Browse > Article
http://dx.doi.org/10.13067/JKIECS.2014.9.8.867

Algorithms for Computing Inverses in Finite Fields using Special ONBs  

Kim, Yong-Tae (광주교육대학교 수학교육과)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.9, no.8, 2014 , pp. 867-873 More about this Journal
Abstract
Since the computation of a multiplicative inverse using MONB includes many squarings and thus calculating inverse is expensive, we, in this paper, propose a low cost inverse algorithm requiring $nb(2^nm-1)+w(2^nm-1)-2$ multiplications and $2^n-1$ squarings to compute an inverse in $GF(2^{2^nm})^*$ using special normal basis over $GF(2^{2^n})$, and give some implementation results using the algorithm and, show that the timing results of our implementation is faster than that of Itoh et al.'s method.
Keywords
Finite Field; Modified Optimal Normal Basis(MONB); Inverse Element; Inverse Algorithm;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 G. Harper, A. Menezes, and S. Vanstone, "Public-key Cryptosystems with very small key length," Eurocrypto 92, Springer-Verlag. Balatonfured, Hungary, May 1992, pp. 163-172.
2 H.-D. Kim, S.-J. Cho, M.-J. Kwon, and H.-J. An, "A study on the cross-correlation function of extended Zeng sequences," The J. of The Korea Institute of Electronic Communication Sciences, vol. 7, no. 1, 2012, pp. 61-67.   과학기술학회마을
3 C.-H. Kim, S.-H. Oh, J.-I. Lim, K.-S. Suh, and J.-C. Yoon, "Operations in finite fields using modified method," J. Korea Institute of Information Security and Cryptography, vol. 8, no. 2, 1998, pp. 27-36.   과학기술학회마을
4 H. Cohen, A Course in Computational Algebraic Number Theory. New York : Springer-Verlag, 2000.
5 U.-S. Choi and S.-J. Cho, "Design of Binary Sequence with optimal Cross-correlation Values," J. of The Korea Institute of Electronic Communication Sciences, vol. 6, no. 4, 2011, pp. 539-544,
6 T. Itoh, O. Teechal, and S. Tsujii, "A fast algorithm for computing multiplicative inverse in $GF(2^n)$ using normal bases," J. Soc. Electro. Comm.(Japan), vol. 44, 1986, pp. 31-36.
7 Y. Kim, "A Fast Multiplier of Composite fields over finite fields," J. of The Korea Institute of Electronic Communication Sciences, vol. 6, no. 3, 2011, pp. 389-395.   과학기술학회마을
8 G. Agnew, T. Beth, B. Mullin, and S. Vanstone, "Arithmetic Operations in $GF(2^n)$," J. Cryptology, vol. 6, 1993, pp. 3-13.   DOI
9 Y. Kim, "Fast Sequential Optimal normal Bases Multipliers over finite fields," J. of The Korea Institute of Electronic Communication Sciences, vol. 8, no. 8, 2013, pp. 1207-1212.   과학기술학회마을   DOI   ScienceOn
10 U.-S. Choi, S.-J. Cho, and S.-H. Kwon, "Analysis of Cross Correlation of Extended Non-linear Binary Sequences," J. of The Korea Institute of Electronic Communication Sciences, vol. 7, no. 2, 2012, pp. 263-269.   과학기술학회마을
11 N. Koblitz, "Elliptic Curve cryptosystems," Math. Comp. 48, 1987, pp. 203-209.   DOI   ScienceOn