10,056 research outputs found
A Note on Scalar Multiplication Using Division Polynomials
Scalar multiplication is the most important and expensive operation in elliptic curve cryptosystems. In this paper we improve the efficiency of the Elliptic Net algorithm to compute scalar multiplication by using the equivalence of elliptic nets. The proposed method saves multiplications in each iteration loop. Experimental results also indicates that our algorithm will be more efficient than the previously known results in this line
Lower Bounds on the Bounded Coefficient Complexity of Bilinear Maps
We prove lower bounds of order for both the problem to multiply
polynomials of degree , and to divide polynomials with remainder, in the
model of bounded coefficient arithmetic circuits over the complex numbers.
These lower bounds are optimal up to order of magnitude. The proof uses a
recent idea of R. Raz [Proc. 34th STOC 2002] proposed for matrix
multiplication. It reduces the linear problem to multiply a random circulant
matrix with a vector to the bilinear problem of cyclic convolution. We treat
the arising linear problem by extending J. Morgenstern's bound [J. ACM 20, pp.
305-306, 1973] in a unitarily invariant way. This establishes a new lower bound
on the bounded coefficient complexity of linear forms in terms of the singular
values of the corresponding matrix. In addition, we extend these lower bounds
for linear and bilinear maps to a model of circuits that allows a restricted
number of unbounded scalar multiplications.Comment: 19 page
Root finding with threshold circuits
We show that for any constant d, complex roots of degree d univariate
rational (or Gaussian rational) polynomials---given by a list of coefficients
in binary---can be computed to a given accuracy by a uniform TC^0 algorithm (a
uniform family of constant-depth polynomial-size threshold circuits). The basic
idea is to compute the inverse function of the polynomial by a power series. We
also discuss an application to the theory VTC^0 of bounded arithmetic.Comment: 19 pages, 1 figur
Analysis of Parallel Montgomery Multiplication in CUDA
For a given level of security, elliptic curve cryptography (ECC) offers improved efficiency over classic public key implementations. Point multiplication is the most common operation in ECC and, consequently, any significant improvement in perfor- mance will likely require accelerating point multiplication. In ECC, the Montgomery algorithm is widely used for point multiplication. The primary purpose of this project is to implement and analyze a parallel implementation of the Montgomery algorithm as it is used in ECC. Specifically, the performance of CPU-based Montgomery multiplication and a GPU-based implementation in CUDA are compared
Scalar products of elementary distributions
The field of real numbers being extended as a larger commutative field, we
investigate the possibility of defining a scalar product for the distributions
of finite discrete support. Then we focus on the most simple possible extension
(which is an ordered field), we provide explicit formulas for this scalar
product, and we exhibit a structure of positive definite inner-product space.
In a one-dimensional application to the Schroedinger equation, the
distributions supported by the origin are embedded into a bra-ket vector space,
where the "singular" potential describing point interaction is defined in a
natural way. A contact with the hyperreal numbers that arise in nonstandard
analysis is possible but not essential, our extensions of and
being obtained by a quite elementary method.Comment: 27 page
- …