Abstract. This paper describes several speedups and simpli¯cations for XTR. The most important results are new XTR double and single ex-ponentiation methods where the latter requires a cheap precomputation. Both methods are on average more than 60 % faster than the old methods, thus more than doubling the speed of the already fast XTR signature applications. An additional advantage of the new double exponentiation method is that it no longer requires matrices, thereby making XTR easier to implement. Another XTR single exponentiation method is presented that does not require precomputation and that is on average more than 35 % faster than the old method. Existing applications of similar methods to LUC and elliptic curve cryptosystems are rev...
Modular exponentiation is an essential operation for many asymmetric key cryptosystems such as RSA i...
© Springer-Verlag Berlin Heidelberg 1998. This paper describes a fast software implementation of the...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
This paper describes several speedups and simplifications for XTR. The most important results are ne...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
Abstract. Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish...
Recently, Lenstra and Verheul proposed an efficient cryptosystem called XTR. This system represents ...
We describe a new general method to perform part of the setup stage of the XTR system introduced at ...
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
XTR is an excellent public key system that can achieve the same communication and security advantage...
We consider the problem of minimizing the number of multiplications in computing f(x)=x n , where n ...
Nowadays, more and more physical devices that are used in every- one’s daily life are connected to t...
Modular exponentiation is an essential operation for many asymmetric key cryptosystems such as RSA i...
© Springer-Verlag Berlin Heidelberg 1998. This paper describes a fast software implementation of the...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
This paper describes several speedups and simplifications for XTR. The most important results are ne...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
Abstract. Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish...
Recently, Lenstra and Verheul proposed an efficient cryptosystem called XTR. This system represents ...
We describe a new general method to perform part of the setup stage of the XTR system introduced at ...
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
XTR is an excellent public key system that can achieve the same communication and security advantage...
We consider the problem of minimizing the number of multiplications in computing f(x)=x n , where n ...
Nowadays, more and more physical devices that are used in every- one’s daily life are connected to t...
Modular exponentiation is an essential operation for many asymmetric key cryptosystems such as RSA i...
© Springer-Verlag Berlin Heidelberg 1998. This paper describes a fast software implementation of the...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...