The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
Modern computer algebra
The Complexity of Certain Multi-Exponentiation Techniques in Cryptography
Journal of Cryptology
Analysis of linear combination algorithms in cryptography
ACM Transactions on Algorithms (TALG)
Theoretical Computer Science
On Modular Decomposition of Integers
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Numeration systems: a link between number theory and formal language theory
DLT'10 Proceedings of the 14th international conference on Developments in language theory
Redundancy of minimal weight expansions in Pisot bases
Theoretical Computer Science
A note on the signed sliding window integer recoding and a left-to-right analogue
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Left-to-Right signed-bit τ-adic representations of n integers
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Hi-index | 0.00 |
We discuss an optimal method for the computation of linear combinations of elements of Abelian groups, which uses signed digit expansions. This has applications in elliptic curve cryptography. We compute the expected number of operations asymptotically (including a periodically oscillating second order term) and prove a central limit theorem. Apart from the usual right-to-left (i.e., least significant digit first) approach we also discuss a left-to-right computation of the expansions. This exhibits fractal structures that are studied in some detail.