Inverting the pseudo exponentiation

1Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

At Eurocrypt’89 W. J. Jaburek suggested an algorithm, which he called pseudo exponentiation, for use in generalized El-Gamal type public key cryptoaysteius. This pseudo exponentiation uses a modified form of binary addition in the place of multiplication in an ordinary exponentiation. In this paper we show that the pseudo exponentiation on the set GF(2)k of bitstrings of length k has a considerable amount of math- ematical structure. Using this structure we present an algorithm for inverting pseudo exponentiation that has a running time polynomial in k.

Cite

CITATION STYLE

APA

Bauspieß, F., Knobloch, H. J., & Wichmann, P. (1991). Inverting the pseudo exponentiation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 473 LNCS, pp. 344–351). Springer Verlag. https://doi.org/10.1007/3-540-46877-3_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free