scispace - formally typeset
Open AccessJournal ArticleDOI

Monte Carlo methods for index computation ()

J. M. Pollard
- 01 Jul 1978 - 
- Vol. 32, Iss: 143, pp 918-924
Reads0
Chats0
TLDR
Some novel methods to compute the index of any integer relative to a given primitive root of a prime p, and how a very simple factorization method results, in which a prime factor p of a number can be found in only 0(pW2) operations.
Abstract
We describe some novel methods to compute the index of any integer relative to a given primitive root of a prime p. Our flrst method avoids the use of stored tables and apparently requires O(p 1/2) operations. Our second algorithm, which may be regarded as a method of catching kangaroos, is applicable when the index is known to lie in a certain interval; it requires O(w/2) operations for an interval of width w, but does not have complete certainty of success. It has several possible areas of application, including the f1actorization of integers. 1. A Rho Method for Index Computation. The concept of a random mapping of a finite set is used by Knuth [1, pp. 7-8] to explain the behavior of a type of random number generator. A sequence obtained by iterating such a function in a set of p elements is 'rho-shaped' with a tail and cycle which are random variables with expectation close to (1) /(irp/8) 0.6267 N/p, (as shown first in [2], [3]). Recently [4], we proposed that this theory be applied to recurrence relations such as (2) xi l x ? 1 (mod p), and showed how a very simple factorization method results, in which a prime factor p of a number can be found in only 0(pW2) operations. The method has been further discussed by Guy [5] and Devitt [6], who have found it suitable for use in programmable calculators. We now suggest that the same theory can be applied to sequences such as xo= 1, i1 qx1 0< x1 < jp 13~~~ (3)~SXi 2? 2i3 ()Xi+ 1 xi' (mod p) for 3' p <xi < 3p)

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

The Arithmetic of Elliptic Curves

TL;DR: It is shown here how Elliptic Curves over Finite Fields, Local Fields, and Global Fields affect the geometry of the elliptic curves.
Book ChapterDOI

Use of Elliptic Curves in Cryptography

TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Book

Guide to Elliptic Curve Cryptography

TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Journal ArticleDOI

Efficient signature generation by smart cards

TL;DR: An efficient algorithm that preprocesses the exponentiation of a random residue modulo p is presented, which improves the ElGamal signature scheme in the speed of the procedures for the generation and the verification of signatures and also in the bit length of signatures.
Journal ArticleDOI

The Elliptic Curve Digital Signature Algorithm (ECDSA)

TL;DR: The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
References
More filters
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book

Sorting and Searching

TL;DR: The first revision of this third volume is a survey of classical computer techniques for sorting and searching that extends the treatment of data structures to consider both large and small databases and internal and external memories.