At Eurocrypt’89 W. J. Jaburek suggested an algorithm, which he called pseudo exponentiation, for use in generalized El-Gamal type public key cryptoaysteius. This pseudo exponentiation uses a modified form of binary addition in the place of multiplication in an ordinary exponentiation. In this paper we show that the pseudo exponentiation on the set GF(2)k of bitstrings of length k has a considerable amount of math- ematical structure. Using this structure we present an algorithm for inverting pseudo exponentiation that has a running time polynomial in k.
CITATION STYLE
Bauspieß, F., Knobloch, H. J., & Wichmann, P. (1991). Inverting the pseudo exponentiation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 473 LNCS, pp. 344–351). Springer Verlag. https://doi.org/10.1007/3-540-46877-3_31
Mendeley helps you to discover research relevant for your work.