A fast GPU-based hybrid algorithm for addition chains

被引:0
作者
Hatem M. Bahig
Khaled A. AbdElbari
机构
[1] Ain Shams University,Computer Science Division, Department of Mathematics, Faculty of Science
来源
Cluster Computing | 2018年 / 21卷
关键词
Addition chain; Branch and bound; Breadth first strategy; Depth first strategy; CUDA; GPU;
D O I
暂无
中图分类号
学科分类号
摘要
A graphics processing unit (GPU) has been widely used to accelerate discrete optimization problems. In this paper, we introduce a novel hybrid parallel algorithm to generate a shortest addition chain for a positive integer e. The main idea of the proposed algorithm is to divide the search tree into a sequence of three subtrees: top, middle, and bottom. The top subtree works using a branch and bound depth first strategy. The middle subtree works using a branch and bound breadth first strategy, while the bottom subtree works using a parallel (GPU) branch and bound depth first strategy. Our experimental results show that, compared to the fastest sequential algorithm for generating a shortest addition chain, we improve the generation by about 70% using one GPU (NVIDIA GeForce GTX 770). For generating all shortest addition chains, the percentage of the improvement is about 50%.
引用
收藏
页码:2001 / 2011
页数:10
相关论文
共 45 条
  • [1] Hawick K(2010)Parallel graph component labelling with gpus and cuda Parallel Comput. 36 655-678
  • [2] Leist A(2014)An efficient parallel algorithm for accelerating computational protein design Bioinformatics 30 255-263
  • [3] Playne D(2012)Cryptanalysis of the full AES using GPU-like special-purpose hardware Fundam. Inform. 114 221-237
  • [4] Zhou Y(2017)An efficient elliptic curve cryptography signature server with GPU acceleration IEEE Trans. Inform. Forensics Secur. 12 111-122
  • [5] Xu W(2011)A fast, GPU based, dictionary attack to openPGP secret keyrings J. Syst. Softw. 84 2088-2096
  • [6] Donald BR(1976)New directions in cryptography IEEE Trans. Inform. Theory 22 644-654
  • [7] Zeng J(1985)A public-key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inform. Theory 31 469-472
  • [8] Biryukov A(1978)A method for obtaining digital signatures and public-key cryptosystems Commun. ACM. 21 120-126
  • [9] Großschädl J(1998)A survey of fast exponentiation methods J. Algorithms 122 129-146
  • [10] Pan W(2018)A fast parallel modular exponentiation algorithm Arab. J. Sci. Eng. 43 903-911