Cryptography Reference
In-Depth Information
= a j (mod r ). This
by taking the product of a random subset of the g a j and setting a
method is presented as the “simple solution” in [ 141 ].
A more sophisticated method for Koblitz curves is given by Coron, M'Raıhi and
Tymen [ 141 ]. They use repeated application of sparse Frobenius expansions on elements
of the precomputed table. They also give a security analysis.
Search WWH ::




Custom Search