This paper describes several speedups and simplifications for XTR. The most important results are new XTR double and single exponentiation methods where the latter requires a cheap precomputation. Both methods are on average more than 60% faster than the old methods, thus more than doubling the speed of the already fast XTR signature applications. An additional advantage of the new double exponentiation method is that it no longer requires matrices, thereby making XTR easier to implement. Another XTR single exponentiation method is presented that does not require precomputation and that is on average more than 35% faster than the old method. Existing applications of similar methods to LUC and elliptic curve cryptosystems are reviewed
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
XTR is an excellent public key system that can achieve the same communication and security advantage...
We consider the problem of minimizing the number of multiplications in computing f(x)=x n , where n ...
This paper describes several speedups and simplifications for XTR. The most important results are ne...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
Recently, Lenstra and Verheul proposed an efficient cryptosystem called XTR. This system represents ...
We describe a new general method to perform part of the setup stage of the XTR system introduced at ...
Abstract. Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish...
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
AbstractIn the current scenario, there is a tremendous necessity for strong cryptographic techniques...
Nowadays, more and more physical devices that are used in every- one’s daily life are connected to t...
Modular exponentiation is an essential operation for many asymmetric key cryptosystems such as RSA i...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
XTR is an excellent public key system that can achieve the same communication and security advantage...
We consider the problem of minimizing the number of multiplications in computing f(x)=x n , where n ...
This paper describes several speedups and simplifications for XTR. The most important results are ne...
This paper describes improved methods for XTR key representation and parameter generation (cf. [4])....
Recently, Lenstra and Verheul proposed an efficient cryptosystem called XTR. This system represents ...
We describe a new general method to perform part of the setup stage of the XTR system introduced at ...
Abstract. Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish...
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
AbstractIn the current scenario, there is a tremendous necessity for strong cryptographic techniques...
Nowadays, more and more physical devices that are used in every- one’s daily life are connected to t...
Modular exponentiation is an essential operation for many asymmetric key cryptosystems such as RSA i...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
XTR is an excellent public key system that can achieve the same communication and security advantage...
We consider the problem of minimizing the number of multiplications in computing f(x)=x n , where n ...