Fast Truncated Multiplication and its Applications in Cryptography
نویسنده
چکیده
Truncated Multiplication computes a truncated product, a contiguous subsequence of the digits of the product of 2 long integers. We review a few truncated multiplication algorithms and adapt them to integers. They are a constant times faster than n-digit full multiplications of time complexity O(n), with 1< α ≤ 2, important in cryptography. For example, the least significant half products with Karatsuba multiplication need 80% of the full multiplication time. The faster the multiplication, the less relative time saving we can achieve. Several improved long integer arithmetic algorithms are presented, including integer reciprocals and divisions, 2n-digit modular multiplication on HW for n-digit half products, Barrettand Montgomerymultiplications. They get further accelerated with application of fast truncated multiplication, like Montgomery multiplication performed in 2.6 Karatsuba multiplications time.
منابع مشابه
Applications of Fast Truncated Multiplication in Embedded Cryptography
Truncated Multiplications compute Truncated Products, contiguous subsequences of the digits of integer products. For an n-digit multiplication algorithm of time complexity O(n), with 1< α ≤ 2, there is a truncated multiplication algorithm, which is constant times faster when computing a short enough truncated product. Applying these fast truncated multiplications several cryptographic long inte...
متن کاملApplications of Fast Truncated Multiplication in Cryptography
Truncated multiplications compute truncated products, contiguous subsequences of the digits of integer products. For an n-digit multiplication algorithm of time complexity O(nα), with 1 < α ≤ 2, there is a truncated multiplication algorithm, which is constant times faster when computing a short enough truncated product. Applying these fast truncated multiplications, several cryptographic long i...
متن کاملFast Truncated Multiplication for Cryptographic Applications
The Truncated Multiplication computes a truncated product, a contiguous subsequence of the digits of the product of 2 integers. A few truncated polynomial multiplication algorithms are presented and adapted to integers. They are based on the most often used n-digit full multiplication algorithms of time complexity O(n), with 1< α ≤ 2, but a constant times faster. For example, the least signific...
متن کاملA Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کاملCSE 291: Advanced techniques in algorithm design
The class will focus on two themes: linear algebra and probability, and their many applications in algorithm design. We will cover a number of classical examples, including: fast matrix multiplication, FFT, error correcting codes, cryptography, efficient data structures, combinatorial optimization, routing, and more. We assume basic familiarity (undergraduate level) with linear algebra, probabi...
متن کامل