{"title":"关于环Z(τ)上τ-进非邻接形式展开的一些特殊模式:一个替代公式","authors":"Nurul Hafizah Hadani, F. Yunos, S. M. Suberi","doi":"10.1063/1.5121054","DOIUrl":null,"url":null,"abstract":"Let τ=(−1)1−a+−72 for a e {0,1} is Frobenius map from the set Ea (F2m) to itself for a point (x, y) on Koblitz curves Ea. Let P and Q be two points on this curves. τ-adic non-adjacent form (TNAF) of α an element of the ring Z(τ)={α = c + dτ |c, d ∈ Z} is an expansion where the digits are generated by successively dividing α by τ, allowing remainders of −1, 0 or 1. The implementation of TNAF as the multiplier of scalar multiplication nP = Q is one of the technique in elliptical curve cryptography. In this paper, we find the alternative formulas for TNAF that have specific patterns [c0, 0, …, 0, cl-1], [c0, 0, …, Cl−12, …, 0, cl-1], [0, c1, …, cl-1], [−1, c1, …, cl-1] and [0,0,0,c3, c4, …, cl-1] by applying τm = −2sm-1 + sm τ for sm=∑i=1| m+12 |(−2)i−1tm+1(i−1)!∏j=12i−2(m−j).Let τ=(−1)1−a+−72 for a e {0,1} is Frobenius map from the set Ea (F2m) to itself for a point (x, y) on Koblitz curves Ea. Let P and Q be two points on this curves. τ-adic non-adjacent form (TNAF) of α an element of the ring Z(τ)={α = c + dτ |c, d ∈ Z} is an expansion where the digits are generated by successively dividing α by τ, allowing remainders of −1, 0 or 1. The implementation of TNAF as the multiplier of scalar multiplication nP = Q is one of the technique in elliptical curve cryptography. In this paper, we find the alternative formulas for TNAF that have specific patterns [c0, 0, …, 0, cl-1], [c0, 0, …, Cl−12, …, 0, cl-1], [0, c1, …, cl-1], [−1, c1, …, cl-1] and [0,0,0,c3, c4, …, cl-1] by applying τm = −2sm-1 + sm τ for sm=∑i=1| m+12 |(−2)i−1tm+1(i−1)!∏j=12i−2(m−j).","PeriodicalId":325925,"journal":{"name":"THE 4TH INNOVATION AND ANALYTICS CONFERENCE & EXHIBITION (IACE 2019)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"On some specific patterns of τ-adic non-adjacent form expansion over ring Z(τ): An alternative formula\",\"authors\":\"Nurul Hafizah Hadani, F. Yunos, S. M. Suberi\",\"doi\":\"10.1063/1.5121054\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Let τ=(−1)1−a+−72 for a e {0,1} is Frobenius map from the set Ea (F2m) to itself for a point (x, y) on Koblitz curves Ea. Let P and Q be two points on this curves. τ-adic non-adjacent form (TNAF) of α an element of the ring Z(τ)={α = c + dτ |c, d ∈ Z} is an expansion where the digits are generated by successively dividing α by τ, allowing remainders of −1, 0 or 1. The implementation of TNAF as the multiplier of scalar multiplication nP = Q is one of the technique in elliptical curve cryptography. In this paper, we find the alternative formulas for TNAF that have specific patterns [c0, 0, …, 0, cl-1], [c0, 0, …, Cl−12, …, 0, cl-1], [0, c1, …, cl-1], [−1, c1, …, cl-1] and [0,0,0,c3, c4, …, cl-1] by applying τm = −2sm-1 + sm τ for sm=∑i=1| m+12 |(−2)i−1tm+1(i−1)!∏j=12i−2(m−j).Let τ=(−1)1−a+−72 for a e {0,1} is Frobenius map from the set Ea (F2m) to itself for a point (x, y) on Koblitz curves Ea. Let P and Q be two points on this curves. τ-adic non-adjacent form (TNAF) of α an element of the ring Z(τ)={α = c + dτ |c, d ∈ Z} is an expansion where the digits are generated by successively dividing α by τ, allowing remainders of −1, 0 or 1. The implementation of TNAF as the multiplier of scalar multiplication nP = Q is one of the technique in elliptical curve cryptography. In this paper, we find the alternative formulas for TNAF that have specific patterns [c0, 0, …, 0, cl-1], [c0, 0, …, Cl−12, …, 0, cl-1], [0, c1, …, cl-1], [−1, c1, …, cl-1] and [0,0,0,c3, c4, …, cl-1] by applying τm = −2sm-1 + sm τ for sm=∑i=1| m+12 |(−2)i−1tm+1(i−1)!∏j=12i−2(m−j).\",\"PeriodicalId\":325925,\"journal\":{\"name\":\"THE 4TH INNOVATION AND ANALYTICS CONFERENCE & EXHIBITION (IACE 2019)\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-08-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"THE 4TH INNOVATION AND ANALYTICS CONFERENCE & EXHIBITION (IACE 2019)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1063/1.5121054\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"THE 4TH INNOVATION AND ANALYTICS CONFERENCE & EXHIBITION (IACE 2019)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1063/1.5121054","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On some specific patterns of τ-adic non-adjacent form expansion over ring Z(τ): An alternative formula
Let τ=(−1)1−a+−72 for a e {0,1} is Frobenius map from the set Ea (F2m) to itself for a point (x, y) on Koblitz curves Ea. Let P and Q be two points on this curves. τ-adic non-adjacent form (TNAF) of α an element of the ring Z(τ)={α = c + dτ |c, d ∈ Z} is an expansion where the digits are generated by successively dividing α by τ, allowing remainders of −1, 0 or 1. The implementation of TNAF as the multiplier of scalar multiplication nP = Q is one of the technique in elliptical curve cryptography. In this paper, we find the alternative formulas for TNAF that have specific patterns [c0, 0, …, 0, cl-1], [c0, 0, …, Cl−12, …, 0, cl-1], [0, c1, …, cl-1], [−1, c1, …, cl-1] and [0,0,0,c3, c4, …, cl-1] by applying τm = −2sm-1 + sm τ for sm=∑i=1| m+12 |(−2)i−1tm+1(i−1)!∏j=12i−2(m−j).Let τ=(−1)1−a+−72 for a e {0,1} is Frobenius map from the set Ea (F2m) to itself for a point (x, y) on Koblitz curves Ea. Let P and Q be two points on this curves. τ-adic non-adjacent form (TNAF) of α an element of the ring Z(τ)={α = c + dτ |c, d ∈ Z} is an expansion where the digits are generated by successively dividing α by τ, allowing remainders of −1, 0 or 1. The implementation of TNAF as the multiplier of scalar multiplication nP = Q is one of the technique in elliptical curve cryptography. In this paper, we find the alternative formulas for TNAF that have specific patterns [c0, 0, …, 0, cl-1], [c0, 0, …, Cl−12, …, 0, cl-1], [0, c1, …, cl-1], [−1, c1, …, cl-1] and [0,0,0,c3, c4, …, cl-1] by applying τm = −2sm-1 + sm τ for sm=∑i=1| m+12 |(−2)i−1tm+1(i−1)!∏j=12i−2(m−j).