2 FAST GCD ALGORITHMS

被引:41
|
作者
SORENSON, J
机构
[1] Department of Mathematics and Computer Science, Butler University, Indianapolis, IN 46208
关键词
D O I
10.1006/jagm.1994.1006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present two new algorithms for computing greatest common divisors: the right- and left-shift k-ary GCD algorithms. These algorithms are generalizations of the binary and left-shift binary algorithms. Interestingly, both new algorithms have sequential versions that are practical and efficient and parallel versions that rival the best previous parallel GCD algorithms. We show that sequential versions of both algorithms take Θ(n2/log n) bit operations in the worst case to compute the GCD of two n-bit integers. This compares favorably to the Euclidean and both binary algorithms, which take Θ(n2) time. In practice, we implemented multiple-precision versions of these GCD algorithms, and we found that both k-ary algorithms are faster than the Euclidean and binary algorithms on inputs of 100 to 1000 decimal digits in length. We show that parallel versions of both algorithms match the complexity of the best previous parallel GCD algorithm due to Chor and Goldreich. Specifically, if log n ≤ k ≤ 2n and k is a power of two, then both algorithms run in O(n/log k + log2n log log n) time using a number of processors bounded by a polynomial in n and k on a common CRCW PRAM. We also discuss extended versions of both algorithms. © 1994 Academic Press, Inc.
引用
收藏
页码:110 / 144
页数:35
相关论文
共 50 条
  • [21] Efficient algorithms for GCD and cubic residuosity in the ring of Eisenstein integers*
    Damgård, IB
    Frandsen, GS
    FUNDAMENTALS OF COMPUTATION THEORY, PROCEEDINGS, 2003, 2751 : 109 - 117
  • [22] Binary GCD like algorithms for some complex quadratic rings
    Agarwal, S
    Frandsen, GS
    ALGORITHMIC NUMBER THEORY, PROCEEDINGS, 2004, 3076 : 57 - 71
  • [23] Memory Tampering Attack on Binary GCD Based Inversion Algorithms
    Alejandro Cabrera Aldaya
    Billy Bob Brumley
    Alejandro J. Cabrera Sarmiento
    Santiago Sánchez-Solano
    International Journal of Parallel Programming, 2019, 47 : 621 - 640
  • [24] Memory Tampering Attack on Binary GCD Based Inversion Algorithms
    Cabrera Aldaya, Alejandro
    Brumley, Billy Bob
    Cabrera Sarmiento, Alejandro J.
    Sanchez-Solano, Santiago
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2019, 47 (04) : 621 - 640
  • [25] Fast constant-time gcd computation and modular inversion
    Bernstein D.J.
    Yang B.-Y.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (03): : 340 - 398
  • [26] DEFECTS AND REVISIONS OF ASYMPTOTICALLY FAST ALGORITHM FOR POLYNOMIAL GCD'S
    衷仁保
    Science Bulletin, 1985, (02) : 170 - 171
  • [27] 2 FAST-MULTIPLICATION ALGORITHMS FOR COMPUTERS
    MOKRINSK.AM
    TROFIMOV, NN
    AUTOMATION AND REMOTE CONTROL, 1969, (01) : 96 - &
  • [28] Extended GCD and Hermite normal form algorithms via lattice basis reduction
    Havas, G
    Majewski, BS
    Matthews, KR
    EXPERIMENTAL MATHEMATICS, 1998, 7 (02) : 125 - 136
  • [29] Fast Hardware Implementation for Extended GCD of Large Numbers in Redundant Representation
    Ou, Lun
    Zhu, Danyang
    Tian, Jing
    Wang, Zhongfeng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (08) : 3094 - 3098
  • [30] On the Robustness of the 2Sum and Fast2Sum Algorithms
    Boldo, Sylvie
    Graillat, Stef
    Muller, Jean-Michel
    ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE, 2017, 44 (01):