Loading [a11y]/accessibility-menu.js
Efficient multiplication beyond optimal normal bases | IEEE Journals & Magazine | IEEE Xplore

Efficient multiplication beyond optimal normal bases


Abstract:

In cryptographic applications, the use of normal bases to represent elements of the finite field GF(2/sup m/) is quite advantageous, especially for hardware implementatio...Show More

Abstract:

In cryptographic applications, the use of normal bases to represent elements of the finite field GF(2/sup m/) is quite advantageous, especially for hardware implementation. In this article, we consider an important field operation, namely, multiplication which is used in many cryptographic functions. We present a class of algorithms for normal basis multiplication in GF(2/sup m/). Our proposed multiplication algorithm for composite finite fields requires a significantly lower number of bit level operations and, hence, can reduce the space complexity of cryptographic systems.
Published in: IEEE Transactions on Computers ( Volume: 52, Issue: 4, April 2003)
Page(s): 428 - 439
Date of Publication: 30 April 2003

ISSN Information:


References

References is not available for this document.