Fast Truncated Multiplication for Cryptographic Applications

نویسنده

  • Laszlo Hars
چکیده

The Truncated Multiplication computes a truncated product, a contiguous subsequence of the digits of the product of 2 integers. A few truncated polynomial multiplication algorithms are presented and adapted to integers. They are based on the most often used n-digit full multiplication algorithms of time complexity O(n), with 1< α ≤ 2, but a constant times faster. For example, the least significant half products with Karatsuba multiplication need only 80% of the full multiplication time. The faster the multiplication, the less relative time saving can be achieved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applications of Fast Truncated Multiplication in Embedded Cryptography

Truncated Multiplications compute Truncated Products, contiguous subsequences of the digits of integer products. For an n-digit multiplication algorithm of time complexity O(n), with 1< α ≤ 2, there is a truncated multiplication algorithm, which is constant times faster when computing a short enough truncated product. Applying these fast truncated multiplications several cryptographic long inte...

متن کامل

Applications of Fast Truncated Multiplication in Cryptography

Truncated multiplications compute truncated products, contiguous subsequences of the digits of integer products. For an n-digit multiplication algorithm of time complexity O(nα), with 1 < α ≤ 2, there is a truncated multiplication algorithm, which is constant times faster when computing a short enough truncated product. Applying these fast truncated multiplications, several cryptographic long i...

متن کامل

Fast Truncated Multiplication and its Applications in Cryptography

Truncated Multiplication computes a truncated product, a contiguous subsequence of the digits of the product of 2 long integers. We review a few truncated multiplication algorithms and adapt them to integers. They are a constant times faster than n-digit full multiplications of time complexity O(n), with 1< α ≤ 2, important in cryptography. For example, the least significant half products with ...

متن کامل

Dual-Field Multiplier Architecture for Cryptographic Applications

The multiplication operation in finite fields GF (p) and GF (2) is the most often used and timeconsuming operation in the harware and software realizations of public-key cryptographic systems, particularly elliptic curve cryptography. We propose a new hardware architecture for fast and efficient execution of the multiplication operation in this paper. The proposed architecture is scalable, i.e....

متن کامل

An Abstract of the Thesis of High-speed Algorithms & Architectures for Number-theoretic Cryptosystems

approved: C etin K. Ko c Computer and network security systems rely on the privacy and authenticity of information, which requires implementation of cryptographic functions. Software implementations of these functions are often desired because of their exibility and cost e ectiveness. In this study, we concentrate on developing high-speed and area-e cient modular multiplication and exponentiati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005