Abstract
This paper describes several speedups for computation in the order p + 1 subgroup of F *p 2 and the order p 2 - p + 1 subgroup of F *p 6 These results are in a way complementary to LUC and XTR, where computations in these groups are sped up using trace maps. As a side result, we present an efficient method for XTR with p = 3 mod 4.
The first author is sponsored by STW project EWI.4536
Chapter PDF
Similar content being viewed by others
References
G. Agnew, R. Mullin, and S. Vanstone. Fast exponentiation in GF(2n). In C. G. Günther, editor, Advances in Cryptography-Eurocrypt’88, volume 330 of Lecture Notes in Computer Science, pages 251–255. Springer-Verlag, 1988.
D. Bailey and C. Paar. Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. Journal of Cryptology, 2000.
S. A. Brands. Rethinking Public Key Infrastructures and Digital Certificates Building in Privacy. PhD thesis, Technische Universiteit Eindhoven, 1999.
H. Cohen. Analysis of the fiexible window powering algorithm. Submitted for publication, available from http://www.math.u-bordeaux.fr/~cohen, 2001.
H. Cohen and A. K. Lenstra. Supplement to implementation of a new primality test. Mathematics of Computation, 48(177): S1–S4, 1987.
R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Advances in Cryptography-Crypto’98, volume 1462 of Lecture Notes in Computer Science, pages 13–25. Springer-Verlag, 1998.
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469–472, 1985.
R. Gallant, R. Lambert, and S. Vanstone. Faster point multiplication on elliptic curves with efficient endomorphisms. In J. Kilian, editor, Advances in Cryptography-Crypto’01, volume 2139 of Lecture Notes in Computer Science, pages 190–200. Springer-Verlag, 2001.
D. M. Gordon. Discrete logarithms in GF(p) using the number field sieve. SIAM J. Discrete Math., 6(1):124–138, 1993.
A. Lempel, G. Seroussi, and S. Winograd. On the complexity of multiplication in finite fields. Theoretical Computer Science, 22:285–296, 1983.
A. K. Lenstra. Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields. In V. Varadharajan, J. Pieprzyk, and Y. Mu, editors, ACISP’97, volume 1270 of Lecture Notes in Computer Science, pages 127–138. Springer-Verlag, 1997.
A. K. Lenstra and E. R. Verheul. Key improvements to XTR. In T. Okamoto, editor, Advances in Cryptography-Asiacrypt’00, volume 1976 of Lecture Notes in Computer Science, pages 220–233. Springer-Verlag, 2000.
A. K. Lenstra and E. R. Verheul. The XTR public key system. In M. Bellare, editor, Advances in Cryptography-Crypto’00, volume 1880 of Lecture Notes in Computer Science, pages 1–19. Springer-Verlag, 2000.
R. Lidl and H. Niederreiter. Introduction to finite fields and their applications. Cambridge University Press, 1994.
S. C. Pohlig and M. E. Hellman. An improved algorithm for computing logarithms over gf(p) and its cryptographic significance. IEEE Transactions on Information Theory, 24:106–110, 1978.
J. Pollard. Monte carlo methods for index computation (mod p). Mathematics of Computation, 32(143):918–924, 1978.
O. Schirokauer, Mar. 2000. Personal communication.
O. Schirokauer, D. Weber, and T. F. Denny. Discrete logarithms: the effectiveness of the index calculus method. In H. Cohen, editor, ANTS II, volume 1122 of Lecture Notes in Computer Science, pages 337–361. Springer-Verlag, 1996.
B. Schoenmakers. A simple publicly variable secret sharing scheme and its application to electronic voting. In M. Wiener, editor, Advances in Cryptography-Crypto’99, volume 1666 of Lecture Notes in Computer Science, pages 148–164. Springer-Verlag, 1999.
P. Smith and C. Skinner. A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms. In J. Pieprzyk and R. Safavi-Naini, editors, Advances in Cryptography-Asiacrypt’94, volume 917 of Lecture Notes in Computer Science, pages 357–364. Springer-Verlag, 1995.
J. A. Solinas. Low-weight binary representations for pairs of integers. Technical report, CACR (University of Waterloo) preprint series, 2001.
M. Stam and A. K. Lenstra. Speeding up XTR. In C. Boyd, editor, Advances in Cryptography-Asiacrypt’01, volume 2248 of Lecture Notes in Computer Science, pages 125–143. Springer-Verlag, 2001.
E. Teske. On random walks for Pollard’s rho method. Mathematics of Computation, 70:809–825, 2001.
J. von zur Gathen and M. Nöcker. Exponentiation in finite fields: theory and practice. In T. Mora and H. Mattson, editors, AAECC-12, volume 1255 of Lecture Notes in Computer Science, pages 88–133. Springer-Verlag, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Stam, M., Lenstra, A.K. (2003). Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions. In: Kaliski, B.S., Koç, ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems - CHES 2002. CHES 2002. Lecture Notes in Computer Science, vol 2523. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36400-5_24
Download citation
DOI: https://doi.org/10.1007/3-540-36400-5_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00409-7
Online ISBN: 978-3-540-36400-9
eBook Packages: Springer Book Archive