<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">inf16310</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2005.110</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Wu</surname>
						<given-names>Chia-Long</given-names>
					</name>
					<email xlink:href="mailto:chialongwu@seed.net.tw">chialongwu@seed.net.tw</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Lou</surname>
						<given-names>Der-Chyuan</given-names>
					</name>
					<email xlink:href="mailto:dclou@ccit.edu.tw">dclou@ccit.edu.tw</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Chang</surname>
						<given-names>Te-Jen</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Department of Aviation &amp; Communication Electronics, Chinese Air Force Institute of Technology, Kaohsiung 820, Taiwan</aff>
				<aff id="j_INFORMATICA_aff_001">Department of Electrical Engineering, Chung Cheng Institute of Technology, National Defense University, Tahsi, Taoyuan 33509, Taiwan</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2005</year>
			</pub-date>
			<volume>16</volume>
			<issue>3</issue>
			<fpage>449</fpage>
			<lpage>468</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>04</month>
					<year>2005</year>
				</date>
			</history>
			<abstract>
				<p>Efficient computation of the modular exponentiations is very important and useful for public-key cryptosystems. In this paper, an efficient parallel binary exponentiation algorithm is proposed which based on the Montgomery multiplication algorithm, the signed-digit-folding (SDF) and common-multiplicand-multiplicand (CMM) techniques. By using the CMM technique of computing the common part from two modular multiplications, the same common part in two modular multiplications can be computed once rather twice, we can thus improve the efficiency of the binary exponentiation algorithm by decreasing the number of modular multiplications. By dividing the bit pattern of the minimal-signed-digit recoding exponent into three equal length parts and using the technique of recording the common parts in the folded substrings, the proposed SDF-CMM algorithm can improve the efficiency of the binary algorithm, thus can further decrease the computational complexity of modular exponentiation. Furthermore, by using the proposed parallel SDF-CMM Montgomery binary exponentiation algorithm, on average the total number of single-precision multiplications can be reduced by about 61.3% and 74.1% as compared with Chang-Kuo-Lin's CMM modular exponentiation algorithm and Ha-Moon's CMM Montgomery modular exponentiation algorithm, respectively.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>Montgomery reduction algorithm</kwd>
				<kwd>common-multiplicand-multiplication</kwd>
				<kwd>signed-digit recoding</kwd>
				<kwd>modular exponentiation</kwd>
				<kwd>public-key cryptosystems</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>