会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明公开
    • MODULAR EXPONENTIATION USING RANDOMIZED ADDITION CHAINS
    • 模块引证麻醉师随机添加剂
    • EP3166013A1
    • 2017-05-10
    • EP16195485.4
    • 2016-10-25
    • NXP B.V.
    • BOS, Joppe
    • G06F7/72
    • H04L9/3066G06F7/723G06F2207/7295H04L2209/34
    • Various embodiments relate to a device for generating code which implements modular exponentiation, the device including: a memory used to store a lookup table; and a processor in communication with the memory, the processor configured to: receive information for a generated randomized addition chain; output code for implementing the modular exponentiation which loads elements from the lookup table including intermediate results which utilize the information for a generated randomized addition chain; and output code for implementing the modular exponentiation which uses the loaded elements to compute the next element.
    • 各种实施例涉及用于生成执行模幂运算的代码的设备,该设备包括:用于存储查找表的存储器; 以及与所述存储器通信的处理器,所述处理器被配置为:接收生成的随机化附加链的信息; 用于实现模幂运算的输出代码,其从查找表中加载元素,包括利用生成的随机加法链的信息的中间结果; 以及用于实现使用加载的元素来计算下一个元素的模幂运算的输出代码。
    • 9. 发明授权
    • Efficient exponentiation method and apparatus
    • 有效求幂法和装置
    • US06745220B1
    • 2004-06-01
    • US09717895
    • 2000-11-21
    • Laszlo Hars
    • Laszlo Hars
    • G06F738
    • G06F2207/7295
    • An encryption/decryption method performs an exponentiation operation on a base number where both the base number and the exponent may be large numbers (i.e., anywhere from 100 to several thousand bits long). The exponent is expressed as a bit string. The bit string is then re-coded utilizing the signed digit algorithm. Predetermined substring patterns are then extracted from the exponent utilizing a string replacement method and compared to a previously constructed look-up table containing exponent values for only a relatively small number of predetermined substrings. The value returned from the look-up table is the base value raised to the power represented by the substring. A pointer for each matching substring in the exponent is stored. The remaining bits in the exponent and intermediate values and are then processed with the base value using a multiply chain algorithm to determine the value of the base raised to the exponent.
    • 加密/解密方法对基数执行取幂运算,其中基数和指数都可以是大数(即,从100到几千比特长的任何地方)。 指数表示为位串。 然后使用有符号位算法重新编码位串。 然后使用字符串替换方法从指数中提取预定的子字符串模式,并与仅包含相对较少数量的预定子字符串的指数值的先前构造的查找表进行比较。 从查找表返回的值是由子字符串表示的幂的基值。 存储指数中每个匹配子字符串的指针。 指数和中间值中的其余位,然后使用乘法运算法使用基值进行处理,以确定提升到指数的基数值。