Results 1 
9 of
9
Speeding Up The Computations On An Elliptic Curve Using AdditionSubtraction Chains
 Theoretical Informatics and Applications
, 1990
"... We show how to compute x k using multiplications and divisions. We use this method in the context of elliptic curves for which a law exists with the property that division has the same cost as multiplication. Our best algorithm is 11.11% faster than the ordinary binary algorithm and speeds up acco ..."
Abstract

Cited by 103 (4 self)
 Add to MetaCart
We show how to compute x k using multiplications and divisions. We use this method in the context of elliptic curves for which a law exists with the property that division has the same cost as multiplication. Our best algorithm is 11.11% faster than the ordinary binary algorithm and speeds up accordingly the factorization and primality testing algorithms using elliptic curves. 1. Introduction. Recent algorithms used in primality testing and integer factorization make use of elliptic curves defined over finite fields or Artinian rings (cf. Section 2). One can define over these sets an abelian law. As a consequence, one can transpose over the corresponding groups all the classical algorithms that were designed over Z/NZ. In particular, one has the analogue of the p \Gamma 1 factorization algorithm of Pollard [29, 5, 20, 22], the Fermatlike primality testing algorithms [1, 14, 21, 26] and the public key cryptosystems based on RSA [30, 17, 19]. The basic operation performed on an elli...
Redundant trinomials for finite fields of characteristic 2
 Proceedings of ACISP 05, LNCS 3574
, 2005
"... Abstract. In this paper we introduce socalled redundant trinomials to represent elements of nite elds of characteristic 2. The concept is in fact similar to almost irreducible trinomials introduced by Brent and Zimmermann in the context of random numbers generators in [BZ 2003]. See also [BZ]. In f ..."
Abstract

Cited by 8 (0 self)
 Add to MetaCart
Abstract. In this paper we introduce socalled redundant trinomials to represent elements of nite elds of characteristic 2. The concept is in fact similar to almost irreducible trinomials introduced by Brent and Zimmermann in the context of random numbers generators in [BZ 2003]. See also [BZ]. In fact, Blake et al. [BGL 1994, BGL 1996] and Tromp et al. [TZZ 1997] explored also similar ideas some years ago. However redundant trinomials have been discovered independently and this paper develops applications to cryptography, especially based on elliptic curves. After recalling well known techniques to perform e cient arithmetic in extensions of F2, we describe redundant trinomial bases and discuss how to implement them e ciently. They are well suited to build F2n when no irreducible trinomial of degree n exists. Depending on n ∈ [2, 10, 000] tests with NTL show that improvements for squaring and exponentiation are respectively up to 45 % and 25%. More attention is given to relevant extension degrees for doing elliptic and hyperelliptic curve cryptography. For this range, a scalar multiplication can be speeded up by a factor up to 15%. 1.
Efficient generation of minimal length addition chains
 SIAM Journal on Computing
, 1999
"... Abstract. An addition chain for a positive integer n is a set 1 = a0 <a1 < ·· · <ar = n of integers such that for each i ≥ 1, ai = aj + ak for some k ≤ j<i. This paper is concerned with some of the computational aspects of generating minimal length addition chains for an integer n. Parti ..."
Abstract

Cited by 8 (0 self)
 Add to MetaCart
Abstract. An addition chain for a positive integer n is a set 1 = a0 <a1 < ·· · <ar = n of integers such that for each i ≥ 1, ai = aj + ak for some k ≤ j<i. This paper is concerned with some of the computational aspects of generating minimal length addition chains for an integer n. Particular attention is paid to various pruning techniques that cut down the search time for such chains. Certain of these techniques are influenced by the multiplicative structure of n. Later sections of the paper present some results that have been uncovered by searching for minimal length addition chains.
Computing special powers in finite fields
, 2003
"... We study exponentiation in nonprime finite fields with very special exponents such as they occur, for example, in inversion, primitivity tests, and polynomial factorization. Our algorithmic approach improves the corresponding exponentiation problem from about quadratic to about linear time. ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
We study exponentiation in nonprime finite fields with very special exponents such as they occur, for example, in inversion, primitivity tests, and polynomial factorization. Our algorithmic approach improves the corresponding exponentiation problem from about quadratic to about linear time.
(Extended Abstract)
"... Abstract — An addition sequence problem is given a set of numbers X = {n1, n2, · · · , nm}, what is the minimal number of additions needed to compute all m numbers starting from 1? Downey et al. [9] showed that the addition sequence problem is NPcomplete. This problem has application in evaluatin ..."
Abstract
 Add to MetaCart
(Show Context)
Abstract — An addition sequence problem is given a set of numbers X = {n1, n2, · · · , nm}, what is the minimal number of additions needed to compute all m numbers starting from 1? Downey et al. [9] showed that the addition sequence problem is NPcomplete. This problem has application in evaluating the monomials y n1, y n2, · · · , y nm. In this paper, we present an algorithm to generate an addition sequence with minimal number of elements. We generalize some results on addition chain (m = 1) to addition sequence to speed up the computation.
L R I MECHANICALLY PROVING TERMINATION USING POLYNOMIAL INTERPRETATIONS
, 2004
"... Mechanically proving termination using polynomial interpretations ..."
(Show Context)
Date
, 2007
"... The undersigned certify that they have read, and recommend to the Faculty of ..."
Abstract
 Add to MetaCart
(Show Context)
The undersigned certify that they have read, and recommend to the Faculty of
Methods for Regular VLSI Implementations of Wavelet Filters
, 1996
"... We investigate three approaches to VLSI implementation of wavelet filters. The direct form structure, the lattice form structure, and an algebraic structure are used to derive different architectures for wavelet filters. The algebraic structure exploits conjugacy properties in number fields. All app ..."
Abstract
 Add to MetaCart
We investigate three approaches to VLSI implementation of wavelet filters. The direct form structure, the lattice form structure, and an algebraic structure are used to derive different architectures for wavelet filters. The algebraic structure exploits conjugacy properties in number fields. All approaches are explained in detail for the Daubechies 4tab filters. We outline the philosophy of a design method for integrated circuits.