Paper 2003/264

Inversion of Several Field Elements: A New Parallel Algorithm

Pradeep Kumar Mishra and Palash Sarkar

Abstract

In many crypographic hardware or software packages, a considerable part is devoted to finite field arithmetic. The finite field arithmetic is a very costly operation in comparison to other finite field operations. Taming the complexity of this operation has been a major challenge for researchers and implementers. One approach for the purpose is accumulate all the elements to be inverted and to compute several inversions simultaneously at the cost of one inversion and some multiplictions. One such algorithm is known as Montgomery's trick. However Montgomery's trick does not allow much parallelism. In~\cite{SMB03} an algorithm for computation of inverses of several field elements simultaneously in parallel has been proposed. The algorithm allows ample scope for parallelism and performes well if there is no restriction on the number of processors used. In the current work, we present an algorithm, which is same in complexity as Montgomery's trick but suitable for a parallel implementation. In parallel implementation, it computes inverse of $n$ elements in $2\log n$ parallel rounds. It performs better than both the previous algorithms under the circumstances where the restricted number of multipliers is used.

Metadata
Available format(s)
PS
Category
Implementation
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
pradeep_t @ isical ac in
History
2004-01-01: received
Short URL
https://ia.cr/2003/264
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2003/264,
      author = {Pradeep Kumar Mishra and Palash Sarkar},
      title = {Inversion of Several Field Elements: A New Parallel Algorithm},
      howpublished = {Cryptology ePrint Archive, Paper 2003/264},
      year = {2003},
      note = {\url{https://eprint.iacr.org/2003/264}},
      url = {https://eprint.iacr.org/2003/264}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.