On some specific patterns of τ-adic non-adjacent form expansion over ring Z(τ): An alternative formula

Nurul Hafizah Hadani, F. Yunos, S. M. Suberi
{"title":"On some specific patterns of τ-adic non-adjacent form expansion over ring Z(τ): An alternative formula","authors":"Nurul Hafizah Hadani, F. Yunos, S. M. Suberi","doi":"10.1063/1.5121054","DOIUrl":null,"url":null,"abstract":"Let τ=(−1)1−a+−72 for a e {0,1} is Frobenius map from the set Ea (F2m) to itself for a point (x, y) on Koblitz curves Ea. Let P and Q be two points on this curves. τ-adic non-adjacent form (TNAF) of α an element of the ring Z(τ)={α = c + dτ |c, d ∈ Z} is an expansion where the digits are generated by successively dividing α by τ, allowing remainders of −1, 0 or 1. The implementation of TNAF as the multiplier of scalar multiplication nP = Q is one of the technique in elliptical curve cryptography. In this paper, we find the alternative formulas for TNAF that have specific patterns [c0, 0, …, 0, cl-1], [c0, 0, …, Cl−12, …, 0, cl-1], [0, c1, …, cl-1], [−1, c1, …, cl-1] and [0,0,0,c3, c4, …, cl-1] by applying τm = −2sm-1 + sm τ for sm=∑i=1| m+12 |(−2)i−1tm+1(i−1)!∏j=12i−2(m−j).Let τ=(−1)1−a+−72 for a e {0,1} is Frobenius map from the set Ea (F2m) to itself for a point (x, y) on Koblitz curves Ea. Let P and Q be two points on this curves. τ-adic non-adjacent form (TNAF) of α an element of the ring Z(τ)={α = c + dτ |c, d ∈ Z} is an expansion where the digits are generated by successively dividing α by τ, allowing remainders of −1, 0 or 1. The implementation of TNAF as the multiplier of scalar multiplication nP = Q is one of the technique in elliptical curve cryptography. In this paper, we find the alternative formulas for TNAF that have specific patterns [c0, 0, …, 0, cl-1], [c0, 0, …, Cl−12, …, 0, cl-1], [0, c1, …, cl-1], [−1, c1, …, cl-1] and [0,0,0,c3, c4, …, cl-1] by applying τm = −2sm-1 + sm τ for sm=∑i=1| m+12 |(−2)i−1tm+1(i−1)!∏j=12i−2(m−j).","PeriodicalId":325925,"journal":{"name":"THE 4TH INNOVATION AND ANALYTICS CONFERENCE & EXHIBITION (IACE 2019)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"THE 4TH INNOVATION AND ANALYTICS CONFERENCE & EXHIBITION (IACE 2019)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1063/1.5121054","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Let τ=(−1)1−a+−72 for a e {0,1} is Frobenius map from the set Ea (F2m) to itself for a point (x, y) on Koblitz curves Ea. Let P and Q be two points on this curves. τ-adic non-adjacent form (TNAF) of α an element of the ring Z(τ)={α = c + dτ |c, d ∈ Z} is an expansion where the digits are generated by successively dividing α by τ, allowing remainders of −1, 0 or 1. The implementation of TNAF as the multiplier of scalar multiplication nP = Q is one of the technique in elliptical curve cryptography. In this paper, we find the alternative formulas for TNAF that have specific patterns [c0, 0, …, 0, cl-1], [c0, 0, …, Cl−12, …, 0, cl-1], [0, c1, …, cl-1], [−1, c1, …, cl-1] and [0,0,0,c3, c4, …, cl-1] by applying τm = −2sm-1 + sm τ for sm=∑i=1| m+12 |(−2)i−1tm+1(i−1)!∏j=12i−2(m−j).Let τ=(−1)1−a+−72 for a e {0,1} is Frobenius map from the set Ea (F2m) to itself for a point (x, y) on Koblitz curves Ea. Let P and Q be two points on this curves. τ-adic non-adjacent form (TNAF) of α an element of the ring Z(τ)={α = c + dτ |c, d ∈ Z} is an expansion where the digits are generated by successively dividing α by τ, allowing remainders of −1, 0 or 1. The implementation of TNAF as the multiplier of scalar multiplication nP = Q is one of the technique in elliptical curve cryptography. In this paper, we find the alternative formulas for TNAF that have specific patterns [c0, 0, …, 0, cl-1], [c0, 0, …, Cl−12, …, 0, cl-1], [0, c1, …, cl-1], [−1, c1, …, cl-1] and [0,0,0,c3, c4, …, cl-1] by applying τm = −2sm-1 + sm τ for sm=∑i=1| m+12 |(−2)i−1tm+1(i−1)!∏j=12i−2(m−j).
关于环Z(τ)上τ-进非邻接形式展开的一些特殊模式:一个替代公式
设τ=(−1)1−a+−72,对于a e{0,1}是Koblitz曲线Ea上点(x, y)从集合Ea (F2m)到自身的Frobenius映射。设P和Q是该曲线上的两个点。环Z(τ)={α = c + dτ |c, d∈Z}的元素α的τ-进非邻接形式(TNAF)是一个展开式,其中的数字由α连续除以τ生成,允许余数为- 1,0或1。将TNAF作为标量乘法nP = Q的乘法器是椭圆曲线密码技术中的一种技术。在这篇文章中,我们找到替代公式的重视特定模式(c0 0…0 cl-1], [c0 0…,Cl−12,…,0,cl-1], [0, c1,…,cl-1],[−1,c1,…,cl-1]和[0,0,0,c3、c4…,cl-1]通过应用τm =−2 sm-1 + sm对smτ=∑我+ 12 = 1 | |(−2)我−1 tm + 1(−1)!∏j = 12我−2 (m−j)。设τ=(−1)1−a+−72,对于a e{0,1}是Koblitz曲线Ea上点(x, y)从集合Ea (F2m)到自身的Frobenius映射。设P和Q是该曲线上的两个点。环Z(τ)={α = c + dτ |c, d∈Z}的元素α的τ-进非邻接形式(TNAF)是一个展开式,其中的数字由α连续除以τ生成,允许余数为- 1,0或1。将TNAF作为标量乘法nP = Q的乘法器是椭圆曲线密码技术中的一种技术。在这篇文章中,我们找到替代公式的重视特定模式(c0 0…0 cl-1], [c0 0…,Cl−12,…,0,cl-1], [0, c1,…,cl-1],[−1,c1,…,cl-1]和[0,0,0,c3、c4…,cl-1]通过应用τm =−2 sm-1 + sm对smτ=∑我+ 12 = 1 | |(−2)我−1 tm + 1(−1)!∏j = 12我−2 (m−j)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信