透過您的圖書館登入
IP:18.118.1.158
  • 期刊

Computing the Modular Inverse of a Polynomial Function over GF(2(superscript P)) Using Bit Wise Operation

並列摘要


Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost is based on how it works with minimum use of scarce resources like processor and memory We have implemented the determination of the multiplicative in-verse of a polynomial over GF(2(superscript p)) with minimum computational cost. The ”Extended Euclidean Algorithm” (EEA) has been demonstrated to work very well manually for integers and polynomials. However polynomial manipulation cannot be computerized directly. We have implemented the same by using simple bit wise shift and XOR operations. In small applications like smart cards, mo-bile devices and other small memory devices, this method works very well. To the best of our knowledge, the pro-posed algorithm seems to be the first, efficient and cost effective implementation of determining the multiplicative inverse of polynomials over GF(2(superscript p)) using computers. As this is a pioneering work, the results could not be compared with that of any previous work.

被引用紀錄


Lu, J. T. (2006). 經PEGyltion修飾後的抗WSSV VP28單株抗體在蝦子體內存留時間的探討 [master's thesis, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2006.00409

延伸閱讀