This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
P. Barrett, “Implementing the Rivest Shamir Adleman public key encryption algorithm on a standard digital signal processor,” Advances in Cryptology, Proc. Crypto'86, LNCS 263, A.M. Odlyzko, Ed., Springer-Verlag, 1987, pp. 311–323.
J. Bos and M. Coster, “Addition chain heuristics,” Advances in Cryptology, Proc. Crypto'89, LNCS 435, G. Brassard, Ed., Springer-Verlag, 1990, pp. 400–407.
A. Bosselaers, R. Govaerts, and J. Vandewalle, “Comparison of three modular reduction functions,” Advances in Cryptology, Proc. Crypto'93, LNCS 773, D.R. Stinson, Ed., Springer-Verlag, 1994, pp. 175–186.
E.F. Brickell, D.M. Gordon, K.S. McCurley, and D.B. Wilson, “Fast exponentiation with precomputations (extended abstract),” Advances in Cryptology, Proc. Eurocrypt'92, LNCS 658, R.A. Rueppel, Ed., Springer-Verlag, 1993, pp. 200–207.
S.R. Dussé and B.R. Kaliski Jr., “A cryptographic library for the Motorola DSP 56000,” Advances in Cryptology, Proc. Eurocrypt'90, LNCS 473, I.B. Damgård, Ed., Springer-Verlag, 1991, pp. 230–244.
D.E Knuth, The Art of Computer Programming, Vol. 2: Seminumerical Algorithms, 2nd Edition, Addison-Wesley, Reading Mass., 1981.
N. Koblitz, A Course in Number Theory and Cryptography, Springer-Verlag, Berlin-Heidelberg-New York, 1987.
P.L. Montgomery, “Modular multiplication without trial division,” Mathematics of Computation, Vol. 44, 1985, pp. 519–521.
G.J. Simmons, Ed., Contemporary Cryptology: The Science of Information Integrity, IEEE Press, Piscataway, N.J., 1992.
S.-M. Yen and C.-S. Laih, “The fast cascade exponentiation algorithm and its applications on cryptography,” Advances in Cryptology, Proc. Auscrypt'92, LNCS 718, J. Seberry and Y. Zheng, Eds., Springer-Verlag, 1993, pp. 447–458.
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Bosselaers, A., Preneel, B. (1995). Implementation guidelines for arithmetic computation. In: Bosselaers, A., Preneel, B. (eds) Integrity Primitives for Secure Information Systems. Lecture Notes in Computer Science, vol 1007. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60640-8_12
Download citation
DOI: https://doi.org/10.1007/3-540-60640-8_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60640-6
Online ISBN: 978-3-540-48517-9
eBook Packages: Springer Book Archive