An adaptive exponentiation method

Der Chyuan Lou*, Chin Chen Chang

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

7 Scopus citations

Abstract

Exponentiation of large positive integer with a 512-bit exponent is the basis of several well-known cryptographic algorithms. In this paper, an adaptive method for improving the performance of the m-ary method is proposed and analyzed. Due to the efficient utilization of partial results, it is useful for systems with varied exponent and base. This method is based on two ideas. Firstly, for base jc, a few of the exponentiations with smaller exponents are precomputed on-line, that is, x2,x3, . . . ,x(2w-1) are precomputed, where w is an optimization parameter. Secondly, a number of used partial results will be determined and stored in a look-up table during the computation. Assume that squaring is free as compared with multiplication, depending on the numbers of precomputations and partial results, the proposed method on average gives a 26-40% time reduction as compared with the m-ary method. On the other hand, it does require little temporary storage for the used partial results.

Original languageEnglish
Pages (from-to)59-69
Number of pages11
JournalJournal of Systems and Software
Volume42
Issue number1
DOIs
StatePublished - 07 1998
Externally publishedYes

Keywords

  • Exponentiation
  • Public key cryptography
  • The binary method
  • The m-ary method

Fingerprint

Dive into the research topics of 'An adaptive exponentiation method'. Together they form a unique fingerprint.

Cite this