Sciweavers

JAL
1998

A Survey of Fast Exponentiation Methods

13 years 11 months ago
A Survey of Fast Exponentiation Methods
Public-key cryptographic systems often involve raising elements of some group (e.g. GF(2n), Z/NZ, or elliptic curves) to large powers. An important question is how fast this exponentiation can be done, which often determines whether a given system is practical. The best method for exponentiation depends strongly on the group being used, the hardware the system is implemented on, and whether one element is being raised repeatedly to different powers, different elements are raised to a fixed power, or both powers and group elements vary. This problem has received much attention, but the results are scattered through the literature. In this paper we survey the known methods for fast exponentiation, examining their relative strengths and weaknesses.
Daniel M. Gordon
Added 22 Dec 2010
Updated 22 Dec 2010
Type Journal
Year 1998
Where JAL
Authors Daniel M. Gordon
Comments (0)