TY - GEN
T1 - A note on Schoenmakers algorithm for multi exponentiation
AU - Rao, Srinivasa Rao Subramanya
N1 - Publisher Copyright:
© Copyright 2015 SCITEPRESS - Science and Technology Publications. All rights reserved.
PY - 2015
Y1 - 2015
N2 - In this paper, we provide a triple scalar multiplication analogue of the simultaneous double scalar Schoenmakers' algorithm for multiexponentiation. We analyse this algorithm to show that on the average, the triple scalar Schoenmakers' algorithm is more expensive than the straight forward method of computing the individual exponents and then computing the requisite product, thus making it undesirable for use in resource constrained environments. We also show the derivation of the Schoenmakers' algorithm for simultaneous double scalar multiplication and this is then used to construct the triple scalar multiplication analogue.
AB - In this paper, we provide a triple scalar multiplication analogue of the simultaneous double scalar Schoenmakers' algorithm for multiexponentiation. We analyse this algorithm to show that on the average, the triple scalar Schoenmakers' algorithm is more expensive than the straight forward method of computing the individual exponents and then computing the requisite product, thus making it undesirable for use in resource constrained environments. We also show the derivation of the Schoenmakers' algorithm for simultaneous double scalar multiplication and this is then used to construct the triple scalar multiplication analogue.
KW - Double scalar multiplication
KW - Elliptic curve cryptography
KW - Montgomery curves
KW - Multiexponentiation
KW - Schoenmakers' algorithm
KW - Smart cards
KW - Triple scalar multiplication
UR - http://www.scopus.com/inward/record.url?scp=84964938463&partnerID=8YFLogxK
U2 - 10.5220/0005566903840391
DO - 10.5220/0005566903840391
M3 - Conference contribution
T3 - SECRYPT 2015 - 12th International Conference on Security and Cryptography, Proceedings; Part of 12th International Joint Conference on e-Business and Telecommunications, ICETE 2015
SP - 384
EP - 391
BT - SECRYPT 2015 - 12th International Conference on Security and Cryptography, Proceedings; Part of 12th International Joint Conference on e-Business and Telecommunications, ICETE 2015
A2 - Obaidat, Mohammad S.
A2 - Lorenz, Pascal
A2 - Samarati, Pierangela
PB - SciTePress
T2 - 12th International Conference on Security and Cryptography, SECRYPT 2015
Y2 - 20 July 2015 through 22 July 2015
ER -