J
OURNAL DE
T
HÉORIE DES
N
OMBRES DE
B
ORDEAUX
F. B
ERGERON
J. B
ERSTEL
S. B
RLEK
Efficient computation of addition chains
Journal de Théorie des Nombres de Bordeaux, tome
6, n
o1 (1994),
p. 21-38
<http://www.numdam.org/item?id=JTNB_1994__6_1_21_0>
© Université Bordeaux 1, 1994, tous droits réservés.
L’accès aux archives de la revue « Journal de Théorie des Nombres de Bordeaux » (http://jtnb.cedram.org/) implique l’accord avec les condi-tions générales d’utilisation (http://www.numdam.org/conditions). Toute uti-lisation commerciale ou impression systématique est constitutive d’une infraction pénale. Toute copie ou impression de ce fichier doit conte-nir la présente mention de copyright.
Article numérisé dans le cadre du programme Numérisation de documents anciens mathématiques
Efficient
computation
of
addition chains
by
F.BERGERON~,
J.BERSTEL~
and S.BRLEK~
ABSTRACT - The aim of this paper is to present a unifying approach to the
computation of short addition chains. Our method is based upon continued
fraction expansions. Most of the popular methods for the generation of addition chains, such as the binary method, the factor method, etc..., fit in our framework. However, we present new and better algorithms.
We give a general upper bound for the complexity of continued fraction
methods, as a function of a chosen strategy, thus the total number of oper-ations required for the generation of an addition chain for all integers up to n is shown to be
O(n log2
n03B3n), where 03B3n is the complexity of computing the set of choices corresponding to the strategy. We also prove an analogof the Scholz-Brauer conjecture.
1. Introduction
An addition chain for a
positive
integer
n is a sequence ofpositive
inte-gers C =
(no,
nl, ... ,ns)
such that(i)
(ii)
foreach i,
1 i s, there existk, j i
such that ni =nj + nk.
The
integer s
is thelength
of the chain C and is denotedby
The chainlength
L( n)
of n is the minimallength
of allpossible
chains for n.Clearly,
this notion extends to sets of numbers as
well,
and we shall denote thechain
length
of{mi,....
mt}
by
L(ml,... , mt ) .
Brauer
(in [1])
introduced aspecial
class of additionchains, namely
star-chains,
characterizedby
the condition that(ii’ )
foreach i,
1i s,
there exists k i such that ni = ni-i + nk .These chains
play a major
role in ourstudy.
Manuscrit recu le 17 juin 1992.
tWith partial support from NSERC-Canada and FCAR-Quibec.
twith the support of PRC "Mathimatiques et Informatique" and ESPRIT, BRA
Addition chains for n
generate
multiplication
schemes for the compu-tation of Forinstance,
the chain(1,2,4,8,9,17,34,43)
leads to thefollowing
scheme for thecomputation
ofx43:
Clearly
this establishes acorrespondance
between addition chains and suchschemes.
Furthermore,
thelength
of an addition chain for n isequal
tothe
corresponding
number ofmultiplications required
for thecomputation
ofThus,
the smallest number of suchmultiplications
isgiven by
the chainlength
of n.This
subject
has along history,
a detailed account of which isgiven by
Knuth in his second volume[9].
Any
explicit
algorithm
for thegeneration
of addition chainsclearly
sets an upper bound on the function~(n).
Thusthe usual
binary expansion
algorithm
(see [9])
implies
thatl(n) :5 A(n)
+v(n) -1,
whereA(n) =
andv(n)
is the number of 1 in thebinary
expansion
of n.However,
theproblem
ofcomputing
the exact value ofl(n)
seems to be difficult.
Indeed,
aslightly
morecomplex
problem, namely
theproblem
ofcomputing
the chainlength
for a set ofintegers,
has been shownto be
NP-complete
(7~.
Therefore,
it isinteresting
to considersub-optimal
additionchains,
provided
thatthey
can be constructed in an efhcient way.In a
previous
paper[3]
(see
also the work of Semba[11]),
we havein-troduced such a class of
sub-optimal
addition chains forpositive integers
n. These were obtained
through
continued fractionexpansions
forn/k,
where k is some
integer
chosen between 2 and n - 1. We call chains of this form continuedfraction
additionchains,
orsimply cf-chains.
Weproved
in this same paper that the Scholz-Brauer
conjecture
holds for cf-chains.This result
implies
that for an infinite class ofintegers,
cf-chains are muchcloser to
optimal
addition chains than the chains obtainedby
the usualbinary
method. Aprecise
form of this assertion can be found inparagraph
5. Moreover we show
(Theorem 2)
that thelength
of cf-chains satisfies the sameasymptotic
bound asEven
though minimal-length
cf-chains are notoptimal, they
have the niceproperty
ofbeing
easy tocompute
andsignificantly
shorter on theaver-age than chains obtained
by
thebinary
method. This isclearly important
when the cost of even onemultiplication
ishigh.
Moreover,
most of thepopular
effectivestrategies
forcomputing
addition chains are obtained asspecial
cases of the cf-chain method.Thus,
minimallength
cf-chains willsystematically
be shorter than the chains obtainedby
these other meth-ods. We further prove that the total number ofoperations
required
for thegeneration
of an addition chain for allintegers up
to n isO(n log2
nyn),
where in
is thecomplexity
ofcomputing
the set of choicescorresponding
to the
strategy.
This takes into account thecomplexity
of arithmetics withmultiple-precision integers.
Thus in the case where in =O (log n),
onegets
the upper bound This holds for the
dyadic
strategy.
2. Continued fraction chains
Let us introduce two
simple
operations
on addition chains. Given twoaddition chains C =
(no,
ni,?
ns)
for n and C’ =(mo,
7~1,... ~Mt)
form, define the
product C
Q9 C’ to beIt is clear that this chain for nm is of
length
= +IC’I.
Now,
ifC =
(no, nl, ... ,
ns)
is a chain for n,and j
is one of theintegers appearing
in
C,
then defineC e j
to beObviously
thelength
of this chain isICI
+ 1.On the other
hand,
recall that for aninteger n
and any kbelonging
to{2, 3, ... ,
n -1~,
the continued fractionexpansion
ofn/k
isWe shall denote this continued fraction
by
ji,’"3r]-
The semi-continuantsQi
of this continued fraction are:Observe that
by
constructionQr
= n.A similar
recursion,
also derived from the continued fractionexpansion
ofn/k,
yields
a continuedf raction
additionchain,
cf-chain for short. LetC (d )
be some cf-chain for d =gcd(n, k);
and foreach i,
1 ir, let
Ci
=C(ui)
be some cf-chain for ui . We define the sequence of cf-chainsXt
by:
Hence Xi
is a chain forQi,
thusX,.
is also a chain for n and we shall denoteit
C(n).
All chains obtained in this manner will be calledc, f-chains.
Sincefor each we have
Clearly,
the construction of a chainC(n)
for someinteger n depends
onthe choice of k as well as on the choice of the cf-chains
C(d),
C1, C2,
...,Cr.
The
resulting
chain will varyaccording
to the choices made. In any case, the chain for 2a shouldalways
be(l, 2, 4, ... , 2a),
because it isclearly
of minimallength.
Observe that every cf-chain is also a star-chain in Brauer’s
terminology.
This
implies
that cf-chains are notalways optimal
since there existintegers
for which no
optimal
chain is a star-chain(12509
is the firstinteger
ofthis kind
[9]).
Conversely,
there are star-chains which are not cf-chains. For n =367,
acomputer
program showed
[3]
that the shortest cf-chainhas
length
12 whereas a shortest star-chain haslength
11.However,
theadvantage
of cf-chains overarbitrary
star-chains is thatthey
are easier tocompute.
This isprecisely
formulated in Theorem 1 below.Example
1. For n =86,
let us choose k = 10. Thecorresponding
contin-ued fraction is
[2,1,1,8],
d =gcd(86,10)
=2,
and(2, 4, 6,10, 86).
Hence the cf-chainproduced by
our method(provided
weObserve that this chain has minimal
length
8,
whereas thebinary
methodproduces
the chain( 1, 2, 4, 5,10, 20, 21, 42, 43, 8fi)
which haslength
9.3.
Strategies
As we have
already mentioned,
we need tospecify
how to choose theauxiliary integer
k E~2, 3, ... , n - 1 ~
that will be used for the continuedfraction
expansion.
Thus we shall define astrategy
to be a function y thatdetermines for each
integer n
(which
is not a power of2)
somenon-empty
subset
of {2,3,....~ - 1 ~ .
For2~,
wesimply
set the minimallength
cf-chain to(1, 2, 4, ..., 2°‘).
We can nowgive
aprecise
form to the methodas an
algorithm parametrized
by
astrategy
y.Algorithm
( pro d u ces
a sh ort es t cflchaJn for naccording
toI)
if n = 2C1 then return
(1, 2, 4, ... , 2a)
elif n = 3 then return
(1, 2, 3)
else choose some k E
-y(n)
such thatChain(f n, k},
-y)
has minimal
length
and return the chain endifend Minchain.
where
Algorithm
(produces
a cf-chain for{~i, ~2? - "9 nk})
if
n2
1 then returnMinchain(nl, y)
else
let q
=(n,
divn2 ); r
=(nl
remn2 )
if r = 0 then return
Chain(f n2,
n3, ... ,nk}, y )
øMinchain( q, I)
else return(Chain(f n2,
n3, ... , nk,r},
I)
0Minchain(q,
y ) )
EÐ r endifendif end Chain.
The
length
of the chain for{~1~2?-" nk),
(ni
>produced
by
thisalgorithm
will be denotedby
L(~nl, n2, ... , nk}, -y).
Now if wefurther denote
by
l( n, ï)
thelength
of the chain for nproduced
by
algorithm
Minchain,
then one has thefollowing
identities(see [3,
4])
and
where nl =
q n2 + r, with 0 r n2. In the
sequel
of this paper, thesefunctions will
play
animportant
role in thedescription
of theproperties
ofthe above
algorithm.
°
The
following
recursiveexpression
for thelength
of the cf-chainproduced
for n follows from these definitions. Denoteby
£( n, I)
thelength
of ashortest cf-chain for n
according
to thestrategy -t,
andby
thelength
of a shortest cf-chain for ncontaining
k and obtainedthrough
thecontinued fraction
expansion
ofn/k.
Then£(1,¡)
=0,
andMany
interesting strategies
can be chosen for thegeneration
of cf-chains.For each of these
strategies,
say i, we shall consider thecomplexity
ofcomputing
a i.e. a cf-chain obtained withstrategy
i.Binary
strategies,
[9].
The mostpopular
strategy
is obtainedby choosing
for all n,
This is
exactly
thebinary method,
in Knuth’sterminology.
Forinstance,
the cf-chain for 87 obtained with thisstrategy
is:The
length
of abinary
chain is known to bei(n, 0)
=A(n)
+v(n) -
1. Infact,
this value also follows from recurrence(2)
with -y
=i.
One could alsoconsider the
co-binary
strategy
a:The cf-chain for 87 obtained with the
co-binary
strategy,
is:Factor
strategy,
[9].
Thefactor
method(Knuth)
corresponds
to thestrategy:
if n is
prime;
tl,
otherwise,
where q
is the smallestprime
dividing
n.In this case, even
though
the set of candidates issmall,
thecomputation
ofl( n, 1r)
isclearly equivalent
to the factorization of n.Therefore,
theefiiciency
of this method is rather bad. A factor chain for 87 is:Total
strategy,
[2,
3,
11].
The totalstrategy 0
corresponds
to the choice of allacceptable
candidates,
i.e.:As we shall see
below,
thecomplexity
of thecorresponding algorithm
isO(n2 Iog2
n).
One minimal total chain for 87 is obtained with k = 17 :This is an
optimal
chain for 87.However,
it is notalways
true that aminimal cf-chain is a shortest star-chain. For
example,
a shorteststar-chain for 367 has
length
11,
whereas the totalstrategy
yields
1(367, 0)
= 12(see
[3]).
Dyadic
strategy,
[2,
3].
Because of thisrelatively
high complexity,
it isinteresting
to introduce fasternear-optimal
methods. One such is thedyadic
strategy:
The
complexity
of thisstrategy
issignificantly
smaller, namely
O(nlog3
n).
Observe that Cb(n).
Therefore minimaldyadic
chains arealways
shorter than
binary chains,
that is2(n, b) ~(~, /3)
for all ~c. For ourrunning example,
a minimaldyadic
chain is:This chain is also an
optimal
chain for 87.Fermat’s
strategy.
Astrategy
which is much faster tocompute
isFer-strategy:
It
yields
thefollowing
(optimal)
addition chain:The interest of Fermat’s
strategy
lies in thegain
ofcomputation
time since is a set of size0(loglogn).
Computer
calculations have shown that+ 1 for all n up to 1000.
Dichotomic
strategy.
Thisstrategy
is definedby
Since the set of choices here is a
singleton,
the dichotomicstrategy
isde-terministic
(like
thebinary
strategy).
Consequently,
both the chain and the chainlength
arecomputed
without any backtrack. Thelength
of thechains
produced
arelogarithmic
in theargument,
but the chains are notalways optimal
with these faststrategies.
As shown in Theorem 3below,
the dichotomic
strategy
provides
much shorter chains than thebinary
oneThe data
reported
in Table 1 has been obtained withMAPLE©
and aprogram written in
C++
running
on a MIPS2000. For eachstrategy i,
thetable lists the values
.11
JI. T
The values for
i(n)
were taken from Knuth[9].
The time shown is the timerequired
forcomputing
a table of all chains forintegers
up to 1000.Table 1.
Comparison of
thestrategies.
Remarks. The table shows that on the average, the
binary
(schoolbook)
method is
by
far the worst withrespect
to thelength.
Thecomputation
for the factor method does notreally
take into account thecomplexity
ofcomputing
theprime
factorizations involved.Indeed,
MAPLE factorizationprocedure
has a built-in table of smallprimes
(up
to1000).
We have notproduced
a similar table to be used with ourC++
program in order tocompare it but the time obtained with the MAPLE program
gives
a clearindication of the
projected
time.Also,
the reason for themissing
dataabout the
Optimal
strategy
is clear.4. Results
Each
strategy
defines an instantiation of thegeneral
algorithms
for thegeneration
of cf-chains.Although
thecomplexity
of thesealgorithms
clearly
depends
on thecomplexity
ofcomputing
thestrategy
y, we aremainly
interested in
evaluating
the functions i and L.Indeed,
the effectivethe
computation
of itslength.
Moreprecisely,
addition chains arerep-resented
by
linked lists. Each noderepresents
one term of thechain,
and two
pointers
link this node to the terms whose sumgive
this term.We show in
Fig.
1 anexample
of such arepresentation
for the chain(1, 2, 4, 5,10, 20, 40, 80, 85, 87).
Fig.
1. Listrepresentation
of (1,2,4,5,10,20,40,80,85,87).
Observe that the terms of the chain are not
part
of thisrepresentation.
This allows for a constant timeimplementation
of the basicoperations
0 and e. So the construction ofoptimal
cf-chains reduces in linear time tothe
computation
of I and L as definedby
(1)
and(2’).
The
complexity
ofcomputing
l( n, ~)
is a function of n, of the size ofand of the
complexity
ofcomputing
7(~).
Let in denote thecomplexity
ofcomputing
7(~),
then we have thefollowing
result.THEOREM 1. Assume that
yn is
anincreasing
functionof n,
then thecom-plexity
of computing
the function i for aUintegers
up to n islog2
n),
if one takes into account the
complexity
ofdoing
arithmetic withmultiple-precision integers.
Proof.
We assume that all thet(m, -1),
for m n, havealready
beencom-puted
and stored in an array. Thus thecomputation
ofL(~n, k}, 7)
using
(1)
and(2)
has thecomplexity
ofproducing
the continued fraction expan-sion ofn /k.
For k in¡en),
thecomplexity
ofexpanding
n/k
as a continuedfraction
(with
multiple-precision
integers)
has been shownby
G. E. Collins[6]
to beO(log(k)(I+log(n/d))),
where d =gcd(n, k).
Hence,
thecomplex-ity
ofcomputing
L(~n, k}, I)
is0(log2
n)
and thecomplexity
ofcomputing
£( n, ~)
out of these islog2
n).
Thus the totalcomplexity
we arelook-ing
for is2:j=2
j,
which isclearly
inn).
..It is
straightforward
to show that if-y(n)
C-’(n)
for twostrategies y
and
-y’,
then~( n, -y’) i(n, -1).
Inparticular,
l( n, 8) :5 l( n, I)
where 0 isthe total
strategy.
Thediagram
inFig.
2 describes the relations between thestrategies above,
where an arrow y---~ ~y’
between twostrategies 7
andy
indicates the relationy’(n)
Clug
Fig.
2. Thehierarchy
ofstrategies.
5.
Computing
short chainsWe
briefly
recall themajor
results about thelength
of addition chains.Sch6nhage
[10]
established the lower boundBrauer
[1]
determined theasymptotic
behavior ofL(n)
by producing
theupper
bound,
for 1. For a suitable p,
(for
instance p = weget
Thurber
[14]
improved
Brauer’s result as follows: take first thebinary
representation
of n; set m= A(n)
+ 1;
then,
starting
from theleading digit,
partition
thebinary
word intoequal
parts
oflength
p,producing
the setThen,
each ni is in the initialset f 1, 2,3,...,2P - 1 ~,
Note that
multiplication by
2P is achievedby
shifting,
and if ni is even,then it can be
replaced by
an odd numbernz
such that ni = for somej
> 1. This does not aSect the total number of shifts.Therefore,
l(n)
is boundedby
the total number ofoperations
needed toproduce
n,namely
where
2(P-1)
stands for thecomputation
of all odd numbers less than 2P. In that same paper, Thurberpointed
out that this construction could beimproved
for small values of n: heproposed
to take a non-uniformpartition
of the
binary
representation
of n, based on ananalysis
of thebinary
pattern.
Recently,
Bos and Coster[5]
used this method toproduce
addition chain heuristics in a more restricted context.They
investigated
applications
tocryptography,
namely
thecomputation
of powersappearing
in thewell-known
algorithm
ofRivest,
Shamir and Adleman(RSA).
Bos and Coster consider numbers such thata(n)
512.Here,
we shallonly
consider a uniformpartition
andreplace
the initialset of
2(P-1)
odd numbersby a chain
for the setthe upper bound
Thus,
theproblem
ofcomputing
l( n)
is reduced to thecomputation
ofan
optimal
chain for the Thissuggests
the use ofYao’s method
[15].
Yao’salgorithm
isasymptotically optimal,
but there is stillplace
forimprovements
when thenumbers ni
are small.Brauer’s bound is
easily expressed
within our context. To do so, we firstdefine the m-ary
strategy.
Let m =A(n)
+1,
A = m -p(fm/pl - 1),
and=
WPJ -
1-m-ary
strategy.
The next theorem characterizes the
asymptotic
behavior of Ur(n),u).
Itsproof
follows that of Knuth[9]
for = 1.THEOREM 2. The
length
of a cf-chain obtained with the m-arystrategy
satisfies the
asymptotic
boundProof.
Let We first show thatr
r’, - .. r{}
is an ordered set such 2P - 1.Set ro =
kt.
Following algorithm Chain,
write divko
and Tl =n rem
ko .
It follows that 91 =2å
and 2P - 1.By
definition(2)
of Lwe have
Then,
for i =2, ... t
+1,
defineObserve that
r~ ~
2P -1,
and that qi = 2P for all iexcepted perhaps
thelast one.
Indeed,
a(~t_1) - 2a(kt) -
2(p - 1),
and kt
=kt-l
div 2P. Letn2 =
kt-i
rem 2P. Then we haveIt is easy now to check that
i(2P
+1,
a)
= p + 1. We have thusSubstituting
Aand t,
we obtain the result claimed.and
The limit follows
clearly.
Remarks.
1. In the
proof
of Theorem2,
we made use of the dichotomicstrategy
~ in thecomputation
oft(qi, a)
andri, ... ,
r’+Il,
cr).
Clearly,
eventhe
binary
strategy
is sufficient toget
theasymptotic
bound.However,
wecould also
apply recursively
thestrategy
r if the numbers arelarge enough.
2. In order to
get
Thurber’smethod,
one needs to determine theparity
of the numbers ni, and find thecorresponding
non-uniformpartition
of thebinary representation
of n. Since it can be achieved inA(n)
time,
it isworth
doing
it inapplications,
such as RSAcomputing,
where one needs tocompute the same power many times.
Finally,
one can also define astrategy
which
produces
a non-uniformpartition
of thebinary
representation
of n.Let P =
(pi?p2?" - pt)
be apartition
of m =A(n)
+ 1 such thatThen we define the
P-partition
strategy
by
6. The Scholz-Brauer
inequalities
One of the most
intriguing problems concerning
addition chains is theso called Scholz-Brauer
conjecture
(see [1,
3, 4,
8, 12]):
In
[3],
we haveproved
a similarinequality
in the case of thedyadic
strategy,
This
clearly
shows that for thefamily
ofintegers
of the form2n - 1,
thedyadic
method isnoticeably
better than thebinary
method.Indeed,
it iswell known
[9]
thati(n,,3)
=A(n)
+v(n) -1,
whence£(2n -1,,8)
= 2n - 2.Since 0 is more
general
than~3,
it follows that2(rc, B) A(n)
+v(n) -
1.Thus,
(4)
implies
thatTHEOREM 3. The
following equah’ty
holds for the dichotomicstrategy
Proof.
Assume first that n = 2m. Theno’(2" - 1)
= 2’n -1.Consequently,
in view of
(1)
and,
by
(2)
It is easy to see that
l(2m
+1,
(7)
= 1 + m. It follows from(5)
thatAssume now that n = 2m + 1. Then
u(2n -
1)
=2m+l -
1.Again,
whence,
in view of(2),
Using
again
(2)
onegets
Equations
(6)
and(7)
show thatWe
conjecture
that anotherinequality
like that of Scholz-Brauer holds for Fermat’sstrategy,
namely:
This last
inequality
has been checked on acomputer
for n up to 256.More-over, Scholz-Brauer like
inequalities
have been derived for vectorial additionchains
(see [4]).
7.
Open
problems
Many
interesting
questions
arise from the workpresented
above. Thealgorithms presented
are based on continued fractionexpansions
from whichit is
expected
to findpartial
solutions toproblems
aboutoptimal
addition chains.Indeed,
eachstrategy
defines a sub-class of the class of star-chains forwhich it would be
interesting
toinvestigate
theproblems
described here-after. Most of them areexisting problems
aboutoptimal
addition chainsbut restricted to the class of cf-chains.
Complexity.
So far we know very little about the chainlength
obtainedby
the the different methods: theasymptotic
complexity
is known from the work of Brauer[1]
andimproved
by
Thurber[14];
we also knowquite
wellthe case of the
binary
method.In
particular,
we can ask for thefollowing
questions.
- Is the total
strategy
asymptotically optimal?
- What is the worst case
complexity
for the dichotomicstrategy?
Whilean upper bound can be found
easily,
it would be useful to characterize theworst cases.
-
What is the average case
complexity
for the dichotomicstrategy?
Thisamounts to a
study
of the distribution of thepartial quotients. Again
anupper bound can be
easily computed using
the distribution of thepartial
quotients
(see
Knuth[9]
forinstance),
but an exact valuerequires
moreinvestigations.
It isexpected
that someimprovements
could be achievedby using
ergodic
theory.
Scholz-Brauer
inequalities.
As statedearlier,
the Scholz-Brauerinequality
holds forstar-chains,
and also for the moregeneral
class ofto-chains
definedby
Hansen(see
[9]).
We derived two similarinequalities
with the total and dichotomicstrategies,
but thequestion
remains open for otherstrategies.
Density.
Given astrategy y
theproblem
is to determine thedensity
of the solution set of theequation
Misceflaneous. Let = and =
It is not known whether these functions are monotonic
increasing
in the case ofoptimal
addition chains. What can be said about cf-chains?Acknowledgements.
This paper is a revised andaugmented
version ofa communication
[2]
thatappeared
in theproceedings
of the XV LatinAmerican Conference on
Informatics,
held inSantiago
(Chile)
in 1989. Theauthors are also thankful to R. Mallette for his
programming expertise
inwriting
C++
programs. He alsospent
a lot of computer time in order toobtain
part
of the datapresented
inparagraph
3. We would like to thankJeffrey
Shallit forpointing
out the reference to the paper of Ichiro Semba.REFERENCES
[1] A. Brauer, On addition chains, Bull. Amer. Math. Soc. 45 (1939), 736-739.
[2]
F. Bergeron, J. Berstel, S. Brlek, A unifying approach to the generation of addition chains, Proc. XV Latin American Conf. on Informatics, Santiago, Chile July 10-14(1989), 29-38.
[3]
F. Bergeron, J. Berstel, S. Brlek, C. Duboc, Addition chains using continued frac-tions, J. Algorithms 10 (1989), 403-412.[4]
F. Bergeron, J. Olivos, Vectorial addition chains using Euclid’s algorithm, ResearchReport, Dpt. Math., UQAM 105 (1989).
[5] J. Bos, M. Coster, Addition chain heuristics, Proceedings of CRYPTO 89.
[6]
G. E. Collins, The computing time of the Euclidian algorithm, SIAM J. Computing3
(1974),
1-10.[7]
P. Downey, B. Leong, R. Sethi, Computing sequences with addition chains, SIAM J. Computing 10 (1981), 638-646.[8]
A. A. Gioia, M. V. Subbarao, M. Sugunama, The Scholz-Brauer problem in additionchains, Duke Math. J. 29 (1962), 481-487.
[9]
D. E. Knuth, The art of computer programming, vol. 2, Addison-Wesley, 1981.[10]
A. Schönhage, A lower bound for the length of addition chains, Theoret. Comput. Sci. 1 (1975), 1-12.[11] I.
Semba, Systematic method for determining the number of multiplications requiredto compute xm, where m is a positive integer, J. Information Proc. 6 (1983), 31-33.
[12]
E. G. Thurber, Addition chains and solutions of l(2n) = l(n) and l(2n - 1) =n +
l(n) -
1, Discrete Math. 16 (1976), 279-289.[13]
E. G. Thurber, The Scholz-Brauer problem on addition chains, Pacific J. Math. 49(1973),
229-242.[14]
E. G. Thurber, On addition chains l(mn) ~ l(n) - b and lower bounds for c(r),[14]
A. C.-C. Yao, On the evaluation of powers, SIAM J. Comp. 9 (1976), 100-103.F. Bergeron et S. Brlek,
LACIM, Université du Qu6bec a Montr6al,
CP 8888 Suc. A, Montreal, (Qc), Canada, H3C 3P8. J. Berstel,
LITP, IBP, Iln.iversite Pierre et Marie Curie, Paris 6,
4 place Jussieu, 75252 Paris Cedex 05.
bergeron@lacim.uqam.ca brlek~lacim.uqam.ca berstel@litp.ibp.fr