期刊文献+

基于GF(2^(m))域上Ⅱ型最优正规基的模乘算法及实现

Modular Multiplication Algorithm and Implementation Based on Type-ⅡOptimal Normal Basis over GF(2^(m))
下载PDF
导出
摘要 论文提出了一种利用Ⅱ型正规基进行乘法运算的新方案。通过一种有效的线性变换,将GF(2m)上的正规基转换成在GF(2^(m))上的m项多项式。这种多项式可以使用任何多项式乘法算法进行相乘,然后再利用上述变换的逆过程将乘积转换回正规基。此方案所需的XOR和AND运算为M(m)+2m log_(2)(m/2),其中M(m)取决于选用的多项式乘法算法。相较于其他的正规基乘法具有更小的资源占用量。通过FPGA综合实践表明,该方案能够显著减少LUTs数量。 In this paper,a new method of using typeⅡnormal basis for multiplication is proposed.By an efficient linear transformation,the regular basis of GF(2^(m))is transformed into m-term polynomials over GF(2^(m))。This polynomial can be multiplied using any polynomial multiplication algorithm and then converted back to a normal basis using the inverse of the transformation described above.The XOR/AND operations required for this scheme are M(m)+2m log_(2)(m^(2)),where M(m)depends on the polynomial multiplication algorithm chosen.Compared with other normal basis methods,it has smaller resource consumption.The FPGA comprehensive practice shows that this scheme can significantly reduce the number of LUTs.
作者 高照 王庆年 樊荣 GAO Zhao;WANG Qingnian;FAN Rong(No.722 Research Institute,CSSC,Wuhan 430205)
出处 《计算机与数字工程》 2023年第10期2263-2266,2273,共5页 Computer & Digital Engineering
关键词 最优正规基 重序正规基 正规基乘法 optimal normal basis permuted normal basis normal basis multiplication
  • 相关文献

参考文献2

二级参考文献15

  • 1Mullin R., Onyszchuk I., Vanstone S., Wilson R., Optimal normal bases in GF(pn), Discrete Applied Math.,1988/1989, 22: 149-161.
  • 2Blake I., Gao S., Mullin R., Vanstone S., Yaghoobian T., Applications of finite fields, Kluwer: Kluwer Academic Publishers, 1993.
  • 3Lidl R., Niederreiter H., Finite fields, Cambrige: Cambrige University Press, 1987.
  • 4Agnew G., Mullin R., Onyszchuk I., Vanstone S., An implementation for a fast public key cryptosystem, J.of Cryptology, 1991, 3: 63-79.
  • 5Rosati T., A high speed data encryption processor for public key cryptography, San diego: Proc. of IEEE Custom Integrated Circuites Conference, 1989: 1231-1235.
  • 6Gao S., Lenstra H. W., Optimal normal bases, Disigns, Codes and Cryptology, 1992, 2: 315-323.
  • 7Sun Q., An algorithm on the multiplication table of the normal basis over finite fields, J. Sichuan Univ. Nat.Sci. Ed., 2003, 40(3): 447-452 (in Chinese).
  • 8WILSON R M.Optimal normal bases in GF(p")[J].Diserete Applied Mathematics, 1988,89(22) : 149-161.
  • 9ANSI X9-62.Public key cryptography for the financial service industry-the elliptic curve digital signature algorithm (ECDSA)[S]. 1999.
  • 10ANSI X9-63.Public key cryptography for the financial service industry-the elliptic curve key agreement and apparatus for finite field arithmetic[S].2000.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部