Advances in Cryptology — CRYPTO’ 89 Proceedings
DOI: 10.1007/0-387-34805-0_37
|View full text |Cite
|
Sign up to set email alerts
|

Addition Chain Heuristics

Abstract: Theoretical results and asymptotic bounds in this area are plentiful (see [Dow81], e.g.), but we are not aware of anyone applying heuristics, as we do, to make chains useable in practice. Definitions and notationAn addition chain for a given number is a list of numbers having the following properties: l the frost number is one; . every number is the sum of two earlier numbers; l the given number occurs in the chain (at the end, that is). In the case of an addition sequence, the last condition becomes: l the gi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
53
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 97 publications
(54 citation statements)
references
References 16 publications
0
53
0
Order By: Relevance
“…, r t }. Bos and Coster [5] give some heuristics for constructing good addition sequences. A vector addition chain is a sequence of elements v i in N t such that v i = e i for 1 ≤ i ≤ t, and v i = v j + v k for j ≤ k < i.…”
Section: Addition Sequences and Vector Addition Chainsmentioning
confidence: 99%
See 1 more Smart Citation
“…, r t }. Bos and Coster [5] give some heuristics for constructing good addition sequences. A vector addition chain is a sequence of elements v i in N t such that v i = e i for 1 ≤ i ≤ t, and v i = v j + v k for j ≤ k < i.…”
Section: Addition Sequences and Vector Addition Chainsmentioning
confidence: 99%
“…A vector addition chain is a sequence of elements v i in N t such that v i = e i for 1 ≤ i ≤ t, and v i = v j + v k for j ≤ k < i. For example, a vector addition chain for [7,15,23] is: [1,3,5], [2,4,6], [3,7,11], [4,8,12], [7,15,23].…”
Section: Addition Sequences and Vector Addition Chainsmentioning
confidence: 99%
“…This method does not take advantage of strings of zeros that do not appear on m-bit boundaries. A more flexible window method is demonstrated in [27]. Similar conversions are presented in [4], [7], [20], [28].…”
Section: Sliding Window Algorithmsmentioning
confidence: 98%
“…What we call here double exponentiation shall not be confused with multi-exponentiations (also known as simultaneous exponentiations) that compute a product of powers i m ai i (see for instance [32]). What we call double addition chain is also called addition sequence in the general case where possibly more than two powers must be computed [11,19]. Addition sequences have not been so much investigated.…”
Section: Addition Chain Exponentiationsmentioning
confidence: 99%
“…Addition sequences have not been so much investigated. In [11], the authors propose some heuristics but these are not suitable for implementations constrained in memory.…”
Section: Addition Chain Exponentiationsmentioning
confidence: 99%