against ECDSAA Duality in Space Usage between Left-to-Right and Right-to-Left ExponentiationA Tale of Three Signatures: Practical Attack of ECDSA with wNAFA survey of lifted inference approaches for probabilistic logic programming under the distribution semanticsImproved generalized Atkin algorithm for computing square roots in finite fieldsA fast parallel modular exponentiation algorithmIGCC for PAPR reduction in OFDM systems over the nonlinearity of SSPA and wireless fading channelsStern polynomialsSparse polynomials, redundant bases, Gauss periods, and efficient exponentiation of primitive elements for small characteristic finite fieldsOn the number of optimal base 2 representations of integersComputing special powers in finite fieldsImproved generation of minimal addition chainsSpeeding up the Elliptic Curve Scalar Multiplication Using Non Adjacent FormApplying quick exponentiation for block upper triangular matricesAn efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniquesA Number System with Base −32Fast elliptic curve point multiplication based on binary and binary non-adjacent scalar form methodsOptimality of the width-\(w\) non-adjacent form: general characterisation and the case of imaginary quadratic basesNew fault attacks using Jacobi symbol and application to regular right-to-left algorithmsAnalysis of width-\(w\) non-adjacent forms to imaginary quadratic basesVerifiable decryption in the headHalf-aggregation of Schnorr signatures with tight reductionsFast Point Decompression for Standard Elliptic CurvesLifted discriminative learning of probabilistic logic programsRedundant \(\tau \)-adic expansions. II: Non-optimality and chaotic behaviourBalanced non-adjacent formsNon-minimality of the width-$w$ non-adjacent form in conjunction with trace one $\tau $-adic digit expansions and Koblitz curves in characteristic twoOn the construction of short addition-subtraction chains and their applicationsRandom small Hamming weight products with applications to cryptographyFast Point Multiplication on Elliptic Curves without PrecomputationA new strategy for generating shortest addition sequencesCalculating optimal addition chainsStar reduction among minimal length addition chainsOn Fast Calculation of Addition Chains for Isogeny-Based CryptographyA note on asynchronous multi-exponentiation algorithm using binary representationIMPROVEMENT OF THE LOWER BOUND FOR THE COMPLEXITY OF EXPONENTIATIONEnergy efficient modular exponentiation for public-key cryptography based on bit forwarding techniquesOn a generalization of addition chains: addition-multiplication chainsMinimality and other properties of the width-𝑤 nonadjacent formPOWER CIRCUITS, EXPONENTIAL ALGEBRA, AND TIME COMPLEXITYArithmetic Expression Construction.Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniquesA quick exponentiation algorithm for \(3\times 3\) block upper triangular matricesShould one always use repeated squaring for modular exponentiation?A low-complexity LUT-based squaring algorithmFast exponentiation based on common-multiplicand-multiplication and minimal-signed-digit techniquesTrading inversions for multiplications in elliptic curve cryptographySecure evolvable hardware for public-key cryptosystemsHow to compute modular exponentiation with large operators based on the right-to-left binary algorithmJust a Little Bit MoreThe double-base number system and its application to elliptic curve cryptographyEfficient 15,360-bit RSA Using Woop-Optimised Montgomery ArithmeticOn Bellman's and Knuth's problems and their generalizationsEfficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their ImplementationsAn efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiationSecuring RSA against Fault Analysis by Double Addition Chain ExponentiationOn \(\tau\)-adic representations of integersStructure computation and discrete logarithms in finite abelian $p$-groupsProbabilistic inductive constraint logicAccelerating Oblivious Transfer with Batch Multi-exponentiationEFFICIENT GENERATION OF SHORTEST ADDITION-MULTIPLICATION CHAINSExponent Recoding and Regular Exponentiation AlgorithmsFast exponentiation by folding the signed-digit exponent in halfBinary Addition Chain on EREW PRAMSigned bits and fast exponentiationFinding the Eigenvalue in Elkies' AlgorithmModular exponentiation via the explicit Chinese remainder theoremA \(w\)-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptographyEfficient algorithms for speeding up the computations of elliptic curve cryptosystemsEfficient big integer multiplication and squaring algorithms for cryptographic applicationsImprovement of the estimates of the computational complexity for monomials and sets of powers in Bellman’s and Knuth’s problemsEnhanced Digital Signature Using RNS Digit Exponent Representation




This page was built for publication: A Survey of Fast Exponentiation Methods