"Z(MSM6840770014)" . . "Multiplicative inverse; Cryptography; Modular arithmetic"@en . "325654" . "METHOD FOR GENERATING THE MULTIPLICATIVE INVERSE IN A FINITE FIELD GF(p)" . "L\u00F3rencz, R\u00F3bert" . "[A88C45470D3A]" . . . . . "1"^^ . . "United States Patent and Trademark Office" . . . "RIV/68407700:21240/09:00159869!RIV10-MSM-21240___" . "21240" . "\u010CVUT v Praze" . . "2007-10-18+02:00"^^ . "1"^^ . . . "METHOD FOR GENERATING THE MULTIPLICATIVE INVERSE IN A FINITE FIELD GF(p)" . . . . . . . "7574469" . . . . "RIV/68407700:21240/09:00159869" . "The essence of the Invention is an effective method for generating the multiplicative inverse in a finite field GF(p) where p is prime, i.e. for generating the modular inverse. This method is derived from the Extended Euclidean Algorithm (EEA). The method is designed for binary execution of operations during the process of generating the modular inverse, with respect to the lowest number of addition, subtraction and shift operations possible. The proposed method avoids redundant operations for converting odd and negative values, which are performed in methods currently in use. To achieve that, negative numbers are represented in the two's complement code, values in the control part of the EEA are shifted to the left, and a new definition of the boundary and control conditions is utilized in the procedure. Minimizing the number of additions and subtractions is desirable for calculations with large numbers often encountered in cryptography." . "2009-08-11+02:00"^^ . "METHOD FOR GENERATING THE MULTIPLICATIVE INVERSE IN A FINITE FIELD GF(p)"@en . "METHOD FOR GENERATING THE MULTIPLICATIVE INVERSE IN A FINITE FIELD GF(p)"@en . "Washington" . . "The essence of the Invention is an effective method for generating the multiplicative inverse in a finite field GF(p) where p is prime, i.e. for generating the modular inverse. This method is derived from the Extended Euclidean Algorithm (EEA). The method is designed for binary execution of operations during the process of generating the modular inverse, with respect to the lowest number of addition, subtraction and shift operations possible. The proposed method avoids redundant operations for converting odd and negative values, which are performed in methods currently in use. To achieve that, negative numbers are represented in the two's complement code, values in the control part of the EEA are shifted to the left, and a new definition of the boundary and control conditions is utilized in the procedure. Minimizing the number of additions and subtractions is desirable for calculations with large numbers often encountered in cryptography."@en .