“…Because of applications in a variety of areas, such as cryptography and coding theory, new techniques for improving polynomial multiplication have been presented in numerous papers, e.g., [1,4,5,7,8,[13][14][15][16][17][18]20,[23][24][25]27,28]. For cryptographic applications, arithmetic in the binary extension field F 2 n is often used and, of the basic operations in F 2 n , multiplication contributes most to the total number of bit operations.…”