Transactions on Alogorithms 1 (2005), 123–142 ANALYSIS OF LINEAR COMBINATION ALGORITHMS IN CRYPTOGRAPHY
نویسندگان
چکیده
Several cryptosystems rely on fast calculations of linear combinations in groups. One way to achieve this is to use joint signed binary digit expansions of small “weight.” We study two algorithms, one based on non adjacent forms of the coefficients of the linear combination, the other based on a certain joint sparse form specifically adapted to this problem. Both methods are sped up using the sliding windows approach combined with precomputed lookup tables. We give explicit and asymptotic results for the number of group operations needed assuming uniform distribution of the coefficients. Expected values, variances and a central limit theorem are proved using generating functions. Furthermore, we provide a new algorithm which calculates the digits of an optimal expansion of pairs of integers from left to right. This avoids storing the whole expansion, which is needed with the previously known right to left methods, and allows an online computation.
منابع مشابه
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملLinear Attack Using Multiple Linear Approximations
One of Kaliski and Robshaw’s algorithms, which is used for the linear attack on block ciphers with multiple linear approximations and introduced as Algorithm 2M in this paper, looks efficient but lacks any theoretical and mathematical description. It means there exists no way to estimate the data complexity required for the attack by the algorithm except experiments of the reduced variants. In ...
متن کاملGreen Space Suitability Analysis Using Evolutionary Algorithm and Weighted Linear Combination (WLC) Method
With current new urban developments, no balance can be found between green spaces and open areas present within urban networks and natural land patterns since urban networks are dominating ecological networks. Accordingly, one of the major tasks of urban and regional planners is the optimal land use allocation to urban green spaces. Therefore, to achieve this goal in this research, locations of...
متن کاملCombination of Ensemble Data Mining Methods for Detecting Credit Card Fraud Transactions
As we know, credit cards speed up and make life easier for all citizens and bank customers. They can use it anytime and anyplace according to their personal needs, instantly and quickly and without hassle, without worrying about carrying a lot of cash and more security than having liquidity. Together, these factors make credit cards one of the most popular forms of online banking. This has led ...
متن کاملSpecial Section on Information Theory and Its Applications
Shannon theory, Source coding, Data compression, Channel coding, Coding theory, Communication theory, Coding and modulation, Transmission technology, Wireless communications, Optical communications, Detection and estimation, Stochastic processes, Sequence design and analysis, Cryptography, Information-theoretic security, Information theory in networks, Network coding, Quantum information theory...
متن کامل