The Alternating Greedy Expansion and Applications to Left-to-right Algorithms in Cryptography
نویسندگان
چکیده
In [4], we introduced the alternating greedy expansion of integers, which turned out to be useful in several left-to-right algorihms in cryptography. In this paper, we collect known results about this alternating greedy expansion and complement it with other useful properties and algorithms. In the second part, we apply it to give an algorithm for computing a joint expansion of d integers of minimal joint Hamming weight from left to right, i.e., from the column with the most significant bits towards the column with the least significant bits. Furthermore, we can also compute an expansion equivalent to the so-called w-NAF from left to right using the alternating greedy expansion.
منابع مشابه
The alternating greedy expansion and applications to computing digit expansions from left-to-right in cryptography
The central topic of this paper is the alternating greedy expansion of integers, which is defined to be a binary expansion with digits {0,±1} with the property that the nonzero digits have alternating signs. We collect known results about this alternating greedy expansion and complement it with other useful properties and algorithms. In the second part, we apply it to give an algorithm for comp...
متن کاملExpansionary-contradictory Policies in Stock Companies Using Left and Right Returns to Scales in Data Envelopment Analysis Models
The purpose of this paper is to evaluate the returns to scale of the Tehran Stock Exchange based on new models in data envelopment analysis. Using this assessment, it is possible to judge the application of contradictory or expansion policies in stock companies. To this end, there is a need for models in the data envelopment analysis that can assess the left and right returns to scales of the d...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملOn the real quadratic fields with certain continued fraction expansions and fundamental units
The purpose of this paper is to investigate the real quadratic number fields $Q(sqrt{d})$ which contain the specific form of the continued fractions expansions of integral basis element where $dequiv 2,3( mod 4)$ is a square free positive integer. Besides, the present paper deals with determining the fundamental unit$$epsilon _{d}=left(t_d+u_dsqrt{d}right) 2left.right > 1$$and $n_d$ and $m_d...
متن کاملOn the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کامل