SCALAR MULTIPLICATION ON KOBLITZ CURVES USING THE FROBENIUS ENDOMORPHISM AND ITS COMBINATION WITH POINT HALVING: EXTENSIONS AND MATHEMATICAL ANALYSIS
|
|
- Kory Sutton
- 5 years ago
- Views:
Transcription
1 SCALAR MULTIPLICATION ON KOBLITZ CURVES USING THE FROBENIUS ENDOMORPHISM AND ITS COMBINATION WITH POINT HALVING: EXTENSIONS AND MATHEMATICAL ANALYSIS ROBERTO M. AVANZI, CLEMENS HEUBERGER, AND HELMUT PRODINGER Abstract. In this paper we prove the optimality and other properties of the τ-adic nonadjacent form: this expansion has been introduced in order to efficiently compute scalar multiplications on Koblitz curves. We also refine and extend results about double expansions of scalars introduced by Avanzi, Ciet and Sica in order to further improve scalar multiplications. Our double expansions are optimal and their properties are carefully analysed. In particular we provide first and second order terms for the expected weight, determine the variance and prove a central limit theorem. Transducers for all the involved expansions are provided, as well as automata accepting all expansions of minimal weight.. Introduction In 985 Miller [] and Koblitz [9] independently proposed to design cryptosystems around the group of rational points of an elliptic curve over a finite field. The performance of any such cryptosystem depends on the efficiency of their fundamental operation, the scalar multiplication: Given a point P and an integer s, compute sp. The generic way of computing scalar multiplications is to use a double-and-add method (isomorphic to a Horner scheme) and a (possibly redundant) base 2 representation of the scalar, the representation of choice being the width-w non-adjacent form, or w-naf, independently introduced by Miyaji et al. [2] and Solinas [8] (see also [, 3, ] for more properties and similar methods). Some families of elliptic curves have arithmetic properties which can be successfully exploited to considerably speed up this operation. Noteworthy are the curves defined by () E a : y 2 + xy = x 3 + ax 2 + with a {, } over a finite field F 2 n. They were first proposed by Koblitz [], whence their name Koblitz curves. Solinas [7, 8] called them anomalous binary curves. The benefit of using them comes from the fact that a scalar multiplication can be performed very efficiently using the Frobenius endomorphism τ. This is the map induced on the curve by the Frobenius automorphism of the field extension F 2 n/f 2, which maps a field element to its square. In fact, the evaluation of the Frobenius is much faster than the addition of two distinct points This paper was written while this author was a visitor at the John Knopfmacher Centre for Applicable Analysis and Number Theory, School of Mathematics, University of the Witwatersrand, Johannesburg. He thanks the centre for its hospitality. This paper was written while this author was a visitor at the John Knopfmacher Centre for Applicable Analysis and Number Theory, School of Mathematics, University of the Witwatersrand, Johannesburg. He thanks the centre for its hospitality. He was also supported by the grant S837-MAT of the Austrian Science Fund. This author is supported by the grant NRF of the South African National Research Foundation.
2 2 R. AVANZI, C. HEUBERGER, AND H. PRODINGER on the curve or the computation of the double of a given point: τ consists just in the squaring of the coordinates, and if a suitable representation of the field F 2 n is chosen squarings are computationally almost free operations. Instead of computing sp using a double-and-add method, one uses an expression n i= s iτ i with n n by this it is understood that n n + c for a small absolute constant c and such that sp = n i= s iτ i (P ). Such an expression can be evaluated easily via a Horner scheme, resulting in an algorithm using only repeated applications of τ interspersed with additions of the base point P. Solinas introduced a method for computing the s i s efficiently leading to a representation of any given scalar s where on average n/3 of the s i are nonzero. His representation satisfies the syntactical property s i s i+ =, akin to that of the non adjacent form of any integer. Because of this his recoding is called the τ-naf. Knudsen [8] and Schroeppel [6] independently proposed a technique to speed up scalar multiplication on all elliptic curves over binary fields based on point halving. This method computes the multiple R of any point P of odd order such that 2R = P and R P. The point R is denoted as P. Since for curves of order twice a prime point halving is up to three 2 times as fast as point doubling, it is possible to improve performance of scalar multiplication by expanding the scalar using powers of /2 and replacing the double-and-add algorithm with a halve-and-add method. The present paper deals with properties of integer expansions which are associated to Koblitz curves, as well as with techniques combining point halving and Frobenius expansions introduced in [2]. The latter, which are used to improve the speed of scalar multiplication, are extended in an optimal way, and a complexity analysis of the resulting methods is provided. The techniques in [2] stem from the following observation. Let Q := τ( P ). There exist 2 expressions of the form k i= ε iτ i where ε i {, ±}, ε ε k with the property that k i= ε iτ i (P ) = k i= δ iτ i (Q) for suitable δ i s in {, ±} but the number of non-zero δ i s is considerably smaller than the amount of non-zero ε i s. In [2] three different types of such expressions are presented which are then used to compute sp as (2) n i= s () i τ i (P ) + n 2 i= s (2) i τ i (Q) with n, n 2 n. The difference with Solinas method is that the number of non-zero coefficients among the s (j) i is now about 2n/7. The scalar multiplication can be performed without additional precomputations but doubling the number of Frobenius applications. This still leads to a non-negligible speed-up (cf. [2, Algorithm 3]). Alternatively, Q can be precomputed and the number of Frobenius applications corresponds to Solinas method. All the expressions presented in [2] share the property that only two of the δ i s are nonzero. Ciet s thesis [3] contains a heuristic approach for deriving more complicated expressions from the given ones but the resulting improvement is minimal. A brute-force search on a computer reveals that there is at least another family of τ-adic expressions simplifying to an expression with two non-zero coefficients, and this has been the starting point for the present research. The main aim of this paper is to refine the methods in [2] and [3] giving an optimal splitting of the type (2), and to give a more precise complexity analysis. It also turned out that some information about the τ-naf was apparently missing from the literature. In particular, we found no proof that the τ-naf is a τ-adic recoding of minimal
3 SCALAR MULTIPLICATION ON KOBLITZ CURVES 3 weight. Also, explicit transducers for computing the τ-naf have not been described. Exactly as for the NAF, the τ-naf is some recoding of minimal weight, but it is not the only minimal expansion. However, the non-adjacency property implies that every number has a unique τ-naf. We then provide automata that accept as valid inputs only the recodings of minimal weight. These results are collected in Section 2. In the section that follows we turn our attention to the double expansions of type (2). We introduce a double expansion which we call the wide-double-naf, prove that it has minimal weight among all the double expansions, and provide automata that validate the double expansions of minimal weight. The average weight of the wide-double-naf is n/. Transducers computing the wide-double-naf of scalars are also provided, which can be trivially transformed in recoding algorithms that employ table look-ups. Finally, a complexity analysis with second order terms, variance and a central limit theorem is given. Section contains a refined analysis of the double digits in the wide-double-naf. An appendix contains some illustrations showing fractals that appear when evaluating some τ-nafs, as well as odometers for adding ± to an existing τ-naf. 2. τ-expansions We consider here a curve defined by equation () over a finite field F 2 n and set µ = ( ) a. Let τ denote the Frobenius automorphism of the field extension F 2 n/f 2, i.e., τ(x) = x 2. Since the equation of the curve E a is invariant under τ, this map permutes the F 2 n-rational points of the curve. It is well-known (cf. Solinas [8, Section.]) that for each point P E a (F 2 n), we have (τ 2 + 2)P = µτ(p ), which implies that we can identify τ with the complex number satisfing (3) τ = µτ. Now, for any z Z[τ], a τ-expansion of z is an expression s = (..., s 2, s, s ) {,, } such that only finitely many s j and value τ (s) := j s jτ j = z. We will identify finite and (left) infinite sequences in the natural way by padding with leading zeros. The Hamming weight of s is the number of j such that s j. If m Z has a τ-expansion s and P E a (F 2 n), mp can be computed as j s jτ j (P ). Obviously, the Hamming weight corresponds to the number (plus ) of additions on the curve E a. A τ-nonadjacent-form (τ-naf) of z is a τ-expansion s of z satisfying s j s j+ = for all j, i.e., an expansion that does not contain adjacent nonzero digits. Solinas [8, Section.2, Theorem ] showed that each z Z[τ] has a unique τ-naf. In Figures and 2, there is a transducer which computes the τ-naf of an integer from any other τ-expansion from right to left for µ = and µ =, respectively. In various places, we write for and ε for the empty word. We note that all transducers in this paper read their input and write their output from right to left. For all transitions i d o j in the transducers in Figures and 2, we have d + value τ (i) = τ(value τ (j) + value τ (.o)), where value τ (s k s.s s l ) = k j= l s jτ j. Furthermore, if i has l i and j has l j digits after the τ-point, then o has length +l i l j. This implies that the transducers indeed produce a τ expansion of the value of its input. Obviously, the transducers produce a NAF.
4 R. AVANZI, C. HEUBERGER, AND H. PRODINGER. ε ε ε... ε ε ε ε. ε ε ε. Figure. Transducer to compute the τ-naf from any τ-expansion from right to left, where µ =. As in the case of the binary nonadjacent form introduced by Reitwiesner [5], the τ-naf minimizes the Hamming weight, which implies that the use of the τ-naf of m Z for computing mp minimizes the number of curve additions required. Theorem. Let z Z[τ]. Then the Hamming weight of the τ-naf of z is minimum amongst all τ-expansions of z. Direct proof. We claim that for any τ-expansion s with any (rational) integer digits, we have c(s) c(naf(s)), where c(s) := j s j and NAF(s) denotes the τ-naf of value τ (s).
5 SCALAR MULTIPLICATION ON KOBLITZ CURVES 5. ε ε ε. ε.. ε ε ε. ε ε ε. Figure 2. Transducer to compute the τ-naf from any τ-expansion from right to left, where µ =. It is clear that the theorem is a consequence of this claim, since for expansions with digits {, ±}, the costs c equal the Hamming weight. We prove this claim by induction on c(s). Without loss of generality, we may assume that s >. We choose k Z such that s 2k 2. We have value τ (..., s 3, s 2, s, s ) = value τ (..., s 3, s 2 k, s + µk, s 2k) =: value τ (s ). Of course, c(s ) = c(s) + s 2 k s 2 + s + µk s + (s 2k) s c(s). Since c(..., s 3, s 2, s ) < c(s ) c(s), we may replace this expansion by its τ-naf by induction
6 6 R. AVANZI, C. HEUBERGER, AND H. PRODINGER hypothesis without increasing its cost c. We conclude that value τ (s) = value τ (s ) for some s such that s {, 2}, (..., s 3, s 2, s ) is in τ-naf and c(s ) c(s). We note that for arbitrary t 3, t, we have (a) (b) (c) value τ (,, 2) = value τ (, µ, ), value τ (, µ, 2) = value τ (,, ), value τ (t 3,, µ, 2) = value τ ( µ + t 3,,, ) (note that the cost c of the left hand side is always larger than that of the right hand side) and (5a) (5b) (5c) (5d) value τ (t 3,,, 2) = value τ ( µ + t 3,, µ, ), value τ (t,,,, 2) = value τ ( + t, µ,, µ, ), value τ (t 3,, µ, ) = value τ ( µ + t 3,,, ), value τ (, µ, ) = value τ (,, ). In the last four equalities, the cost c of the left hand side is not smaller than that of the right hand side and the last three or two digits of the right hand side are already in nonadjacent form. We consider the equivalences () and (5) as replacement rules: replace an occurrence of the left hand side by the corresponding right hand side. Applying these rules on s and then using the induction hypothesis for the resulting expansion (in the case of the rules in ()) or on the left part of the resulting expansion (i.e., excluding the last two or three digits) in the case of the rules in (5), our claim is proved. Automatic proof. The same result can also be proved using the argument of [5, Lemma 9] and computations involving the transducers in Figures and 2: We consider the weighted digraph induced by the transducers in Figures and 2, respectively, with edge weights w(i d o j) := c(d) c(o), where c(s) := j s j and c(ε) =. By using the Ford-Bellman algorithm (cf. Cook et al. []), we conclude that there is no negative cost cycle, which implies that the shortest path (in terms of the costs c) from to has weight, i.e., the τ-naf is a τ-expansion of minimal weight. As in [5, Remark 2], we conclude that any optimal τ-expansion corresponds to edges satisfying π(i) + w(i d o j) = π(j), where π(i) denotes the vertex potential of vertex i, i.e., the weight of the shortest path from the initial vertex to vertex i. Therefore, the set of optimal τ-expansions equals the set of expansions recognized by the automata in Figures 3 and for µ = and µ =, respectively. Theorem 2. Let s be a τ-expansion of some z Z[τ]. Then the Hamming weight of s is minimum amongst all τ-expansions of z if and only if s is accepted by the automaton in Figure 3 for µ = or Figure for µ =. 3. New Scalar Decomposition and Scalar Multiplication Avanzi, Ciet, and Sica [2] proposed the following method for computing mp, where m Z and P E a (F 2 n). They set Q := τ( P ), which is easy to compute (cf. [2]), and compute 2
7 SCALAR MULTIPLICATION ON KOBLITZ CURVES Figure 3. Automaton accepting all τ-expansions of minimal weight from right to left for µ =. elements m, m Z[τ] such that mp = m P + m Q, choosing τ-expansions of m and m such that the sum of their Hamming weights is small. We will refine their method giving an optimal such splitting, give a precise analysis involving second order terms, the variance, and a central limit theorem. Equation (3) implies that τ 3 + 2τ = µτ 2 = µ(µτ 2) = τ 2µ, hence (6) 2 = µ( + τ 2 )τ. In particular, this means that we can compute 2P as µ ( + τ 2) τp. This alone is not very useful, since it replaces a point doubling with one addition and three Frobenius operations. However, these relations become interesting if we can make repeated use of them. We consider so-called (( µ)( + τ 2 ), )-double expansions ( s() ), where s () and s (2) are s (2) just any τ-expansions of arbitrary elements of Z[τ]. We call two such expansions ( s() ) s (2) and ( s () s() s (2) ) equivalent and write ( ) ( s () ), if value s (2) s (2) τ (s () )( µ)( + τ 2 ) + value τ (s (2) ) = value τ (s () )( µ)( + τ 2 ) + value τ (s (2) ). If we have a point P E a (F 2 n) and set Q = τ( P ), 2 the relation ( s() ) ( s () ) implies that value s (2) s τ(s () )P + value (2) τ (s (2) )Q = value τ (s () )P + value τ (s (2) )Q. The Hamming weight of a double expansion ( s() ) is defined to be the sum of the Hamming s (2) weights of s () and s (2).
8 8 R. AVANZI, C. HEUBERGER, AND H. PRODINGER Figure. Automaton accepting all τ-expansions of minimal weight from right to left for µ =. Let now s be the τ-naf of an m Z. We will construct a double expansion ( s() ) such s (2) that ( s ) ( s() ) and such that the Hamming weight of ( s() ) is minimum. s (2) s (2) Definition. A double expansion ( ) s () (i) s is called a wide-double-naf, if s (2) j = ± implies that s j+2 = s j+ = ( ) (i and s ) j =, where i = 2 i and j. This means that in the language of regular expressions, a wide-double-naf can be written as ( ε ) ( ). We first prove a uniqueness result. Lemma. If s and s are equivalent wide-double-nafs, then they are equal. The proof relies on the following extension of Solinas [8] Lemma 28, which he used to prove the uniqueness of the τ-naf. Lemma 2. Consider z = j s jτ j Z[τ]. Then () z is divisible by τ in Z[τ] if and only if s (mod 2), (2) z is divisible by τ 2 in Z[τ] if and only if s + 2s (mod ),
9 SCALAR MULTIPLICATION ON KOBLITZ CURVES 9 (3) z is divisible by τ 3 in Z[τ] if and only if s 2µs s 2 (mod 8). Proof of Lemma 2. The first two assertions have been proved by Solinas [8]. To prove the last assertion, we see that by definition, the element z is divisible by τ 3 if and only if there are rational integers a, a such that s + s τ + s 2 τ 2 = τ 3 (a + a τ). Multiplying with the complex conjugate τ 3 of τ 3, we get s τ 3 +2s τ 2 +s 2 τ = 8(a +a τ) using τ τ = 2. Reducing this equation using τ = µ τ and the minimal polynomial, we obtain 8(a + a τ) = 3µ(s 2µs s 2 ) 8s 8µs 2 + τ(s 2µs s 2 ). Thus divisibility is equivalent to s 2µs s 2 (mod 8). Proof of Lemma. Let ( ) ( s () s s () ) (2) s be two wide-double-nafs. Without loss of generality, (2) we may assume that ( s () ) ( s () ) s (i) (2) s and that s (2) = for some i {, 2}, which implies s (i ) = for i = 2 i by definition of a wide-double-naf. By definition of equivalence, we have (7) j (s () j s () j )( µ)( + τ 2 )τ j + (s (2) j s (2) j )τ j =. j From the first assertion of Lemma 2 we conclude that Since s (i) = and s (i ) (s () s () )( µ) + (s (2) s (2) ) (mod 2). =, we conclude that ( s () ) ( (k) ). This implies that s j for j, k 2. We set c = µ(s () s () ) and d = (s(2) s (2) ). From (7) we conclude that c( + τ 2 ) + d is divisible by τ 3, which implies (8) (c + d) c d 3c (mod 8) s (2) = s (k) j = by Lemma 2. By assumption, we have (c, d) (, ) and c + d = 2. This contradicts (8). Now we can prove that a wide-double-naf indeed exists and minimizes the Hamming weight in its equivalence class. Theorem 3. Let s be a (( µ)( + τ 2 ), )-double expansion. Then there exists a unique wide-double-naf which is equivalent to s. Its Hamming weight is not larger than that of s. Proof. We allow arbitrary integer digits in s and prove the theorem by induction on c(s) := ( s () j + s (2) ) j. j By (the direct proof of) Theorem, we may replace (s (i) j ) j by its τ-naf (s (i) j ) j for i {, 2} without increasing the costs c. Of course, we have s s. We easily check that for all t (i) j, we have ( ) ( ) () () t 2 t 2 (9a) t (2) 2 µ ( µ + t (2) 2 ), ( ) ( ) (9b), µ
10 R. AVANZI, C. HEUBERGER, AND H. PRODINGER (9c) (9d) (9e) (9f) (9g) ( t () 5 t (2) 5 t () t (2) ( ) ( ) t () t () µ, ( ) ( ) t (2) 2 t (2), 2 ( ) ( ) t () 2 t () 2, µ ( ) ( ), µ µ ) ( t () () 3 t 5 (µ + t (2) 5 ) t () t (2) t () 3 ). We note that in all the above equivalences, the costs c decrease from the left hand side to the right hand side. This means that if we find one of the left hand sides (or its negatives, of course) as subblocks in our double expansion s, we can replace this subblock by the corresponding right hand side and use the induction hypothesis to convert the resulting expansion to a wide-double-naf not increasing the costs. So we may assume that the left hand sides of (9) do not occur (at least in the rightmost digits). Furthermore, we have ) ( ) () t (a) (b) (c) (d) (e) (f) (g) (h) (i) ( t () 6 t (2) 6 ( t () t (2) t () 5 t (2) 5 t () 3 t (2) 3 t (µ + t (2) ) t (2), 3 ) ( ) () t 6 t () 5 t () t (2) 3 ( µ + t (2) 6 ) t (2) 5 t (2) ( + t (2) 3 ), µ ( ) ( ) t () 3 ( µ + t () 3 ), µ µ ) ( ) () t t (2) 3 (µ + t (2) ) t (2), 3 µ ( ) ( ) t (2) 3 ( + t (2), 3 ) µ ( ) ( ) t () 3 ( + t () 3 ) µ, ( ) ( ) µ µ t (2) 3 ( µ + t (2) 3 ), ) ( ) () µ t µ t (2) 3 ( + t (2) ) t (2), 3 ( ) ( ) () () t 3 t 3 µ t (2) 3 ( µ + t (2) 3 ). t () t (2) ( t () t (2) ( t () t (2) () 3
11 SCALAR MULTIPLICATION ON KOBLITZ CURVES We observe that in each of the above equivalences, the costs do not increase from left to right and that the last three digits of the right hand side is always a block which is allowed in a wide-double-naf. This means that we can apply the induction hypothesis to the right hand sides with the last three digits removed. Finally, we note that for every s found above, exactly one of the listed equivalences (or its negative) can be applied. It is straightforward to write down explicitly a computer program that performs the recoding simply by table look-ups. Of course, the rules (9) and () can also be implemented by a transducer. This transducer has 53 states, hence it is not shown in this paper. The transducer can however be used to give an automatic optimality proof following the lines of the automatic proof of Theorem. As a consequence, we also get a characterization of optimal expansions. In this case, the automaton recognizing the optimal expansions can be simplified to 28 states and is shown in Figures 5 and 6 for µ = and µ =, respectively Figure 5. Automaton accepting all double expansions of minimal Hamming weight for µ = In our situation, we are given the τ-naf s of an integer m Z and we are looking for the wide-double-naf which is equivalent to ( s ). In this case, the above mentioned transducer with 53 states can be considerably reduced only the inputs,, can occur, furthermore,
12 2 R. AVANZI, C. HEUBERGER, AND H. PRODINGER Figure 6. Automaton accepting all double expansions of minimal Hamming weight for µ = the NAF-condition on the input can be imposed: The resulting transducer only has 9 states and is shown in Figures 7 and 8 for µ = and µ =, respectively. The labels of the states correspond to carries (before the τ-point ) and stored input where no decision could be made up to now (after the τ-point ). More precisely, for a transition s.s d o t.t we always have ( ( d ) ) s + s tt o and the sum of the lengths of d and s equals the sum of the lengths of t and o. The output is always a wide-double-naf. Not every wide-double-naf can be reached by applying the transducers in Figures 7 and 8. If we consider the output of these transducers as the input of an nondeterministic
13 SCALAR MULTIPLICATION ON KOBLITZ CURVES 3.. ε ε ε.. ε ε ε.. Figure 7. Transducer computing the wide-double-naf equivalent to the (single) input NAF for µ = automaton, convert it to a deterministic automaton and simplify it, we obtain the automaton in ( Figure 9 (for both values of µ). This means that a wide-double-naf s is equivalent to a t ) for some simple τ-naf t if and only if the number of nonzero entries in the second row is even. We can also ask which elements can be represented by a double expansion, when we define the value of a double expansion ( ) s () s to be (t) valueτ (s () ) + value ( µ)(+τ 2 ) τ(s (2) ), i.e., the value in the P -world. By (6), we see that = τ/2. So double expansions ( µ)(+τ 2 ) represent the elements of Z[τ] + τ Z[τ]. The set Z[τ] equals the set Z + τz, so that we have 2 τ Z[τ] = τ Z + τ 2 Z = τ Z + ( µ τ )Z = Z + τ Z. We conclude that double expansions correspond exactly to the set Z + τ Z. 2 We now want to analyze the Hamming weight of the output of the transducers in Figure 7 and 8. We set a (µ) k,l to be the number of τ-nafs of length l whose output after running the transducers in Figure 7 or 8 has Hamming weight k. We consider the generating function G (µ) (U, Z) defined as G (µ) (U, Z) := a (µ) k,l U k Z l. k l For computing this generating function, we consider the labelled adjacency matrix B (µ) (U, Z, Z ) := ( b (µ) ij (U, Z, Z ) ) i 9, j 9
14 R. AVANZI, C. HEUBERGER, AND H. PRODINGER, ε ε,.. ε ε.. ε ε.. Figure 8. Transducer computing the wide-double-naf equivalent to the (single) input NAF for µ =,,, 2,,, Figure 9. Output of the transducers in Figures 7 and 8 (independent of µ) where b (µ) ij (U, Z, Z ) = { U Hamming weight of s Z, if d {, }, U Hamming weight of s Z, if d =, if there is a transition i d s j. The states of the transducer are numbered in some arbitrary way as follows:
15 SCALAR MULTIPLICATION ON KOBLITZ CURVES 5 For µ =, we have Z Z Z UZ UZ UZ UZ UZ UZ UZ B (µ) UZ Z (U, Z, Z ) = Z Z Z. Z Z Z UZ UZ Z UZ UZ UZ UZ UZ UZ In writing down the generating function, we have to care about the fact that our transducer always reads nonzero digits together with its subsequent zero. Thus we have to label such a transition with Z 2, whereas a transition with input label has to be multiplied by Z. There is one exception to this rule: At the end of our input NAF of given length l, we may have to read a single or without its associated, more precisely, we may of course read the associated, but we are not allowed to count it in the input length. In the language of regular expressions, we can write a NAF (from right-to-left) as ( + + ε) ( + () + ( ) ). Therefore, the generating function is (we have to reverse the direction by definition of the matrix product) where G (µ) (U, Z) = (,,..., ) ( I B (µ) (U, Z 2, Z) ) B(U, Z, )v, v = (, U, U, U, U, U, U, U, U) T takes care of the output which has to be written after the last input digit. We note that by chance, v is independent of µ. Using a computer algebra program, we get G (µ) (U, Z) = + 2UZ Z2 + 2UZ 2 UZ 3 + U 2 Z 3 UZ 2U 2 Z 5 + 2U 3 Z 5, ( + Z)( + Z)( + Z + UZ 3 ) again independently of µ. We will therefore drop the index µ for the remainder of the analysis. We now consider the random variable H l which we define to be the Hamming weight of the output of the transducers in Figures 7 and 8 (i.e., the number of elliptic curve summands) reading a random τ-naf of length l, where we consider equidistribution on the set of all τ-nafs of length l. We note that the number of τ-nafs equals the number of binary NAFs and can be calculated as [ ] Z l G(, Z) = [ Z l] + 2Z (Z + 2Z 2 ) = 3 2l 3 ( )l = 3 2l ( + O(2 l )), cf. for instance [6]. Therefore, each NAF of length l occurs with probability 3 2 l (+O(2 l )).
16 6 R. AVANZI, C. HEUBERGER, AND H. PRODINGER Thus the expectation E(H l ) equals [ E(H l ) = ] ( ) Z l G(U, Z), 3 2l ( + O(2 l )) U U= which can be calculated to be E(H l ) = l O(2 l/2 ).25l O(2 l/2 ). This should be compared with the average Hamming weight of NAF s of length l, being l O(2 l ). For computing the variance V(H l ), we calculate We conclude that E(H l (H l )) = 3 2l ( + O(2 l )) [ ] ( ) Z l 2 G(U, Z) U 2 U= = 6 l l O(2 l/2 ). V(H l ) = E(H l (H l )) + E(H l ) (E(H l )) 2 = l O(l2 l/2 ).325l O(l2 l/2 ). From Hwang s [7] quasi-power theorem, we conclude that we have the following central limit theorem: ( lim P H l l ) l + h 2l = h e t2 /2 dt. 8 2π We summarize our findings in the following theorem. Theorem. Let P be a point on E a (F 2 n), m Z and s a τ-naf of m with l digits. Then the transducers in Figures 7 and 8 compute an expansion ( s() s (2) ) such that mp = value τ (s () )P + value τ (s (2) )τ( 2 P ). The right hand side can be written as a sum of H l summands. The random variable H l (where all τ-nafs of length l are considered to be equally likely) satisfies E(H l ) = l O(2 l/2 ).25l O(2 l/2 ), V(H l ) = l O(l2 l/2 ).325l O(l2 l/2 ), ( lim P H l l ) l + h 2l = h e t2 /2 dt. 8 2π
17 SCALAR MULTIPLICATION ON KOBLITZ CURVES 7. Refined Analysis Instead of considering the Hamming weight of the output of the algorithm, we produce here a refined analysis, by counting the digits in the output. The following four digits will be counted:,,, (in that order). The following two tables give, for µ = resp. µ =, the average and variances of these counts (the second line is always the floating point representation). This is easy to achieve from the transducer, by appropriately labelling the edges with auxiliary variables (instead of just one variable U as before). µ = Average Variance l O(2 l/2 25l ) O(l2 l/2 ).625l O(2 l/2 ).8828l O(l2 l/2 ) l O(2 l/2 25l ) O(l2 l/2 ).625l O(2 l/2 ).8828l O(l2 l/2 ) l O(2 l/2 25l ) O(l2 l/2 ).625l O(2 l/2 ).8828l O(l2 l/2 ) l O(2 l/2 25l ) O(l2 l/2 ).625l O(2 l/2 ).8828l O(l2 l/2 ) µ = Average Variance l O(2 l/2 25l ) O(l2 l/2 ).625l O(2 l/2 ).8828l O(l2 l/2 ) l O(2 l/2 25l ) O(l2 l/2 ).625l O(2 l/2 ).8828l O(l2 l/2 ) l O(2 l/2 25l ) O(l2 l/2 ).625l O(2 l/2 ).8828l O(l2 l/2 ) l O(2 l/2 25l ) O(l2 l/2 ).625l O(2 l/2 ).8828l O(l2 l/2 ) References [] R. Avanzi, A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue, Proceedings of Selected Areas in Cryptography 2, Waterloo, ON, Canada, 9 August 2, Lecture Notes in Comput. Sci., Springer-Verlag, Berlin, 2. [2] R. Avanzi, M. Ciet, and F. Sica, Faster scalar multiplication on Koblitz curves combining point halving with the Frobenius endomorphism, Proceedings of Public Key Cryptography 2, Singapore, March, 2, Lecture Notes in Comput. Sci., vol. 297, Springer, 2, pp. 28. [3] M. Ciet, Aspects of secure and efficient implementatation of elliptic curve cryptosystems, Ph.D. thesis, Université Catholique Louvain-la-Neuve, 23. [] W. J. Cook, W. H. Cunningham, W. R. Pulleyblank, and A. Schrijver, Combinatorial optimization, Wiley-Interscience Series in Discrete Mathematics and Optimization, John Wiley & Sons Inc., New York, 998. [5] C. Heuberger and H. Prodinger, Analysis of alternative digit sets for nonadjacent representations, Preprint available at
18 8 R. AVANZI, C. HEUBERGER, AND H. PRODINGER [6], Carry propagation in signed digit representations, European J. Combin. 2 (23), [7] H.-K. Hwang, On convergence rates in the central limit theorems for combinatorial structures, European J. Combin. 9 (998), [8] E. W. Knudsen, Elliptic Scalar Multiplication Using Point Halving, Advances in Cryptology Asiacrypt 99, Lecture Notes in Comput. Sci., vol. 76, Springer-Verlag, Berlin, 999, pp [9] N. Koblitz, Elliptic curve cryptosystems, Math. Comp. 8 (987), no. 77, [] N. Koblitz, CM-curves with good cryptographic properties, Advances in cryptology CRYPTO 9 (Santa Barbara, CA, 99), Lecture Notes in Comput. Sci., vol. 576, Springer, Berlin, 992, pp [] V. S. Miller, Use of elliptic curves in cryptography, Advances in cryptology CRYPTO 85, Lecture Notes in Comput. Sci., vol. 28, Springer-Verlag, Berlin, 986, pp [2] A. Miyaji, T. Ono, and H. Cohen, Efficient elliptic curve exponentiation, Information and communications security. st international conference, ICICS 97, Beijing, China, November, 997. Proceedings (Y. et al. Han, ed.), LNCS, vol. 33, Springer-Verlag, 997, pp [3] J. A. Muir and D. R. Stinson, Minimality and other properties of the width-w nonadjacent form, Tech. Report CORR 2-8, Centre for Applied Cryptographic Research, 2, available at cacr.math.uwaterloo.ca/techreports/2/. [], New minimal weight representations for left-to-right window methods, Tech. Report CACR 2-3, Centre for Applied Cryptographic Research, 2, available at uwaterloo.ca/techreports/2/. [5] G. W. Reitwiesner, Binary arithmetic, Advances in computers, vol., Academic Press, New York, 96, pp [6] R. Schroeppel, Elliptic curve point ambiguity resolution apparatus and method, International Application Number PCT/US/3, filed 9 November 2. [7] J. A. Solinas, An improved algorithm for arithmetic on a family of elliptic curves, Advances in Cryptology - CRYPTO 97. 7th annual international cryptology conference. Santa Barbara, CA, USA. August 7-2, 997. Proceedings (B. S. jun. Kaliski, ed.), LNCS, vol. 29, Springer, Berlin, 997, pp [8], Efficient arithmetic on Koblitz curves, Des. Codes Cryptogr. 9 (2), no. 2-3, 95 29, Towards a quarter-century of public key cryptography. Appendix. Illustrations In this appendix, we illustrate a few properties of the τ-naf, for the reader s benefit. We use the following representations of (double-)digits by colors: Magenta, Blue, Red Green Figure describes all numbers a + bτ, for a, b < 2 and µ =, scaled into a square, and the digit with index (the rightmost digit has index ). Figure describes all numbers a + bτ, for a, b < 2 and µ =, scaled into a square, and the digit with index. Figure 2 describes all numbers a + bτ, for a, b < 2 and µ =, scaled into a square, and the double digit of the wide-double-naf with index.
19 SCALAR MULTIPLICATION ON KOBLITZ CURVES 9 Figure. τ-naf, µ =, k =, M = 2 Figure. NAF, µ = +, k =, M = 2
20 2 R. AVANZI, C. HEUBERGER, AND H. PRODINGER Figure 2. Wide-Double-NAF, µ =, k =, M = 2 Figure 3 describes all numbers a + bτ, for a, b < 2 and µ =, scaled into a square, and the double digit of the wide-double-naf with index. Another interesting construction when dealing with number systems, is the odometer. This is a transducer that describes how to add (or subtract). We will give these odometers for the τ-naf s with µ = ± in the Figures and 5. The meaning of the states is as in Figures and 2. Note that there are two states labelled (and ), since the transducer checks that the input is indeed a nonadjacent form. (R. Avanzi) Institute for Experimental Mathematics (IEM) Universität Duisburg Essen, Ellernstraße 29, D-5326 Essen, Germany, Communication Security (COSY) Electrical Engineering and Information Technology, Ruhr-Universität Bochum, Universitätsstraße 5, D-78 Bochum, Germany address: mocenigo@exp-math.uni-essen.de (C. Heuberger) Institut für Mathematik B, Technische Universität Graz, Steyrergasse 3, 8 Graz, Austria address: clemens.heuberger@tugraz.at (H. Prodinger) The John Knopfmacher Centre for Applicable Analysis and Number Theory, School of Mathematics, University of the Witwatersrand, P. O. Wits, 25 Johannesburg, South Africa address: helmut@maths.wits.ac.za
21 SCALAR MULTIPLICATION ON KOBLITZ CURVES 2 Figure 3. Wide-Double-NAF, µ = +, k =, M = 2
22 22 R. AVANZI, C. HEUBERGER, AND H. PRODINGER. ε ε. ε ε.. ε, ε. ε ε. ε. Figure. Addition of ± for NAFs with µ =. Use initial state for addition of and initial state for addition of.
23 SCALAR MULTIPLICATION ON KOBLITZ CURVES 23. ε ε.... ε ε ε ε, ε ε. ε. Figure 5. Addition of ± for NAFs with µ = +. Use initial state for addition of and initial state for addition of.
Minimality of the Hamming Weight of the τ -NAF for Koblitz Curves and Improved Combination with Point Halving
Minimality of the Hamming Weight of the τ -NAF for Koblitz Curves and Improved Combination with Point Halving Roberto Maria Avanzi 1 Clemens Heuberger 2 and Helmut Prodinger 1 Faculty of Mathematics and
More informationTHE ALTERNATING GREEDY EXPANSION AND APPLICATIONS TO COMPUTING DIGIT EXPANSIONS FROM LEFT-TO-RIGHT IN CRYPTOGRAPHY
THE ALTERNATING GREEDY EXPANSION AND APPLICATIONS TO COMPUTING DIGIT EXPANSIONS FROM LEFT-TO-RIGHT IN CRYPTOGRAPHY CLEMENS HEUBERGER, RAJENDRA KATTI, HELMUT PRODINGER, AND XIAOYU RUAN Abstract. The central
More informationSpeeding up the Scalar Multiplication on Binary Huff Curves Using the Frobenius Map
International Journal of Algebra, Vol. 8, 2014, no. 1, 9-16 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2014.311117 Speeding up the Scalar Multiplication on Binary Huff Curves Using the
More informationANALYSIS OF LINEAR COMBINATION ALGORITHMS IN CRYPTOGRAPHY
ANALYSIS OF LINEAR COMBINATION ALGORITHMS IN CRYPTOGRAPHY PETER J. GRABNER, CLEMENS HEUBERGER, HELMUT PRODINGER, AND JÖRG M. THUSWALDNER Abstract. Several cryptosystems rely on fast calculations of linear
More informationFaster Scalar Multiplication on Koblitz Curves combining Point Halving with the Frobenius Endomorphism
Faster Scalar Multiplication on Koblitz Curves combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi 1, Mathieu Ciet 2, and Francesco Sica 3 1 IEM, University of Duisburg-Essen,
More informationOn the Optimal Pre-Computation of Window τ NAF for Koblitz Curves
On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves William R. Trost and Guangwu Xu Abstract Koblitz curves have been a nice subject of consideration for both theoretical and practical interests.
More informationSYMMETRIC DIGIT SETS FOR ELLIPTIC CURVE SCALAR MULTIPLICATION WITHOUT PRECOMPUTATION
SYMMETRIC DIGIT SETS FOR ELLIPTIC CURVE SCALAR MULTIPLICATION WITHOUT PRECOMPUTATION CLEMENS HEUBERGER AND MICHELA MAZZOLI Abstract. We describe a method to perform scalar multiplication on two classes
More informationRedundant τ-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication
Redundant τ-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication Roberto Maria Avanzi, Clemens Heuberger and Helmut Prodinger Abstract. This paper investigates some
More informationOn Redundant τ -Adic Expansions and Non-adjacent Digit Sets
On Redundant τ -Adic Expansions and Non-adjacent Digit Sets Roberto Maria Avanzi 1,, Clemens Heuberger 2,, and Helmut Prodinger 3, 1 Faculty of Mathematics and Horst Görtz Institute for IT Security Ruhr-University
More informationANALYSIS OF LINEAR COMBINATION ALGORITHMS IN CRYPTOGRAPHY
Transactions on Algorithms 5), 4 ANALYSIS OF LINEAR COMBINATION ALGORITHMS IN CRYPTOGRAPHY PETER J. GRABNER, CLEMENS HEUBERGER, HELMUT PRODINGER, AND JÖRG M. THUSWALDNER Abstract. Several cryptosystems
More informationNew Minimal Weight Representations for Left-to-Right Window Methods
New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo
More informationSpeeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves Christian Hanser and Christian Wagner Institute for Applied Information Processing and Communications (IAIK), Graz
More informationFractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation
Appears in C. Park, S. Chee (Eds.): Information Security and Cryptology ICISC 2004, Springer-Verlag LNCS 3506, pp. 137 153, ISBN-13 978-3-540-26226-8, 2005. Fractional Windows Revisited: Improved Signed-Digit
More informationInstitute for Mathematical Research, Universiti Putra Malaysia, Serdang, Selangor, Malaysia ABSTRACT
Malaysian Journal of Mathematical Sciences 9(S) June: 71-88 (2015) Special Issue: The 4 th International Cryptology and Information Security Conference 2014 (Cryptology 2014) MALAYSIAN JOURNAL OF MATHEMATICAL
More informationHamming Weight of the Non-Adjacent-Form under Various Input Statistics. Clemens Heuberger and Helmut Prodinger
FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung Hamming Weight of the Non-Adjacent-Form under Various Input Statistics Clemens Heuberger
More informationDISTRIBUTION RESULTS FOR LOW-WEIGHT BINARY REPRESENTATIONS FOR PAIRS OF INTEGERS
DISTRIBUTION RESULTS FOR LOW-WEIGHT BINARY REPRESENTATIONS FOR PAIRS OF INTEGERS PETER J. GRABNER, CLEMENS HEUBERGER, AND HELMUT PRODINGER Abstract. We discuss an optimal method for the computation of
More informationScalar Multiplication on Koblitz Curves using
Scalar Multiplication on Koblitz Curves using τ 2 NAF Sujoy Sinha Roy 1, Chester Rebeiro 1, Debdeep Mukhopadhyay 1, Junko Takahashi 2 and Toshinori Fukunaga 3 1 Dept. of Computer Science and Engineering
More informationInteger Decomposition for Fast Scalar Multiplication on Elliptic Curves
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves Dongryeol Kim and Seongan Lim KISA (Korea Information Security Agency), 78, Garak-Dong, Songpa-Gu, Seoul 138-803, Korea {drkim, seongan}@kisa.or.kr
More informationanomalous binary curves, also known as Koblitz curves. The application of our algorithm could lead to efficient implementations of elliptic curve cryp
Parallel Algorithm for Multiplication on Elliptic Curves Juan Manuel Garcia Garcia 1 and Rolando Menchaca Garcia 2 1 Department of Computer Systems Instituto Tecnologico de Morelia Morelia, Mexico jmgarcia@sekureit.com
More informationHybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography
Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography Jithra Adikari, Student Member, IEEE, Vassil Dimitrov, and Laurent Imbert Abstract Multi-exponentiation is a common
More informationTwo Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map Jung Hee Cheon, Sungmo Park, Sangwoo Park, and Daeho Kim Electronics and Telecommunications Research Institute, 161 Kajong-Dong,Yusong-Gu,
More informationMINIMAL EXPANSIONS IN REDUNDANT NUMBER SYSTEMS: FIBONACCI BASES AND GREEDY ALGORITHMS. 1. Introduction. ε j G j, n = j 0
To appear in Periodica Mathematica Hungarica MINIMAL EXPANSIONS IN REDUNDANT NUMBER SYSTEMS: FIBONACCI BASES AND GREEDY ALGORITHMS CLEMENS HEUBERGER Dedicated to Helmut Prodinger on the occasion of his
More informationoutput H = 2*H+P H=2*(H-P)
Ecient Algorithms for Multiplication on Elliptic Curves by Volker Muller TI-9/97 22. April 997 Institut fur theoretische Informatik Ecient Algorithms for Multiplication on Elliptic Curves Volker Muller
More informationSoftware implementation of Koblitz curves over quadratic fields
Software implementation of Koblitz curves over quadratic fields Thomaz Oliveira 1, Julio López 2 and Francisco Rodríguez-Henríquez 1 1 Computer Science Department, Cinvestav-IPN 2 Institute of Computing,
More informationEfficient Arithmetic on Koblitz Curves*
Designs, Codes and Cryptography, 19, 195 249 (2000) c 2000 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Efficient Arithmetic on Koblitz Curves* JEROME A. SOLINAS National Security
More informationMathematical analysis of the computational complexity of integer sub-decomposition algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS Mathematical analysis of the computational complexity of integer sub-decomposition algorithm To cite this article: Ruma Kareem K Ajeena and Hailiza
More informationFast point multiplication algorithms for binary elliptic curves with and without precomputation
Fast point multiplication algorithms for binary elliptic curves with and without precomputation Thomaz Oliveira 1 Diego F. Aranha 2 Julio López 2 Francisco Rodríguez-Henríquez 1 1 CINVESTAV-IPN, Mexico
More informationSummation polynomials and the discrete logarithm problem on elliptic curves
Summation polynomials and the discrete logarithm problem on elliptic curves Igor Semaev Department of Mathematics University of Leuven,Celestijnenlaan 200B 3001 Heverlee,Belgium Igor.Semaev@wis.kuleuven.ac.be
More informationUnbalanced digit sets and the closest choice strategy for minimal weight integer representations
Unbalanced digit sets and the closest choice strategy for minimal weight integer representations Clemens Heuberger Institut für Mathematik B Technische Universität Graz, Graz, Austria http://www.opt.math.tugraz.at/~cheub/
More informationAffine Precomputation with Sole Inversion in Elliptic Curve Cryptography
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography Erik Dahmen, 1 Katsuyuki Okeya, 2 and Daniel Schepers 1 1 Technische Universität Darmstadt, Fachbereich Informatik, Hochschulstr.10,
More informationScalar multiplication in compressed coordinates in the trace-zero subgroup
Scalar multiplication in compressed coordinates in the trace-zero subgroup Giulia Bianco and Elisa Gorla Institut de Mathématiques, Université de Neuchâtel Rue Emile-Argand 11, CH-2000 Neuchâtel, Switzerland
More informationABSTRACT 1. INTRODUCTION
THE FIBONACCI NUMBER OF GENERALIZED PETERSEN GRAPHS Stephan G. Wagner Department of Mathematics, Graz University of Technology, Steyrergasse 30, A-8010 Graz, Austria e-mail: wagner@finanz.math.tu-graz.ac.at
More informationA New Algorithm to Compute Terms in Special Types of Characteristic Sequences
A New Algorithm to Compute Terms in Special Types of Characteristic Sequences Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Mathematical and Computational Sciences University of Toronto at Mississauga
More informationA Note on Scalar Multiplication Using Division Polynomials
1 A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu and Chang-An Zhao Abstract Scalar multiplication is the most important and expensive operation in elliptic curve
More informationExponentiation and Point Multiplication. Çetin Kaya Koç Spring / 70
Exponentiation and Point Multiplication 1 2 3 4 5 6 8 7 10 9 12 16 14 11 13 15 20 http://koclab.org Çetin Kaya Koç Spring 2018 1 / 70 Contents Exponentiation and Point Multiplication Exponentiation and
More informationA Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations
A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir School of Computer Science Carleton University, Ottawa, Canada http://www.scs.carleton.ca/ jamuir 23 October
More informationA Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. X, MONTH 2007 1 A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations James A. Muir Abstract We present a simple algorithm
More informationDistributed computation of the number. of points on an elliptic curve
Distributed computation of the number of points on an elliptic curve over a nite prime eld Johannes Buchmann, Volker Muller, Victor Shoup SFB 124{TP D5 Report 03/95 27th April 1995 Johannes Buchmann, Volker
More informationSubquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach
Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach M A Hasan 1 and C Negre 2 1 ECE Department and CACR, University of Waterloo, Ontario, Canada 2 Team
More informationFormulas for cube roots in F 3 m
Discrete Applied Mathematics 155 (2007) 260 270 www.elsevier.com/locate/dam Formulas for cube roots in F 3 m Omran Ahmadi a, Darrel Hankerson b, Alfred Menezes a a Department of Combinatorics and Optimization,
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationEfficient Integer Representations for Cryptographic Operations
Efficient Integer Representations for Cryptographic Operations by James Alexander Muir A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Doctor
More informationCOUNTING OPTIMAL JOINT DIGIT EXPANSIONS. Peter J. Grabner 1. Clemens Heuberger 2.
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 5(3) (25), #A9 COUNTING OPTIMAL JOINT DIGIT EXPANSIONS Peter J. Grabner Institut für Mathematik A, Technische Universität Graz, Steyrergasse
More informationOn the Number of Trace-One Elements in Polynomial Bases for F 2
On the Number of Trace-One Elements in Polynomial Bases for F 2 n Omran Ahmadi and Alfred Menezes Department of Combinatorics & Optimization University of Waterloo, Canada {oahmadid,ajmeneze}@uwaterloo.ca
More informationStatistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study
International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute
More informationFaster Point Multiplication on Elliptic Curves with Efficient Endomorphisms
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms Robert P. Gallant 1, Robert J. Lambert 1, and Scott A. Vanstone 1,2 1 Certicom Research, Canada {rgallant,rlambert,svanstone}@certicom.com
More informationMaximizing the number of independent subsets over trees with maximum degree 3. Clemens Heuberger and Stephan G. Wagner
FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung Maximizing the number of independent subsets over trees with maximum degree 3 Clemens
More informationA REDUCTION OF SEMIGROUP DLP TO CLASSIC DLP
A REDUCTION OF SEMIGROUP DLP TO CLASSIC DLP MATAN BANIN AND BOAZ TSABAN Abstract. We present a polynomial-time reduction of the discrete logarithm problem in any periodic (or torsion) semigroup (Semigroup
More informationCurves, Cryptography, and Primes of the Form x 2 + y 2 D
Curves, Cryptography, and Primes of the Form x + y D Juliana V. Belding Abstract An ongoing challenge in cryptography is to find groups in which the discrete log problem hard, or computationally infeasible.
More informationNON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION
NON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION William D. Banks 1, Frances Griffin 2, Daniel Lieman 3, Igor E. Shparlinski 4 1 Department of Mathematics, University of Missouri Columbia,
More informationParallel Formulations of Scalar Multiplication on Koblitz Curves
Journal of Universal Computer Science, vol. 14, no. 3 (008), 481-504 submitted: /6/07, accepted: 1/11/07, appeared: 1//08 J.UCS Parallel Formulations of Scalar Multiplication on Koblitz Curves Omran Ahmadi
More informationA field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:
Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under
More informationElliptic Curve Cryptography and Security of Embedded Devices
Elliptic Curve Cryptography and Security of Embedded Devices Ph.D. Defense Vincent Verneuil Institut de Mathématiques de Bordeaux Inside Secure June 13th, 2012 V. Verneuil - Elliptic Curve Cryptography
More informationAdditive irreducibles in α-expansions
Publ. Math. Debrecen Manuscript Additive irreducibles in α-expansions By Peter J. Grabner and Helmut Prodinger * Abstract. The Bergman number system uses the base α = + 5 2, the digits 0 and, and the condition
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationFPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers
FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Dimitrov 1, K.U. Järvinen 2, M.J. Jacobson, Jr. 3, W.F. Chan 3, and Z. Huang 1 1 Department of Electrical and
More informationOn the generation of the coefficient field of a newform by a single Hecke eigenvalue
On the generation of the coefficient field of a newform by a single Hecke eigenvalue Koopa Tak-Lun Koo and William Stein and Gabor Wiese November 2, 27 Abstract Let f be a non-cm newform of weight k 2
More informationStandard forms for writing numbers
Standard forms for writing numbers In order to relate the abstract mathematical descriptions of familiar number systems to the everyday descriptions of numbers by decimal expansions and similar means,
More informationEfficient Key Agreement and Signature Schemes Using Compact Representations in GF (p 10 )
Efficient Key Agreement and Signature Schemes Using Compact Representations in GF (p 10 ) Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Combinatorics and Optimization University of Waterloo Waterloo,
More informationRandom Small Hamming Weight Products with Applications to Cryptography
Random Small Hamming Weight Products with Applications to Cryptography Jeffrey Hoffstein, Joseph H. Silverman NTRU Cryptosystems, Inc., 5 Burlington Woods, Burlington, MA 01803 USA, jhoff@ntru.com, jhs@ntru.com
More informationFPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers
FPGA Ipleentation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Diitrov 1 K.U. Järvinen 2 M.J. Jacobson, Jr. 3 W.F. Chan 3 Z. Huang 1 February 28, 2012 Diitrov et al. (Univ. Calgary)
More informationFour-Dimensional GLV Scalar Multiplication
Four-Dimensional GLV Scalar Multiplication ASIACRYPT 2012 Beijing, China Patrick Longa Microsoft Research Francesco Sica Nazarbayev University Elliptic Curve Scalar Multiplication A (Weierstrass) elliptic
More informationP -adic root separation for quadratic and cubic polynomials
P -adic root separation for quadratic and cubic polynomials Tomislav Pejković Abstract We study p-adic root separation for quadratic and cubic polynomials with integer coefficients. The quadratic and reducible
More informationClassification and Comparison of Scalar Multiplication Algorithms in Elliptic Curve Cryptosystems
www.ijocit.org & www.ijocit.ir ISSN = 2345-3877 Classification and Comparison of Scalar Multiplication Algorithms in Elliptic Curve Cryptosystems Saeed Rahimi 1, Abdolrasoul Mirghadri 2 Department of cryptography,
More informationElliptic Curve Cryptosystems and Scalar Multiplication
Annals of the University of Craiova, Mathematics and Computer Science Series Volume 37(1), 2010, Pages 27 34 ISSN: 1223-6934 Elliptic Curve Cryptosystems and Scalar Multiplication Nicolae Constantinescu
More informationComplexity Analysis of a Fast Modular Multiexponentiation Algorithm
Complexity Analysis of a Fast Modular Multiexponentiation Algorithm Haimin Jin 1,, Duncan S. Wong, Yinlong Xu 1 1 Department of Computer Science University of Science and Technology of China China jhm113@mail.ustc.edu.cn,
More informationFast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form
Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form Toru Akishita Sony Corporation, 6-7-35 Kitashinagawa Shinagawa-ku, Tokyo, 141-0001, Japan akishita@pal.arch.sony.co.jp Abstract.
More informationGALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2)
GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) KEITH CONRAD We will describe a procedure for figuring out the Galois groups of separable irreducible polynomials in degrees 3 and 4 over
More informationFast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas
Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas Saud Al Musa and Guangwu Xu Department of EE & CS, University of Wisconsin-Milwaukee, USA, {salmusa,gxu4uwm}@uwm.edu
More informationThe decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t
The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t Wiebke S. Diestelkamp Department of Mathematics University of Dayton Dayton, OH 45469-2316 USA wiebke@udayton.edu
More informationThompson s group and public key cryptography
Thompson s group and public key cryptography Vladimir Shpilrain 1 and Alexander Ushakov 2 1 Department of Mathematics, The City College of New York, New York, NY 10031 shpilrain@yahoo.com 2 Department
More informationOn NP-Completeness for Linear Machines
JOURNAL OF COMPLEXITY 13, 259 271 (1997) ARTICLE NO. CM970444 On NP-Completeness for Linear Machines Christine Gaßner* Institut für Mathematik und Informatik, Ernst-Moritz-Arndt-Universität, F.-L.-Jahn-Strasse
More informationEfficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves SESSION ID: CRYP-T07 Patrick Longa Microsoft Research http://research.microsoft.com/en-us/people/plonga/
More informationZero-sum square matrices
Zero-sum square matrices Paul Balister Yair Caro Cecil Rousseau Raphael Yuster Abstract Let A be a matrix over the integers, and let p be a positive integer. A submatrix B of A is zero-sum mod p if the
More information20 The modular equation
18.783 Elliptic Curves Spring 2015 Lecture #20 04/23/2015 20 The modular equation In the previous lecture we defined modular curves as quotients of the extended upper half plane under the action of a congruence
More informationPermutation decoding for the binary codes from triangular graphs
Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for
More informationSolutions to Assignment 1
Solutions to Assignment 1 Question 1. [Exercises 1.1, # 6] Use the division algorithm to prove that every odd integer is either of the form 4k + 1 or of the form 4k + 3 for some integer k. For each positive
More informationSome Results on the Arithmetic Correlation of Sequences
Some Results on the Arithmetic Correlation of Sequences Mark Goresky Andrew Klapper Abstract In this paper we study various properties of arithmetic correlations of sequences. Arithmetic correlations are
More informationTHE SUM OF DIGITS OF n AND n 2
THE SUM OF DIGITS OF n AND n 2 KEVIN G. HARE, SHANTA LAISHRAM, AND THOMAS STOLL Abstract. Let s q (n) denote the sum of the digits in the q-ary expansion of an integer n. In 2005, Melfi examined the structure
More informationCounting Functions for the k-error Linear Complexity of 2 n -Periodic Binary Sequences
Counting Functions for the k-error inear Complexity of 2 n -Periodic Binary Sequences amakanth Kavuluru and Andrew Klapper Department of Computer Science, University of Kentucky, exington, KY 40506. Abstract
More informationSOLVING SOLVABLE QUINTICS. D. S. Dummit
D. S. Dummit Abstract. Let f(x) = x 5 + px 3 + qx + rx + s be an irreducible polynomial of degree 5 with rational coefficients. An explicit resolvent sextic is constructed which has a rational root if
More informationA New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,
More informationCONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES. Reinier Bröker
CONSTRUCTING SUPERSINGULAR ELLIPTIC CURVES Reinier Bröker Abstract. We give an algorithm that constructs, on input of a prime power q and an integer t, a supersingular elliptic curve over F q with trace
More informationAn Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves Young-Ho Park 1,, Sangtae Jeong 2, Chang Han Kim 3, and Jongin Lim 1 1 CIST, Korea Univ., Seoul, Korea
More informationGoldbach s Conjecture on ECDSA Protocols N Vijayarangan, S Kasilingam, Nitin Agarwal
Goldbach s Conjecture on ECDSA Protocols N Vijayarangan, S Kasilingam, Nitin Agarwal Abstract - In this paper, an algorithm on Goldbach s conjecture is newly defined for computing a large even number as
More informationElliptic Curves I. The first three sections introduce and explain the properties of elliptic curves.
Elliptic Curves I 1.0 Introduction The first three sections introduce and explain the properties of elliptic curves. A background understanding of abstract algebra is required, much of which can be found
More information. As the binomial coefficients are integers we have that. 2 n(n 1).
Math 580 Homework. 1. Divisibility. Definition 1. Let a, b be integers with a 0. Then b divides b iff there is an integer k such that b = ka. In the case we write a b. In this case we also say a is a factor
More informationExtended Double-Base Number System with Applications to Elliptic Curve Cryptography
Extended Double-Base Number System with Applications to Elliptic Curve Cryptography Christophe Doche, Laurent Imbert To cite this version: Christophe Doche, Laurent Imbert. Extended Double-Base Number
More informationSome Efficient Algorithms for the Final Exponentiation of η T Pairing
Some Efficient Algorithms for the Final Exponentiation of η T Pairing Masaaki Shirase 1, Tsuyoshi Takagi 1, and Eiji Okamoto 2 1 Future University-Hakodate, Japan 2 University of Tsukuba, Japan Abstract.
More informationNew Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields Patrick Longa 1 and Ali Miri 2 1 Department of Electrical and Computer Engineering University of Waterloo,
More informationFinite Fields and Their Applications
Finite Fields and Their Applications 18 (2012) 1232 1241 Contents lists available at SciVerse ScienceDirect Finite Fields and Their Applications www.elsevier.com/locate/ffa What is your birthday elliptic
More informationNew Strategy for Doubling-Free Short Addition-Subtraction Chain
Applied Mathematics & Information Sciences 2(2) (2008), 123 133 An International Journal c 2008 Dixie W Publishing Corporation, U. S. A. New Strategy for Doubling-Free Short Addition-Subtraction Chain
More informationREPRESENTING HOMOLOGY AUTOMORPHISMS OF NONORIENTABLE SURFACES
REPRESENTING HOMOLOGY AUTOMORPHISMS OF NONORIENTABLE SURFACES JOHN D. MCCARTHY AND ULRICH PINKALL Abstract. In this paper, we prove that every automorphism of the first homology group of a closed, connected,
More informationOn the Number of Non-Equivalent Linear Transducers
On the Number of Non-Equivalent Linear Transducers Ivone Amorim António Machiavelo Rogério Reis email: {ivone.amorim,rvr}@dcc.fc.up.pt, ajmachia@fc.up.pt DCC-FC & CMUP, Universidade do Porto Rua do Campo
More informationEfficient Doubling on Genus Two Curves over. binary fields.
Efficient Doubling on Genus Two Curves over Binary Fields Tanja Lange 1, and Marc Stevens 2, 1 Institute for Information Security and Cryptology (ITSC), Ruhr-Universität Bochum Universitätsstraße 150 D-44780
More informationPRIMES Math Problem Set
PRIMES Math Problem Set PRIMES 017 Due December 1, 01 Dear PRIMES applicant: This is the PRIMES 017 Math Problem Set. Please send us your solutions as part of your PRIMES application by December 1, 01.
More informationCombinatorial Method in the Coset Enumeration. of Symmetrically Generated Groups II: Monomial Modular Representations
International Journal of Algebra, Vol. 1, 2007, no. 11, 505-518 Combinatorial Method in the Coset Enumeration of Symmetrically Generated Groups II: Monomial Modular Representations Mohamed Sayed Department
More informationA REPRESENTATION THEORETIC APPROACH TO SYNCHRONIZING AUTOMATA
A REPRESENTATION THEORETIC APPROACH TO SYNCHRONIZING AUTOMATA FREDRICK ARNOLD AND BENJAMIN STEINBERG Abstract. This paper is a first attempt to apply the techniques of representation theory to synchronizing
More informationFORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS
Sairaiji, F. Osaka J. Math. 39 (00), 3 43 FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS FUMIO SAIRAIJI (Received March 4, 000) 1. Introduction Let be an elliptic curve over Q. We denote by ˆ
More information