The normal form and modified normal form for binary redundant representation are defined. A redundant binary algorithm to compute modular exponentiation for very large integers is proposed. It is shown that the proposed algorithm requires the minimum number of basic operations (modular multiplications) among all possible binary redundant representations.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Rviest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem.Communication of the ACM, 1978, 21(2): 120–126.
Knuth D E. Seminumerical Algorithm—The Art of Computer Programming. Vol.2, Chapter 4, Addison-Wesley, Reading, MA, 1981.
Selby A, Mitchell C. Algorithms for software implementations of RSA.IEE, Part E., 1989, 136(3): 166–170.
Yun D Y Y, Zhang C N. A fast carry-free algorithm and hardware design for extended integer GCD computation. InInternational ACM Conference on Symbolic and Algebra Computation, Waterloo, Canada, July 1986, pp.82–84.
Shi Ronghua received his B.S. degree in computer software from Changsha Railway University in 1986, and his M.S. degree in computer science from Central South University of Technology in 1989. He has been working in the Changsha Railway University since 1989, and is currently a Lecturer of the Department of Electronic Engineering. His current research interests include computer networks, algorithm and system, broadband ISDN.
About this article
Cite this article
Shi, R. A redundant binary algorithm for RSA. J. of Comput. Sci. & Technol. 11, 416–420 (1996). https://doi.org/10.1007/BF02948485
- Redundant binary representation
- redundant binary algorithm