Multi-exponentiation

In several cryptographic protocols the product of a small number of exponentiations is required, but the separate exponentiation results are not needed. A simultaneous exponentiation algorithm that takes advantage of this situation and that is substantially faster than the ordinary approach using separate exponentiations is presented.


Published in:
IEE Proceedings: Computers and Digital Techniques, 141, 6, 325 - 326
Year:
1994
ISSN:
13502387
Keywords:
Laboratories:




 Record created 2010-06-25, last modified 2018-03-17

Postprint:
Download fulltext
PDF

Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)