Shorter addition chain for smooth integers using decomposition method.
An efficient computation of scalar multiplication in elliptic curve cryptography can be achieved by reducing the original problem into a chain of additions and doublings. Finding the shortest addition chain is an NP-problem. To produce the nearest possible shortest chain, various methods were introd...
| Main Authors: | Mohamed, M. A., Md. Said, Mohamad Rushdan, Mohd Atan, Kamel Ariffin, Ahmad Zulkarnain, Zuriati |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Taylor & Francis
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/25154/ http://psasir.upm.edu.my/id/eprint/25154/1/Shorter%20addition%20chain%20for%20smooth%20integers%20using%20decomposition%20method.pdf |
Similar Items
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
A hybrid addition chain method for faster scalar multiplication
by: Mohamed, Mohamad Afendee, et al.
Published: (2015)
by: Mohamed, Mohamad Afendee, et al.
Published: (2015)
Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication
by: Noma, Adamu Muhammad, et al.
Published: (2017)
by: Noma, Adamu Muhammad, et al.
Published: (2017)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Computation of cryptosystem based on Lucas functions using addition chain
by: Md Ali, Zulkarnain, et al.
Published: (2010)
by: Md Ali, Zulkarnain, et al.
Published: (2010)
Fast endomorphisms in integer sub-decomposition method on Secp192k1
by: Antony, S.N.F.M.A., et al.
Published: (2024)
by: Antony, S.N.F.M.A., et al.
Published: (2024)
Integer Sub-Decomposition (Isd)
Method For Elliptic Curve
Scalar Multiplication
by: Ajeena, Ruma Kareem K.
Published: (2015)
by: Ajeena, Ruma Kareem K.
Published: (2015)
Why supercontinents became shorter lived as the Earth evolved
by: Huang, Chuan, et al.
Published: (2023)
by: Huang, Chuan, et al.
Published: (2023)
Decomposition techniques with mixed integer programming and heuristics for home healthcare planning
by: Laesanklang, Wasakorn, et al.
Published: (2017)
by: Laesanklang, Wasakorn, et al.
Published: (2017)
Bilinear pairings computation using the extended double-base chains algorithm
by: Mohammed Ismail, Abdulwahed, et al.
Published: (2010)
by: Mohammed Ismail, Abdulwahed, et al.
Published: (2010)
Shorter wavelength gain shift in EDFA using a macro-bending approach
by: Daud, S. A., et al.
Published: (2008)
by: Daud, S. A., et al.
Published: (2008)
A review on heuristics for addition chain problem: towards efficient public key cryptosystems
by: Muhammad Noma, Adamu, et al.
Published: (2017)
by: Muhammad Noma, Adamu, et al.
Published: (2017)
A combinatorial proof for a relation between certain types of integers
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2013)
by: Mohamat Johari, Mohamat Aidil, et al.
Published: (2013)
Mixed integer programming with decomposition to solve a workforce scheduling and routing problem
by: Laesanklang, Wasakorn, et al.
Published: (2015)
by: Laesanklang, Wasakorn, et al.
Published: (2015)
Robust image watermarking using hessenberg decomposition and SVD with integer wavelet transform
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Earlier age of dementia onset and shorter survival times in dementia patients with diabetes
by: Zilkens, Renate, et al.
Published: (2013)
by: Zilkens, Renate, et al.
Published: (2013)
Spanning trees of 2-complexes from diagram groups over the construction of semigroup presentation of integers using lifting method
by: Gheisari, Yousof, et al.
Published: (2012)
by: Gheisari, Yousof, et al.
Published: (2012)
Gaussian integer solutions of the Diophantine equation x⁴ + y⁴ = z³ for x‰ y
by: Ismail, Shahrina, et al.
Published: (2023)
by: Ismail, Shahrina, et al.
Published: (2023)
Extended decomposition for mixed integer programming to solve a workforce scheduling and routing problem
by: Laesanklang, Wasakorn, et al.
Published: (2015)
by: Laesanklang, Wasakorn, et al.
Published: (2015)
Mixed integer programming with decomposition for workforce scheduling and routing with time-dependent activities constraints
by: Laesanklang, Wasakorn, et al.
Published: (2016)
by: Laesanklang, Wasakorn, et al.
Published: (2016)
Image watermarking based on integer wavelet transform-singular value decomposition with variance pixels
by: Ernawan, F., et al.
Published: (2019)
by: Ernawan, F., et al.
Published: (2019)
Image watermarking based on integer wavelet transform-singular value decomposition and variance pixels
by: Ferda, Ernawan, et al.
Published: (2018)
by: Ferda, Ernawan, et al.
Published: (2018)
Discharge characterization and variability determination along shorter sections of soaker hose pipe for soil column experiment
by: Salisu, Abdullahi, et al.
Published: (2021)
by: Salisu, Abdullahi, et al.
Published: (2021)
Gain and noise figure improvements in a shorter wavelength region of EDFA using a macrobending approach
by: Daud, S. A., et al.
Published: (2008)
by: Daud, S. A., et al.
Published: (2008)
A Method of Estimating the p-adic Sizes of Common Zeros of Partial Derivative Polynomials Associated with a Seventh Degree Form
by: Sapar, Siti Hasana, et al.
Published: (2007)
by: Sapar, Siti Hasana, et al.
Published: (2007)
An exploration of Bob Mintzer's arrangement of footprints by wayne shorter for saxophone quintet and rhythm section / Affifi Adzlan Ahmad
by: Ahmad, Affifi Adzlan
Published: (2014)
by: Ahmad, Affifi Adzlan
Published: (2014)
Generalized splines smoothing in generalized additive models via simulation studies
by: Behzadi, Mostafa
Published: (2015)
by: Behzadi, Mostafa
Published: (2015)
Pseudo τ - adic non adjacent form for scalar multiplication on Koblitz curves
by: Yunos, Faridah, et al.
Published: (2015)
by: Yunos, Faridah, et al.
Published: (2015)
A reduced τ-adic Naf (RTNAF) representation for an efficient scalar multiplication on Anomalous Binary Curves (ABC)
by: Yunos, Faridah, et al.
Published: (2014)
by: Yunos, Faridah, et al.
Published: (2014)
Pseudo τ-adic non adjacent form for scalar multiplication on Koblitz Curves
by: Yunos, Faridah, et al.
Published: (2015)
by: Yunos, Faridah, et al.
Published: (2015)
Pseudo T - adic non adjacent form for scalar multiplication on Koblitz Curves
by: Yunos, Faridah, et al.
Published: (2015)
by: Yunos, Faridah, et al.
Published: (2015)
Pseudo τ - adic non adjacent form for scalar multiplication on Koblitz curves
by: Yunos, Faridah, et al.
Published: (2014)
by: Yunos, Faridah, et al.
Published: (2014)
Comparison of some smoothing parameter selection methods in generalized estimating equation-smoothing spline
by: Suliadi, et al.
Published: (2009)
by: Suliadi, et al.
Published: (2009)
A New Reliable Optimized Image Watermarking Scheme Based on the Integer Wavelet Transform and Singular Value Decomposition for Copyright Protection
by: Makbol, N.M., et al.
Published: (2017)
by: Makbol, N.M., et al.
Published: (2017)
A Method for Determining the Cardinality
of the Set of Solutions to Congruence Equations
by: Mohd Atan, Kamel Ariffin
Published: (1988)
by: Mohd Atan, Kamel Ariffin
Published: (1988)
GNSS Integer Ambiguity Validation: Overview of Theory and Methods
by: Teunissen, Peter
Published: (2013)
by: Teunissen, Peter
Published: (2013)
Probabilistic Evaluation of the Integer Least-squares and Integer Aperture Estimators
by: Verhagen, S., et al.
Published: (2008)
by: Verhagen, S., et al.
Published: (2008)
The new variable-length key symmetric cryptosystem
by: Pour, Davood Rezaei, et al.
Published: (2009)
by: Pour, Davood Rezaei, et al.
Published: (2009)
GCD attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Garbage-man-in-the-middle attack on the LUC4 cryptosystem.
by: Wong, Tze Jin, et al.
Published: (2009)
by: Wong, Tze Jin, et al.
Published: (2009)
Similar Items
-
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010) -
A hybrid addition chain method for faster scalar multiplication
by: Mohamed, Mohamad Afendee, et al.
Published: (2015) -
Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication
by: Noma, Adamu Muhammad, et al.
Published: (2017) -
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010) -
Computation of cryptosystem based on Lucas functions using addition chain
by: Md Ali, Zulkarnain, et al.
Published: (2010)