Analysis of Linear Combination Algorithms in Cryptography

被引:10
|
作者
Grabner, Peter J. [1 ]
Heuberger, Clemens [2 ]
Prodinger, Helmut [3 ,5 ]
Thuswaldner, Joerg M. [4 ]
机构
[1] Graz Univ Technol, Inst Math A, Steyrergasse 30, A-8010 Graz, Austria
[2] Graz Univ Technol, Inst Math B, A-8010 Graz, Austria
[3] Univ Witwatersrand, Johannesburg, South Africa
[4] Univ Leoben, Inst Math & Angew Geometrie, A-8700 Leoben, Austria
[5] Stellenbosch Univ, Dept Math, ZA-7602 Stellenbosch, South Africa
基金
新加坡国家研究基金会; 奥地利科学基金会;
关键词
Hamming weight; digital expansions; online algorithm; elliptic curve; cryptosystems;
D O I
10.1145/1077464.1077473
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Several cryptosystems rely on fast calculations of linear combinations in groups. One way to achieve this is to use joint signed binary digit expansions of small "weight." We study two algorithms, one based on nonadjacent forms of the coefficients of the linear combination, the other based on a certain joint sparse form specifically adapted to this problem. Both methods are sped up using the sliding windows approach combined with precomputed lookup tables. We give explicit and asymptotic results for the number of group operations needed, assuming uniform distribution of the coefficients. Expected values, variances and a central limit theorem are proved using generating functions. Furthermore, we provide a new algorithm that calculates the digits of an optimal expansion of pairs of integers from left to right. This avoids storing the whole expansion, which is needed with the previously known right-to -left methods, and allows an online computation.
引用
收藏
页码:123 / 142
页数:20
相关论文
共 50 条
  • [31] Protection on Sensitive Information in Cloud - Cryptography algorithms
    Harikrishna, B.
    Kiran, S.
    Reddy, R. Pradeep Kumar
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 97 - 101
  • [32] Smoothed analysis of termination of linear programming algorithms
    Daniel A. Spielman
    Shang-Hua Teng
    Mathematical Programming, 2003, 97 : 375 - 404
  • [33] A comparison of generalized linear discriminant analysis algorithms
    Park, Cheong Hee
    Park, Haesun
    PATTERN RECOGNITION, 2008, 41 (03) : 1083 - 1097
  • [34] Smoothed analysis of termination of linear programming algorithms
    Spielman, DA
    Teng, SH
    MATHEMATICAL PROGRAMMING, 2003, 97 (1-2) : 375 - 404
  • [35] Implementing Quantum Cryptography Algorithms for Data Security
    Cangea, Otilia
    Oprina, Carmen Silvia
    Dima, Mihai-Octavian
    2016 8TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2016,
  • [36] Linear algorithms for stretched exponential decay analysis
    Novikov, EG
    van Hoek, A
    Visser, AJWG
    Hofstraat, JW
    OPTICS COMMUNICATIONS, 1999, 166 (1-6) : 189 - 198
  • [37] ICIGA: Improved cryptography inspired by genetic algorithms
    Tragha, A.
    Omary, F.
    Mouloudi, A.
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 335 - +
  • [38] Methods of linear and differential relations in cryptography
    Malyshev, Fedor M.
    DISCRETE MATHEMATICS AND APPLICATIONS, 2024, 34 (03): : 145 - 166
  • [39] Combination of iris recognition and cryptography for information security
    Zhang, Long
    Sun, Zhenan
    Tan, Tieniu
    Hu, Shungeng
    PROCEEDINGS OF THE 2008 CHINESE CONFERENCE ON PATTERN RECOGNITION (CCPR 2008), 2008, : 299 - +
  • [40] Convergence Analysis on Trace Ratio Linear Discriminant Analysis Algorithms
    Ye, Qiaolin
    Yang, Jie
    Zheng, Hao
    Fu, Liyong
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2025, 36 (02) : 3878 - 3881