Research Article
Mimic Encryption Box for Network Multimedia Data Security
Algorithm 3
Montgomery point multiplication.
| Input: , point G | | Output: Q = kG | (1) | Initialize R0 = G; R1 = 2G; i = l – 2; | (2) | while () | (3) | if (ki = = 0) R1 = R0 + R1; R0 = 2R0; | (4) | else if (ki = = 1) R0 = R0 + R1; R1 = 2R1; | (5) | i = i – 1; | (6) | endwhile | (7) | Q = R0; |
|