This paper describes methods of recoding exponents to allow for regular implementations of m-ary exponentiation algorithms. Recoding algorithms previously proposed in the literature do not lend themselves to being implemented in a regular manner, which is required if the implementation needs to resist side-channel attacks based on simple power analysis. The advantage of the algorithms proposed in this paper over previous work is that the recoding can be readily implemented in a regular manner. Recoding algorithms are proposed for exponentiation algorithms that use both signed and unsigned exponent digits. © 2009 Springer Berlin Heidelberg.
CITATION STYLE
Joye, M., & Tunstall, M. (2009). Exponent recoding and regular exponentiation algorithms. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5580 LNCS, pp. 334–349). https://doi.org/10.1007/978-3-642-02384-2_21
Mendeley helps you to discover research relevant for your work.