Loading...
research article
Multi-exponentiation
In several cryptographic protocols the product of a small number of exponentiations is required, but the separate exponentiation results are not needed. A simultaneous exponentiation algorithm that takes advantage of this situation and that is substantially faster than the ordinary approach using separate exponentiations is presented.
Loading...
Name
149729.pdf
Access type
openaccess
Size
390.41 KB
Format
Adobe PDF
Checksum (MD5)
544409f198bb1000e7b82c4aba3aeb54