Montgomery Multiplier and Squarer in GF(2 m )
|
|
- Herbert Hodge
- 5 years ago
- Views:
Transcription
1 Montgomery Multiplier and Squarer in GF( m ) Huapeng Wu The Centre for Applied Cryptographic Research Department of Combinatorics and Optimization University of Waterloo, Waterloo, Canada h3wu@cacrmathuwaterlooca Abstract Montgomery multiplication in GF( m ) is defined by a(x)b(x) r 1 (x) modf(x), where the field is generated by irreducible polynomial f(x), a(x) andb(x) are two field elements in GF( m ), and r(x) isa fixed field element in GF( m ) In this paper, first we present a generalized Montgomery multiplication algorithm in GF( m ) Then by choosing r(x) according to f(x), we show that efficient architecture for bit-parallel Montgomery multiplier and squarer can be obtained for the fields generated with irreducible trinomials Complexities in terms of gate counts and time propagation delay of the circuits are investigated and found to be comparable to or better than that of polynomial basis or weakly dual basis multiplier for the same class of fields 1 Introduction Finite field has applications in combinatorial designs, sequences, error-control codes, and cryptography Finite field arithmetic operations have been paid much attention recently mainly because its use in cryptography, especially in elliptic curve cryptosystems Research in this area has been characterized by its strong flavor of implementation both in software and in hardware For example, fields of characteristic two are prevailingly used because a ground field operation can be readily implemented with a VLSI gate 1 In this paper, we first give a generalized Montgomery multiplication algorithm in GF( m ) Then by choosing the fixed field element r(x) accordingtothe irreducible polynomial, we show that efficient multiplication and squaring architectures can be obtained using the generalized algorithm of Montgomery multiplication in GF( m ) The implementation complexities in terms of the number of gates (equivalent to the number of ground field operations) and time propagation delay are lower than or as good as these of previously proposed multipliers for the same class of fields The main implementation results are summarized in the two theorems 1 A multiplication operation in GF() can be implemented using an AND gate, while an addition operation in GF() can be implemented with an XOR gate ÇK Koç and C Paar (Eds): CHES 000, LNCS 1965, pp 64 76, 000 c Springer-Verlag Berlin Heidelberg 000
2 Montgomery Multiplier and Squarer in GF( m ) 65 Preliminaries Montgomery multiplication was first proposed for integer modular multiplication that can avoid trial division [] Later it was extended to finite field multiplication in GF( m ) [1] It was shown that the operation can be made simple if certain type of r(x) is selected [1] In the following, we give a brief review of the Montgomery multiplication in GF( m )proposedin[1] Let f(x) be the irreducible polynomial that defines the field GF( m )and r(x) be a fixed element in GF( m ) Since gcd(f(x),r(x)) = 1, we can use the extended Euclidean algorithm to determine f (x) andr (x) thatsatisfy r(x)r (x)+f(x)f (x) =1 (1) Clearly r (x) =r 1 (x)istheinverseofr(x) Given two field elements a(x),b(x) GF( m ), then an analogue for Montgomery multiplication in GF( m )canbe given by [1] c(x) =a(x)b(x)r 1 (x) modf(x), () and an algorithm to compute () is shown below: Algorithm 1 Montgomery multiplication in GF( m ) [1] Input: a(x),b(x),r(x),f (x) Output: c(x) =a(x)b(x)r 1 (x) modf(x) Step 1 t(x) a(x)b(x) Step u(x) t(x)f (x) modr(x) Step 3 c(x) [t(x) + u(x)f(x)]/r(x) The correctness of Algorithm 1 can be easily checked Note that deg[c(x)] max{deg[t(x)], deg[u(x)] + deg[f(x)]} deg[r(x)] =max{m, deg[r(x)] 1+m} deg[r(x)] =max{m deg[r(x)],m 1} Thus, to have deg[c(x)] m 1,thedegreeofr(x) mustbechosennotlessthan m 1 Since f(x) andf (x) can be considered as constants, it is noted in [1] that efficient multiplication can be achieved if r(x) is properly chosen In fact, r(x) was chosen to be the monomial x m in [1] and Algorithm 1 is equivalent to a polynomial multiplication, two constant multiplications in GF( m )andone addition in GF( m ) 3 Generalized Montgomery Multiplication in GF( m ) For bit-parallel realization of Montgomery multiplication in GF( m ), we find that efficient multiplier architecture can be obtained if r(x) is chosen according to the irreducible polynomial f(x) For example, if the field is generated with a trinomial f(x) =x m + x k +1,thenr(x) is selected to be the term of the second
3 66 Huapeng Wu low degree in the trinomial This choice of r(x) =x k turns out to be very helpful in obtaining low complexity multiplier and squarer architectures However, Algorithm 1 can not directly be used for these cases since k can be less than m 1 This leads us to consider a generalized form of Montgomery multiplication in GF( m ) In the following, we first present a generalized Montgomery algorithm in GF( m ), then compare it with Algorithm 1 Algorithm Generalized Montgomery multiplication in GF( m ) Input: a(x),b(x),r(x),f(x),f (x) Output: c(x) =a(x)b(x)r 1 (x) modf(x) Step 1 t(x) a(x)b(x) Step u(x) t(x)f (x) modr(x) Step 3 c(x) [t(x) + u(x)f(x)]/r(x) Step 4 If deg( c) >m 1, then c(x) c(x) modf(x), else c(x) c(x) The correctness check for the algorithm is similar to that of Algorithm 1 The degree range of c(x) can be estimated Since 0 deg[a(x)] m 1and 0 deg[b(x)] m 1, it follows 0 deg[t(x)] m Assume deg[r(x)] = k, then from Step we have 0 deg[u(x)] k 1 From Step 3, we have deg[ c(x)] max{m k,m 1} (3) When deg[r(x)] = k<m 1, the degree of c(x) ism k and higher than m 1 In this case, one more step of modulo reduction (Step 4) is needed Compared to Algorithm 1, Algorithm extends the degree range that r(x) can be chosen from Algorithm 1 can be considered as a specific case of Algorithm For example, when r(x) is chosen such that deg r(x) m 1, then c(x) obtained at Step 3 in Algorithm has a degree equal to or less than m 1 In this case, Step 4 will not be performed and the algorithm is the same as Algorithm 1 In fact, Algorithm looks more similar to the original Montgomery algorithm [] than Algorithm 1 This is because Step 4 in Algorithm corresponds to the final subtraction step in the original Montgomery algorithm [] In Algorithm 1 this step has been omitted provided that some condition has been applied to how to choose r(x) 4 Montgomery Multiplier in GF( m ) Consider the irreducible polynomial f(x) =x m + x k +1, m k m 1, and the fixed field element r(x) = x k for the Montgomery multiplication in GF( m ) (Algorithm ) From the Extended Euclidean Algorithm, we obtain r 1 (x) =1+x m k and f (x) =1thatsatisfy r(x)r 1 (x)+f(x)f (x) =1 To solve the coefficients of the product c(x) in terms of these of a(x) and b(x) and thus to find efficient multiplier architectures, we proceed with each step of Algorithm as follows
4 Montgomery Multiplier and Squarer in GF( m ) Step 1 in Algorithm Let polynomial basis representations of a(x) and b(x) be given by a(x) = m 1 a ix i,a i GF(), and b(x) = m 1 b ix i,b i GF(), respectively Then t(x) =a(x)b(x) can be obtained as follows; t(x) =a(x)b(x) = m t i x i, (4) where t i s are given by t i = i a j b i j, 0 i m 1, j=0 m 1 j=i m+1 a j b i j,m i m (5) It can be seen that total m bit multiplications and (m 1) bit additions in GF() are required to compute t i, i =0, 1,,m An implementation of (5) is straightforward, and the gate counts and time delays incurred with signals t i, i =0, 1,,m, are listed in Table 1 We denote the time delays of an AND gate and an XOR gate by T A and T X, respectively Table 1 Complexity and Time Delay Involved in Implementing t(x) Signal # AND gates # XOR gates Time delay t 0 = a 0b T A t 1 = a 0b 1 + a 1b 0 1 T A + T X t = a 0b + a 1b 1 + a b 0 3 T A +T X t 3 = a 0b 3 + a 1b + a b 1 + a 3b T A +T X = t m = a 0b m + + a m b 0 m 1 m T A + log (m 1) T X t m 1 = a 0b m a m 1b 0 m m 1 T A + log m T X t m = a 1b m a m 1b 1 m 1 m T A + log (m 1) T X = t m 3= a m b m 1 + a m 1b m 1 T A + T X t m = a m 1b m T A Total: m (m 1) T A + log m T X In the following, we will solve the rest three steps of Algorithm and show that they can be realized at one single implementation step
5 68 Huapeng Wu 4 Step in Algorithm Substitute t(x) in this step using(4) u(x) =t(x)f (x) modr(x) = t 0 + t 1 x + t x + + t m x m mod x k = t 0 + t 1 x + t x + + t k 1 x k 1 (6) Clearly, the degree of u(x) is not higher than that of r(x) If r(x) is chosen to have a low degree then we have a simple u(x) 43 Step 3 in Algorithm Define and t L (x) = t 0 + t 1 x + t x + + t k 1 x k 1, (7) t H (x) = t k + t k+1 x + + t m x m k (8) From (4) (7) and (8), it can be seen that and from (6) and (7) it follows t(x) =t L (x)+x k t H (x), (9) u(x) =t L (x) (10) Substitute t(x) and u(x) in Step 3 with (9) and (10), respectively, and note that f(x) =x m + x k +1,wehave c(x) =[t(x)+u(x)f(x)]/r(x) =[t L (x)+x k t H (x)+t L (x)(x m + x k +1)]/x k =[x k t H (x)+x k (x m k +1)t L (x)]/x k = t H (x)+x m k t L (x)+t L (x) (11) When k = m 1, from (3) we have deg c(x) m 1 Clearly, in this case the degree of c(x) has already been reduced to the proper range and Step 4 in Algorithm is not necessary Extend each of the three terms at the right hand side of (11) for the case of k = m 1, and from (7) and (8) we have t H (x) =t m 1 + t m x + + t m x m 1, xt L (x) =t 0 x + t 1 x + + t m x m 1, t L (x) =t 0 + t 1 x + + t m x m (1)
6 Montgomery Multiplier and Squarer in GF( m ) 69 Then by comparing (1) with (11), and note c(x) =c(x) = write c i as follows c 0 = t 0 + t m 1, c 1 = t 0 + t 1 + t m, c = t 1 + t + t m+1, c m = t m 3 + t m + t m 3, c m 1 = t m + t m m 1 c i x i,wecan Rewrite the above expressions as t 0 + t m 1, i =0, c i = t i 1 + t i + t m 1+i,i=1,,,m, t m + t m, i = m 1 (13) It can be seen from (13) that each c i can be obtained with bit additions in GF(), except that c 0 and c m 1 require one bit operation each Thus, a bitparallel realization of (13) needs m XOR gates Since the maximal number of terms on the right hand side of each equation in (13) is three, the maximal time propagation delay is T X When m k<m 1, from (3) we have deg c(x) >m 1 In this case, a step of modulo reduction is still needed 44 Step 4 in Algorithm From (8) we divide t H (x) intotwoparts:t H (x) =t (1) H (x)+t() H (x), where and t (1) H (x) = t k + t k+1 x + + t k+m 1 x m 1, (14) t () H (x) = t k+m x m + t k+m+1 x m t m x m k (15) Substitute t H (x) in (11) with t (1) H f(x), we have (x) +t() H (x) and note that c(x) = c(x) mod c(x) = c(x) modf(x) =[t (1) H (x)+t() H (x)+xm k t L (x)+t L (x)] mod f(x) = t (1) H (x)+xm k t L (x)+t L (x)+[t () H (x)] mod f(x) (16)
7 70 Huapeng Wu Apply the modulo operation to each term on the right hand side of (15), it follows t k+m x m mod f(x) =t k+m (1 + x k ), t k+m+1 x m+1 mod f(x) =t k+m+1 (x + x k+1 ), t m x m k mod f(x) =t m (x m k + x m ) Adding the above m k 1 equations together, we obtain Split t () H (x) intotwoparts: m k t () H (x) modf(x) = m t m+k+i x i + t m+i x i i=k t (,1) H (x) modf(x) = m k t m+k+i x i, (17) Substitute t () H it follows m 1 t (,) H (x) modf(x) = m t m+i x i (18) (x) witht(,1) H (x)+t(,) H c i x i = t L (x)+x m k t L (x)+t (1) i=k m 1 (x) in (16) and note that c(x) = c i x i, H (x)+t(,1) H (x)+t(,) H (x) (19) Rewrite the equations (7), (14), (17), (18) and extend the term x m k t L (x) using (7), we have the following five equations for the five terms on the right hand side of (19), respectively: (a) t L (x) =t 0 + t 1 x + t x + + t k 1 x k 1 [0,k 1] (b) x m k t L (x) =t 0 x m k + t 1 x m k t k 1 x m 1 [m k, m 1] (c) t (1) H (x) =t k + t k+1 x + + t k+m 1 x m 1 [0,m 1] (d) t (,1) H (x) =t m+k + t m+k+1 x + + t m x m k [0,m k ] (e) t (,) H (x) =t m+kx k + t m+k+1 x k t m x m [k, m ] (0) The last column in the above array is the degree range of the terms on the right-hand side of each equation Now we are ready to solve the coefficients c i by comparing (19) with (0)
8 Montgomery Multiplier and Squarer in GF( m ) 71 In the following, we consider three cases: Case 1: If m +1 <k<m 1 We have m k <m k<k 1 <kby comparing (19) with (0), we can solve c i s (the coefficient of the term x i in c(x)) When 0 i m k, it can be seen from (0) that c i takes on the terms from equations (a), (c) and(d) When i = m k 1, c m k 1 has only two terms, one is from equation (a) and the other from (c) When i runs through from m k to k 1, c i picks up the terms from equations (a), (b) and(c) When k i m, c i has three terms: one from equation (b), one from (c) and the other from (e) Finally, c m 1 hastwotermsfrom equations (b) and(c), respectively We can write c i s as follows (a) (b) (c) (d) (e) c 0 = t 0 +t k +t k+m c 1 = t 1 +t k+1 +t k+m+1 c = t m k m k +t m +t m c m k 1 = t m k 1 +t m 1 c m k = t m k +t 0 +t m (1) c k 1 = t k 1 +t k m 1 +t k 1 c k = +t k m +t k +t k+m c m = +t k +t m+k +t m c m 1 = +t k 1 +t m+k 1 where all the terms at the column (a), (b), are from the equations (a), (b), in (0), respectively Now we can estimate the complexity to obtain the coefficients of the product from t i s From (1), it can be seen that m bit addition in GF() are used to solve c i s The longest time delay to generate c i from t i is T X Case If k = m +1 Wehavem k <m k = k 1 <k By comparing (19) to (0) the coefficients of c(x) can be written as follows (a) (b) (c) (d) (e) c 0 = t 0 +t k +t k+m c 1 = t 1 +t k+1 +t k+m+1 c m k = t k 3 +t k 3 +t m c m k 1 = t k +t k () c m k = t k 1 +t 0 +t k 1 c k = +t 1 +t k t k+m c m = +t k +t m+k +t m c m 1 = +t k 1 +t m+k 1
9 7 Huapeng Wu It can be seen that a realization of the above expressions requires m ground field operations Since the most terms to sum up for each c i is three, the maximal time delay is T X Case 3 If k = m Wehavem k =k <k 1 <m k = k The coefficients of the Montgomery product can be obtained from (19) and (0) as follows: (c) (a) (d) (b) (e) c 0 = t k +(t 0 +t k+m ) c 1 = t k+1 +(t 1 +t k+m+1 ) c k = t m +(t k +t m ) c k 1 = t m 1 +t k 1 c k = t m +(t 0 +t k+m ) c k+1 = t m+1 +(t 1 +t k+m+1 ) c m = t m+k +(t k +t m ) c m 1 = t m+k 1 +t k 1 (3) Note that the resued partial sums are put in the brackets Then it can be seen from (3) that m (k 1) = 3 m 1 bit additions in GF() are required to compute c 0,,c m 1 from t 0,,t m The time delay incurred here is still T X 45 Bit-Parallel Multiplier Architecture From the above discussion, it can be seen that a bit-parallel Montgomery multiplication in GF( m ) is decided by (5) and one of the expressions (1), () and (3) A diagram for the bit-parallel multiplier architecture is shown in Fig 1 The upper two modules (one all-and-gate circuits and one all-xor-gate circuits) are used to perform polynomial multiplication (Step 1 in Algorithm ), while the module at the bottom (all-xor-gate circuits) corresponds to the implementation of Steps to 4 in Algorithm It can be seen from Table 1 that m AND agtes and (m 1) XOR gates are required for generating t i Then the coefficients of c(x) can be generated from t i using one of (1), () and (3) Obviously, the total number of gates required are AND gates, m 1 XOR gates, m if the irreducible trinomial is f(x) =x m + x k +1, m <k m 1 When f(x) =x m + x m + 1, the complexity is only m m m AND gates, XOR gates
10 Montgomery Multiplier and Squarer in GF( m ) 73 a0 :::a m 1 b0 :::b m 1 Step 1 AND network XOR network t0 :::t m Steps -4 XOR network c0 :::c m 1 Fig 1 Bit-Parallel Montgomery Multiplier Architecture when f(x) =x m +x k + 1andr(x) =x k Total time delay of the multiplier is not greater than T A +( log m +)T X In many cases the total propagation delay is less than the above bound Note from the Table 1 that the time delay incurred with different t i is different In fact, circuits for generating t i has a time delay log (i +1) T X if i m 1, and log (m i 1) T X if i m From (13), (1), () and (3), it can be seen that most c i s is a sum of three terms Write them as c i = t i1 + t i + t i3,where we assume that the time delays for generating t i1,t i,andt i3 are d 1,d,andd 3, respectively If d 1 d d 3, then it can be seen that the propagation delay for generating c i depends on d and d 3 if the circuit is designed using c i =(t i1 t i ) t i3 The time delay incurred with the above logic equation for generating c i is T ci =max{d +,d 3 +1} Using this method, we search and find the maximal time delays incurred with the expressions (13), (1), () and (3) 46 Complexity Results and Example We summarize the implementation results on Montgomery multiplier in GF( m ) as follows: Theorem 1 Let the finite field GF( m ) be defined by irreducible trinomial f(x) =x m + x k +1, m k m 1 Then a bit-parallel Montgomery multiplier in GF( m ) can be constructed from the expression (5), and one of the expressions (13), (1), () and (3) The complexity and time propagation delay are given as follows
11 74 Huapeng Wu 1 The complexity is m AND gates and m 1 XOR gates The incurred time delay is T A +( log (m ) +)T X,ifk = m 1 The complexity is m AND gates and m 1 XOR gates The incurred time delay is T A +( log (m k ) +)T X,if m +1 k m 1 3 The complexity is m AND gates and m 1 XOR gates The incurred time delay is T A +( log k +)T X,ifk = m +1 4 The complexity is m AND gates and m m XOR gates The incurred time delay is T A +( log (m 1) + 1)T X,ifk = m 47 Montgomery Squarer in GF( m ) When Algorithm is used for squaring operation, only the first step needs to be changed We rewrite Algorithm for Montgomery squaring in GF( m ) as follows Algorithm 3 Generalized Montgomery squaring in GF( m ) Input: a(x),r(x),f(x),f (x) Output: c(x) =a (x)r 1 (x) modf(x) Step 1 t(x) a (x) Step u(x) t(x)f (x) modr(x) Step 3 c(x) [t(x) + u(x)f(x)]/r(x) Step 4 If deg( c) >m 1, then c(x) c(x) modf(x), else c(x) c(x) With the same selection of the field f(x) =x m +x k +1 and the fixed element r(x) =x k, we proceed with Algorithm 3 step by step Step 1 From t(x) =a (x), we have m 1 a i x i = It can be seen from the above expression m t i x i t i = { a i,,,,m ; 0, i =1, 3,,m 3 (4) Not like multiplication, there is no bit operations needed here to obtain t i Step -4 These three steps are very similar to these in Algorithm, and many intermediate results obtained in the last section can also be used here In the following we only consider the case that k = m 1andm is even For the other cases the deduction is similar From (1) and (4), we have (a) t L (x) =a 0 + a 1 x + a x a m x m [0,m ] (b) xt L (x) =a 0 x + a 1 x a m x m 1 [1,m 1] (c) t H (x) =a m x a m+ m 1 x m 1 [1,m 1] (5)
12 Montgomery Multiplier and Squarer in GF( m ) 75 Note that the expression (a) in (5) has only even power terms and (b) and (c) have only odd power terms Comparing (5) to (11) and note c(x) = c(x) when k = m 1, the coefficients c i can be obtained as follows c i = { a i, i =0,,,m ; + a m+i 1,i=1, 3,,m 1 a i 1 (6) It can be seen that m bit additions in GF() are required to compute c i using (6) Then we know that to implement a bit-parallel Montgomery squarer needs only m XOR gates The time delay for this Montgomery squarer is equivalent to the delay of one XOR gate T X The implementation results can be summarized as follows: Theorem Let the finite field GF( m ) be defined by irreducible trinomial f(x) =x m +x k +1, m k m 1 Then a bit-parallel Montgomery squarer in GF( m ) can be built with m 1 XOR gates and the time propagation delay is T X 5 Comparison Table Comparison of Bit-Parallel Multipliers Proposals # AND #XOR Time delay f(x) =x m + x +1 Wu, Hasan and Blake [6] m m 1 T A +( log m +1)T X Sunar and Koc [3] m m 1 T A +( log m +1)T X Wu [5] m m 1 T A +( log (m ) +)T X Presented here m m 1 T A +( log (m ) +)T X f(x) =x m + x k +1, 1 <k< m l l mm Wu, Hasan and Blake [6] m m 1 T A + log m + k 1 + T X Sunar and Koc [3] m m 1 T A +( log m +)T X Wu [5] m m 1 T A +( log (m 1) +)T X Presented here m m 1 T A +( log (m k ) +)TX f(x) =x m + x m +1 Wu, Hasan and Blake [6] m m m l m m T A + llog m + m4 T X Sunar and Koc [3] m m m Wu [5] m m m Presented here m m m T A +( log m +1)T X T A +( log (m 1) +1)T X T A +( log (m 1) +1)T X Table gives a comparison of four different implementations of bit-parallel multiplier in the same class of fields Note that we consider the fields generated
13 76 Huapeng Wu with two irreducible reciprocal trinomials are the same The bit-parallel multiplier proposed by Wu, Hasan and Blake uses weakly dual basis (WDB) [6] Sunar and Koc presented all trinomial Mastrovito multiplier using polynomial basis The polynomial basis multiplier proposed in [5] has a different architecture from the Mastrovito multiplier It can be seen that all the multipliers achieve the same complexity in terms of the numbers of AND and XOR gates The time propagation delay incurred with the multiplier presented here comparable to that of the previously proposed multipliers Table 3 Comparison of Polynomial Basis Bit-Parallel Squarers Proposals #XOR Time delay f(x) =x m + x k +1,wherem + k odd Wu [5] m + k 1 T X l m Presented here m 1 T X f(x) =x m + x k +1, where bothm and k are odd Wu [5] m 1 T X Presented here m 1 T X It can be seen from Table 3 that Montgomery squarer has both lower complexityand lowertimepropagationdelayfor thecase that m+k is odd, compared to the regular polynomial basis squarer presented in [5] References 1 C K Koc and T Acar Montgomery multiplication in GF( k ) Designs, Codes and Cryptography, 14:57 69, 1998 P L Montgomery Modular multiplication without trial division Mathematics of Computation, 44:519 51, B Sunar and C K Koc Mastrovito multiplier for all trinomials IEEE Trans Comput, 48(5):5 57, M Wang and I F Blake Bit serial multiplication in finite fields SIAM Discrete Mathematics, 3(1): , H Wu Low-complexity arithmetic in finite field using polynomial basis In CHES 99, pages Springer-Verlag, H Wu, M A Hasan, and I F Blake Low complexity weakly dual basis bit-parallel multiplier over finite fields IEEE Trans Comput, 47(11):13 134, November 1998 A PB bit-parallel multiplier can be readily made by adding a basis conversion module to both the input and the output ends By a theorem proposed in [4], when the field is generated with an irreducible trinomial, the coefficients of a field element in WDB is nothing but a permutation of the coefficients of the element in PB Thus a weakly dual basis bit-parallel multiplier proposed in [4] can be used as a polynomial basis bit-parallel multiplier without additional gates and time delay
BSIDES multiplication, squaring is also an important
1 Bit-Parallel GF ( n ) Squarer Using Shifted Polynomial Basis Xi Xiong and Haining Fan Abstract We present explicit formulae and complexities of bit-parallel shifted polynomial basis (SPB) squarers in
More informationLow complexity bit-parallel GF (2 m ) multiplier for all-one polynomials
Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Yin Li 1, Gong-liang Chen 2, and Xiao-ning Xie 1 Xinyang local taxation bureau, Henan, China. Email:yunfeiyangli@gmail.com, 2 School
More informationA new class of irreducible pentanomials for polynomial based multipliers in binary fields
Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date
More informationPARALLEL MULTIPLICATION IN F 2
PARALLEL MULTIPLICATION IN F 2 n USING CONDENSED MATRIX REPRESENTATION Christophe Negre Équipe DALI, LP2A, Université de Perpignan avenue P Alduy, 66 000 Perpignan, France christophenegre@univ-perpfr Keywords:
More informationA New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,
More informationFPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials
FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers
More informationReducing the Complexity of Normal Basis Multiplication
Reducing the Complexity of Normal Basis Multiplication Ömer Eǧecioǧlu and Çetin Kaya Koç Department of Computer Science University of California Santa Barbara {omer,koc}@cs.ucsb.edu Abstract In this paper
More informationSubquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation
Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation
More informationSubquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach
Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach M A Hasan 1 and C Negre 2 1 ECE Department and CACR, University of Waterloo, Ontario, Canada 2 Team
More informationA new class of irreducible pentanomials for polynomial based multipliers in binary fields
Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date
More informationGF(2 m ) arithmetic: summary
GF(2 m ) arithmetic: summary EE 387, Notes 18, Handout #32 Addition/subtraction: bitwise XOR (m gates/ops) Multiplication: bit serial (shift and add) bit parallel (combinational) subfield representation
More informationMastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials
1 Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials Yin Li, Xingpo Ma, Yu Zhang and Chuanda Qi Abstract We present a new type of bit-parallel non-recursive Karatsuba multiplier over
More informationSubquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases
1 Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases H. Fan and M. A. Hasan March 31, 2007 Abstract Based on a recently proposed Toeplitz
More informationMontgomery Multiplication in GF(2 k ) * **
Designs, Codes and Cryptography, 14(1), 57 69 (April 1998) c April 1998 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Montgomery Multiplication in GF(2 k ) * ** ÇETIN K. KOÇ AND
More informationFinite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek
Finite Fields In practice most finite field applications e.g. cryptography and error correcting codes utilizes a specific type of finite fields, namely the binary extension fields. The following exercises
More informationAN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER
Indian Journal of Electronics and Electrical Engineering (IJEEE) Vol.2.No.1 2014pp1-6 available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John Arhter
More informationRevisiting Finite Field Multiplication Using Dickson Bases
Revisiting Finite Field Multiplication Using Dickson Bases Bijan Ansari and M. Anwar Hasan Department of Electrical and Computer Engineering University of Waterloo, Waterloo, Ontario, Canada {bansari,
More informationModular Multiplication in GF (p k ) using Lagrange Representation
Modular Multiplication in GF (p k ) using Lagrange Representation Jean-Claude Bajard, Laurent Imbert, and Christophe Nègre Laboratoire d Informatique, de Robotique et de Microélectronique de Montpellier
More informationNew Bit-Level Serial GF (2 m ) Multiplication Using Polynomial Basis
2015 IEEE 22nd Symposium on Computer Arithmetic New Bit-Level Serial GF 2 m ) Multiplication Using Polynomial Basis Hayssam El-Razouk and Arash Reyhani-Masoleh Department of Electrical and Computer Engineering
More informationFormulas for cube roots in F 3 m
Discrete Applied Mathematics 155 (2007) 260 270 www.elsevier.com/locate/dam Formulas for cube roots in F 3 m Omran Ahmadi a, Darrel Hankerson b, Alfred Menezes a a Department of Combinatorics and Optimization,
More informationAn Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2)
An Algorithm for Inversion in GF2 m Suitable for Implementation Using a Polynomial Multiply Instruction on GF2 Katsuki Kobayashi, Naofumi Takagi, and Kazuyoshi Takagi Department of Information Engineering,
More informationLow complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials
Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI
More informationFinite Fields. Mike Reiter
1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements
More informationProceedings, 13th Symposium on Computer Arithmetic, T. Lang, J.-M. Muller, and N. Takagi, editors, pages , Asilomar, California, July 6-9,
Fast Software Exponentiation in GF(2 k ) C. K. Koc and T. Acar Electrical & Computer Engineering Oregon State University Corvallis, Oregon, 97331, USA E-mail: fkoc,acarg@ece.orst.edu Abstract We present
More informationEfficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields
Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields ARASH REYHANI-MASOLEH and M. ANWAR HASAN University of Waterloo In this article, two digit-serial architectures for normal basis
More informationA Reduction Method for Multiplication in Finite Fields
A Reduction Method for Multiplication in Finite Fields Ç. K. Koç and A. Halbutoǧulları Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331 Technical Report, August 1998 Abstract
More informationOn the Number of Trace-One Elements in Polynomial Bases for F 2
On the Number of Trace-One Elements in Polynomial Bases for F 2 n Omran Ahmadi and Alfred Menezes Department of Combinatorics & Optimization University of Waterloo, Canada {oahmadid,ajmeneze}@uwaterloo.ca
More informationA New Algorithm to Compute Terms in Special Types of Characteristic Sequences
A New Algorithm to Compute Terms in Special Types of Characteristic Sequences Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Mathematical and Computational Sciences University of Toronto at Mississauga
More informationEfficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination
Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination Murat Cenk, Anwar Hasan, Christophe Negre To cite this version: Murat Cenk, Anwar Hasan, Christophe Negre.
More informationPolynomials. Chapter 4
Chapter 4 Polynomials In this Chapter we shall see that everything we did with integers in the last Chapter we can also do with polynomials. Fix a field F (e.g. F = Q, R, C or Z/(p) for a prime p). Notation
More informationA New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields
1 A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields Haining Fan and M. Anwar Hasan Senior Member, IEEE January 5, 2006 Abstract Based on Toeplitz matrix-vector
More informationFPGA Realization of Low Register Systolic All One-Polynomial Multipliers Over GF (2 m ) and their Applications in Trinomial Multipliers
Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2016 FPGA Realization of Low Register Systolic All One-Polynomial Multipliers Over GF (2 m ) and their
More informationLinear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x),
Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 + + a n 1 x n 1 + a n x n, where the coefficients a 1, a 2,, a n are
More informationArithmetic in Integer Rings and Prime Fields
Arithmetic in Integer Rings and Prime Fields A 3 B 3 A 2 B 2 A 1 B 1 A 0 B 0 FA C 3 FA C 2 FA C 1 FA C 0 C 4 S 3 S 2 S 1 S 0 http://koclab.org Çetin Kaya Koç Spring 2018 1 / 71 Contents Arithmetic in Integer
More informationMathematical Foundations of Cryptography
Mathematical Foundations of Cryptography Cryptography is based on mathematics In this chapter we study finite fields, the basis of the Advanced Encryption Standard (AES) and elliptical curve cryptography
More informationA New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields
1 A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields Haining Fan and M. Anwar Hasan Senior Member, IEEE July 19, 2006 Abstract Based on Toeplitz matrix-vector
More informationImplementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems Christof Paar Electrical & Computer Engineering Dept. and Computer Science Dept. Worcester Polytechnic Institute Worcester,
More informationHigh Performance GHASH Function for Long Messages
High Performance GHASH Function for Long Messages Nicolas Méloni 1, Christophe Négre 2 and M. Anwar Hasan 1 1 Department of Electrical and Computer Engineering University of Waterloo, Canada 2 Team DALI/ELIAUS
More informationNovel Implementation of Finite Field Multipliers over GF(2m) for Emerging Cryptographic Applications
Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2017 Novel Implementation of Finite Field Multipliers over GF(2m) for Emerging Cryptographic Applications
More informationChapter 4 Finite Fields
Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number
More informationAre standards compliant Elliptic Curve Cryptosystems feasible on RFID?
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Sandeep S. Kumar and Christof Paar Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany Abstract. With elliptic
More informationTransition Faults Detection in Bit Parallel Multipliers over GF(2 m )
Transition Faults Detection in Bit Parallel Multipliers over GF( m ) Hafizur Rahaman Bengal Engineering & Science University, Shibpur Howrah-73, India rahaman_h@it.becs.ac.in Jimson Mathew Computer Science
More informationISSN (PRINT): , (ONLINE): , VOLUME-5, ISSUE-7,
HIGH PERFORMANCE MONTGOMERY MULTIPLICATION USING DADDA TREE ADDITION Thandri Adi Varalakshmi Devi 1, P Subhashini 2 1 PG Scholar, Dept of ECE, Kakinada Institute of Technology, Korangi, AP, India. 2 Assistant
More informationLinear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x
Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,
More informationDual-Field Arithmetic Unit for GF(p) and GF(2 m ) *
Institute for Applied Information Processing and Communications Graz University of Technology Dual-Field Arithmetic Unit for GF(p) and GF(2 m ) * CHES 2002 Workshop on Cryptographic Hardware and Embedded
More informationarxiv: v1 [cs.sc] 16 Nov 2016
1 Efficient Parallel Verification of Galois Field Multipliers Cunxi Yu, Maciej Ciesielski ECE Department, University of Massachusetts, Amherst, USA ycunxi@umass.edu, ciesiel@ecs.umass.edu arxiv:1611.05101v1
More informationA field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:
Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under
More informationRedundant Trinomials for Finite Fields of Characteristic 2
122 Redundant Trinomials for Finite Fields of Characteristic 2 Christophe Doche Division of ICS, Department of Computing Macquarie University, NSW 2109 Australia doche@ics.mq.edu.au Abstract. In this article
More informationHardware implementations of ECC
Hardware implementations of ECC The University of Electro- Communications Introduction Public- key Cryptography (PKC) The most famous PKC is RSA and ECC Used for key agreement (Diffie- Hellman), digital
More informationSUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM
SUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM Pascal Giorgi, Christophe Nègre 2 Équipe DALI, LP2A, Unversité de Perpignan avenue P. Alduy, F66860 Perpignan, France () pascal.giorgi@univ-perp.fr,
More informationA COMBINED 16-BIT BINARY AND DUAL GALOIS FIELD MULTIPLIER. Jesus Garcia and Michael J. Schulte
A COMBINED 16-BIT BINARY AND DUAL GALOIS FIELD MULTIPLIER Jesus Garcia and Michael J. Schulte Lehigh University Department of Computer Science and Engineering Bethlehem, PA 15 ABSTRACT Galois field arithmetic
More informationCOMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162
COMPUTER ARITHMETIC 13/05/2010 cryptography - math background pp. 1 / 162 RECALL OF COMPUTER ARITHMETIC computers implement some types of arithmetic for instance, addition, subtratction, multiplication
More informationOne-Dimensional Linear Hybrid Cellular Automata: Their Synthesis, Properties and Applications to Digital Circuits Testing
One-Dimensional Linear Hybrid Cellular Automata: Their Synthesis, Properties and Applications to Digital Circuits Testing M. Serra, K. Cattell, S. Zhang, J.C. Muzio, D.M. Miller Dept. of Computer Science
More informationHigh-Speed Polynomial Basis Multipliers Over for Special Pentanomials. José L. Imaña IEEE
TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL 63, NO 1, JANUARY 2016 1 High-Speed Polynomial Basis Multipliers Over for Special Pentanomials José L Imaña Abstract Efficient hardware implementations
More informationGalois Fields and Hardware Design
Galois Fields and Hardware Design Construction of Galois Fields, Basic Properties, Uniqueness, Containment, Closure, Polynomial Functions over Galois Fields Priyank Kalla Associate Professor Electrical
More informationA Digit-Serial Systolic Multiplier for Finite Fields GF(2 m )
A Digit-Serial Systolic Multiplier for Finite Fields GF( m ) Chang Hoon Kim, Sang Duk Han, and Chun Pyo Hong Department of Computer and Information Engineering Taegu University 5 Naeri, Jinryang, Kyungsan,
More informationFrequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography
Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Selçuk Baktır, Berk Sunar {selcuk,sunar}@wpi.edu Department of Electrical & Computer Engineering Worcester Polytechnic Institute
More informationA Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2 m )
A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2 m ) Johann Großschädl Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse
More informationA GENERAL POLYNOMIAL SIEVE
A GENERAL POLYNOMIAL SIEVE SHUHONG GAO AND JASON HOWELL Abstract. An important component of the index calculus methods for finding discrete logarithms is the acquisition of smooth polynomial relations.
More informationAlgebra Review 2. 1 Fields. A field is an extension of the concept of a group.
Algebra Review 2 1 Fields A field is an extension of the concept of a group. Definition 1. A field (F, +,, 0 F, 1 F ) is a set F together with two binary operations (+, ) on F such that the following conditions
More informationPolynomial Multiplication over Finite Fields using Field Extensions and Interpolation
009 19th IEEE International Symposium on Computer Arithmetic Polynomial Multiplication over Finite Fields using Field Extensions and Interpolation Murat Cenk Department of Mathematics and Computer Science
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationEE 229B ERROR CONTROL CODING Spring 2005
EE 9B ERROR CONTROL CODING Spring 005 Solutions for Homework 1. (Weights of codewords in a cyclic code) Let g(x) be the generator polynomial of a binary cyclic code of length n. (a) Show that if g(x) has
More informationDESPITE considerable progress in verification of random
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 Formal Analysis of Galois Field Arithmetic Circuits - Parallel Verification and Reverse Engineering Cunxi Yu Student Member,
More informationCyclic codes: overview
Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)
More informationOn A Large-scale Multiplier for Public Key Cryptographic Hardware
1,a) 1 1 1 1 1 Wallace tree n log n 64 128 Wallace tree,, Wallace tree,, VHDL On A Large-scale Multiplier for Public Key Cryptographic Hardware Masaaki Shirase 1,a) Kimura Keigo 1 Murayama Hiroyuki 1 Kato
More informationSubquadratic Polynomial Multiplication over GF (2 m ) Using Trinomial Bases and Chinese Remaindering
Subquadratic Polynomial Multiplication over GF (2 m ) Using Trinomial Bases and Chinese Remaindering Éric Schost 1 and Arash Hariri 2 1 ORCCA, Computer Science Department, The University of Western Ontario,
More informationTheoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs
Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs Sujoy Sinha Roy, Chester Rebeiro and Debdeep Mukhopadhyay Department of Computer Science and Engineering
More informationFast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form
Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form Toru Akishita Sony Corporation, 6-7-35 Kitashinagawa Shinagawa-ku, Tokyo, 141-0001, Japan akishita@pal.arch.sony.co.jp Abstract.
More informationEfficient Hardware Implementation of Finite Fields with Applications to Cryptography
Acta Appl Math (2006) 93: 75 118 DOI 10.1007/s10440-006-9072-z Efficient Hardware Implementation of Finite Fields with Applications to Cryptography Jorge Guajardo Tim Güneysu Sandeep S. Kumar Christof
More informationOptimal Extension Field Inversion in the Frequency Domain
Optimal Extension Field Inversion in the Frequency Domain Selçuk Baktır, Berk Sunar WPI, Cryptography & Information Security Laboratory, Worcester, MA, USA Abstract. In this paper, we propose an adaptation
More informationNew Construction of Single Cycle T-function Families
New Construction of Single Cycle T-function Families Shiyi ZHANG 1, Yongjuan WANG, Guangpu GAO Luoyang Foreign Language University, Luoyang, Henan Province, China Abstract The single cycle T-function is
More informationREDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2
REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2 CHRISTOPHE DOCHE Abstract. In this paper we introduce so-called redundant trinomials to represent elements of nite elds of characteristic 2. The
More informationParallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials Francisco Rodríguez-Henríquez 1, Guillermo Morales-Luna 1, Nazar A. Saqib 2 and Nareli Cruz-Cortés 1 (1) Computer
More informationHardware Implementation of Elliptic Curve Point Multiplication over GF (2 m ) for ECC protocols
Hardware Implementation of Elliptic Curve Point Multiplication over GF (2 m ) for ECC protocols Moncef Amara University of Paris 8 LAGA laboratory Saint-Denis / France Amar Siad University of Paris 8 LAGA
More informationMultiplication of Polynomials
Summary 391 Chapter 5 SUMMARY Section 5.1 A polynomial in x is defined by a finite sum of terms of the form ax n, where a is a real number and n is a whole number. a is the coefficient of the term. n is
More informationIEEE TRANSACTIONS ON COMPUTERS, VOL. 45, NO. 7, JULY 1996 ,*-1 2 PRELIMINARIES. 2.1 General Multiplication in GF(2") I"?
856 IEEE TRANSACTIONS ON COMPUTERS, VOL. 45, NO. 7, JULY 1996 Fi chitecture for a Parallel Finite lier with Low Complexity Based on Composite Fields Christof Paar Abstract-In this paper a new bit-parallel
More informationEfficient multiplication using type 2 optimal normal bases
Efficient multiplication using type 2 optimal normal bases Joachim von zur Gathen 1, Amin Shokrollahi 2, and Jamshid Shokrollahi 3 1 B-IT, Dahlmannstr. 2, Universität Bonn, 53113 Bonn, Germany gathen@bit.uni-bonn.de
More informationOn the distribution of irreducible trinomials over F 3
Finite Fields and Their Applications 13 (2007) 659 664 http://www.elsevier.com/locate/ffa On the distribution of irreducible trinomials over F 3 Omran Ahmadi Department of Combinatorics and Optimization,
More informationParity of the Number of Irreducible Factors for Composite Polynomials
Parity of the Number of Irreducible Factors for Composite Polynomials Ryul Kim Wolfram Koepf Abstract Various results on parity of the number of irreducible factors of given polynomials over finite fields
More informationHigh Performance GHASH Function for Long Messages
High Performance GHASH Function for Long Messages Nicolas Méloni, Christophe Negre, M. Anwar Hasan To cite this version: Nicolas Méloni, Christophe Negre, M. Anwar Hasan. High Performance GHASH Function
More informationPUBLIC-KEY cryptography (PKC), a concept introduced
1 Speeding Up Barrett and Montgomery Modular Multiplications Miroslav Knežević, Student Member, IEEE, Frederik Vercauteren, and Ingrid Verbauwhede, Senior Member, IEEE Abstract This paper proposes two
More informationHow does the computer generate observations from various distributions specified after input analysis?
1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.
More informationCourse MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography
Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups
More informationChapter 4 Mathematics of Cryptography
Chapter 4 Mathematics of Cryptography Part II: Algebraic Structures Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4.1 Chapter 4 Objectives To review the concept
More informationElliptic Curves I. The first three sections introduce and explain the properties of elliptic curves.
Elliptic Curves I 1.0 Introduction The first three sections introduce and explain the properties of elliptic curves. A background understanding of abstract algebra is required, much of which can be found
More informationCoding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013
Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved
More informationA VLSI Algorithm for Modular Multiplication/Division
A VLSI Algorithm for Modular Multiplication/Division Marcelo E. Kaihara and Naofumi Takagi Department of Information Engineering Nagoya University Nagoya, 464-8603, Japan mkaihara@takagi.nuie.nagoya-u.ac.jp
More informationPolynomials. Henry Liu, 25 November 2004
Introduction Polynomials Henry Liu, 25 November 2004 henryliu@memphis.edu This brief set of notes contains some basic ideas and the most well-known theorems about polynomials. I have not gone into deep
More information1. Group Theory Permutations.
1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7
More informationTwitter: @Owen134866 www.mathsfreeresourcelibrary.com Prior Knowledge Check 1) Simplify: a) 3x 2 5x 5 b) 5x3 y 2 15x 7 2) Factorise: a) x 2 2x 24 b) 3x 2 17x + 20 15x 2 y 3 3) Use long division to calculate:
More informationUseful Arithmetic for Cryptography
Arithmetic and Cryptography 1/116 Useful Arithmetic for Cryptography Jean Claude Bajard LIP6 - UPMC (Paris 6)/ CNRS France 8 Jul 2013 Arithmetic and Cryptography 2/116 Introduction Modern Public Key Cryptography
More informationKEY CONCEPTS. Factoring is the opposite of expanding.
KEY CONCEPTS Factoring is the opposite of expanding. To factor simple trinomials in the form x 2 + bx + c, find two numbers such that When you multiply them, their product (P) is equal to c When you add
More informationSection 8.3 Partial Fraction Decomposition
Section 8.6 Lecture Notes Page 1 of 10 Section 8.3 Partial Fraction Decomposition Partial fraction decomposition involves decomposing a rational function, or reversing the process of combining two or more
More informationChapter 5. Cyclic Codes
Wireless Information Transmission System Lab. Chapter 5 Cyclic Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Description of Cyclic Codes Generator and Parity-Check
More informationECEN 604: Channel Coding for Communications
ECEN 604: Channel Coding for Communications Lecture: Introduction to Cyclic Codes Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 604: Channel Coding for Communications
More informationDivision of Trinomials by Pentanomials and Orthogonal Arrays
Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang
More informationEECS150 - Digital Design Lecture 21 - Design Blocks
EECS150 - Digital Design Lecture 21 - Design Blocks April 3, 2012 John Wawrzynek Spring 2012 EECS150 - Lec21-db3 Page 1 Fixed Shifters / Rotators fixed shifters hardwire the shift amount into the circuit.
More informationRings. EE 387, Notes 7, Handout #10
Rings EE 387, Notes 7, Handout #10 Definition: A ring is a set R with binary operations, + and, that satisfy the following axioms: 1. (R, +) is a commutative group (five axioms) 2. Associative law for
More informationCryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur
Cryptographically Robust Large Boolean Functions Debdeep Mukhopadhyay CSE, IIT Kharagpur Outline of the Talk Importance of Boolean functions in Cryptography Important Cryptographic properties Proposed
More information