SciELO - Scientific Electronic Library Online

vol.37 issue2A new family of chromatically unique 6-bridge graphUpper double monophonic number of a graph author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand




Related links

  • On index processCited by Google
  • Have no similar articlesSimilars in SciELO
  • On index processSimilars in Google


Proyecciones (Antofagasta)

Print version ISSN 0716-0917

Proyecciones (Antofagasta) vol.37 no.2 Antofagasta June 2018 


A general method for to decompose modular multiplicative inverse operators over Group of units

Luis A. Cortés Vega1 

1Universidad de Antofagasta, Department of Mathematics, Antofagasta, Chile. E-mail:


In this article, the notion of modular multiplicative inverse operator (MMIO):

where ϱ=b × d >3 with b, d ∈ N, is introduced and studied. A general method to decompose (MMIO) over group of units of the form (ZZ)* is also discussed through a new algorithmic functional version of Bezout's theorem. As a result, interesting decomposition laws for (MMIO)'s over (ZZ)* are obtained. Several numerical examples confirming the theoretical results are also reported.

Keywords : Descomposition laws; group of units; Bezout's theorem; modular multiplicative inverse operator; algorithmic functional technique; Chinese remainder theorem.

Subjclass [2010] : Primary 11P83; 11A05; 11A07; 68W10 Secondary 68U20; 68W35; 97N70; 11T55; 68R01.

Texto completo disponible sólo en PDF.

Full text available only in PDF format.


I am especially indebted to professor Dr. Alvaro Restuccia, academic of Department of Physics of the Antofagasta University by their support, via fondecyt Grant #1161192, Chile. The referee made valuable comments, for which the present author is grateful. The current paper is a revised and expanded version of the original submission. I also want to thank to Professor Javier Silva Rojas for his invaluable help.


[1] H. M. AL-Matari, S. J. Aboud, N. F. Shilbayeh, Fast Fraction-Integer Method for Computing Multiplicative Inverse, J. of Computing, 1, pp. 131--135, (2009). [ Links ]

[2] O. Arazi, H. Qi, On calculiting multiplicative inverses modulo 2m, IEEE Trans. Comput 57, pp. 1435--1438, (2008). [ Links ]

[3] J--C. Bajard, L. Imbert, A full RNS implementation of RSA, IEEE Trans. Comput 53, pp. 769--774, (2004). [ Links ]

[4] J. W. Bos, Constant time modular inversion, J Cryptogr Eng 4, pp. 275--281, (2014). [ Links ]

[5] L. A. Cortés--Vega, A functional technique based on the Euclidean algorithm with applications to 2-D acoustic diffractal diffusers, J. Phys.: Conf. Ser 633, pp. 1--6, (2015). [ Links ]

[6] L. A. Cortés Vega, D. E. Rojas-Castro, Y.S. Santiago Ayala and S. C. Rojas-Romero, A technique based on the Euclidean algorithm and its applications to Cryptography and Nonlinear Diophantine Equations, Proyecciones. J. Math., 26, pp. 309-333, (2007). [ Links ]

[7] T. J. Cox, P. D'Antonio, Acoustic Absorbers and Diffusers: Theory, Design and Application Spon Press, (2004). [ Links ]

[8] Y. Dai, A. B. Borisov, K. Boyer, C. K. Rhodes, Computation with inverse states in a Finite Field F 𝑃 𝛼: The muon neutrino mass, the Unified-Strong-Electroweak coupling constant, and the Higgs mass, Sandia National Laboratory, Report SAND2000-2043, pp. 1--11, (2000). [ Links ]

[9] Y. Dai, A.B. Borisov, K. Boyer, C.K. Rhodes, A p-Adic metric for particle mass scale organization with genetic divisors, Sandia National Laboratory, Report SAND2001-2903, pp. 1--12, (2001). [ Links ]

[10] C. Ding, D. Pey, A. Salomaa, Chinese remainder Theorem: Applications in Computing, Coding, Cryptography, Singapure; World Scientific, (1999). [ Links ]

[11] J-G. Dumas, On Newton-Rapshon iteration for multiplicative inverses modulo prime power, IEEE Trans. Comput 63, pp. 2106--2109, (2014). [ Links ]

[12] J. Eichenauer, J. Lehn, A. Topuzoglu, A Nonlinear congruential pseudorandom numer generator with power two modulus, Math of Compt 51, pp. 757--759, (1988). [ Links ]

[13] Y. Elrich, K. Chang, A. Gordon, R. Ronen, O. Navon, M. Rooks, G.J. Hanon, DNA Sudoku-harnessing high-throughput sequencing for multiplexed specimen analysis, Genome Res 19, pp. 1243--1253, (2009). [ Links ]

[14] M. A. Fiol, Finite Abelian groups and the Chinese remainder theorem, Discrete Math 67, pp. 101--105, (1987). [ Links ]

[15] L. Hars, Modular inverse algorithms without multiplications for cryptographic applications, J Embedded Systems 032192, pp. 1--13, (2006). [ Links ]

[16] M. Joye and P. Paillier, GCD-Free algorithms for computing modular inverses, C.D. Walter et. al. (Eds.):CHES 2003, LNCS 2779. Springer-Verlag Berlin Heidelberg, pp. 243-253, (2003). [ Links ]

[17] B. S. Jr. Kaliski, The montgomery inverse and its applications, IEEE Trans. Comput 44, pp. 1064--1065 (1995). [ Links ]

[18] D. E. Knuth, The art of computer programming, 2, Semi-Numerical Algorithms, 3rd Edition, Addison-Wesley, Reading, MA, (1997). [ Links ]

[19] W. H. Ko, Modular inverse and reciprocity formula, arXiv:1304.6778v1, pp. 1-7, (2013). [ Links ]

[20] R. Lórencz, New algorithm for classical modular inverse, in Kaliski, B.S., Jr., Koç, C.K., and Paar, C. (Eds.):CHES 2002, LNCS Springer-Verlag Berlin, pp. 57--70, (2003). [ Links ]

[21] D. R. Hankerson, A. J. Menezes, S. A. Vanstone, Guide to Elliptic curve cryptography, Springer, New York, N.Y, USA (2004). [ Links ]

[22] L. P. Montgomery, Modular multiplication without trial division, Math. Comp 44, pp. 519--52, (1985). [ Links ]

[23] T. Niven, S. H. Zuckerman, H. Montgomery, An introduction to the theory of numbers, 5nd ed. Jhon Wiley-Sons, Inc. (1991). [ Links ]

[24] S. Parthasarathy, An interesting property of multiplicative inverse in mod(M), Algologic Tech. Reports, pp. 1--3, (2012). [ Links ]

[25] E. Savaș, C. K. Koç, The montgomery modular inverse revisited, IEEE Trans. Comput 49, pp. 763--766, (2000). [ Links ]

[26] E. Savaș, M. Nasser, A. A-A Gutub, C. K. Koç, Efficient unified Montgomory inversion with multibit shifting, IEEE Proc. Comput. Digit. Tech 152, pp. 489--498, (2005). [ Links ]

[27] M. R. Schroeder, Number theory and in Science and comunication, 3rd ed. Springer, Berlin, (1997). [ Links ]

[28] R. J. Sullivan, Microwave Radar Imaging and Advanced Concepts, 2nd ed. Scitech Pub Inc., (2004). [ Links ]

[29] C. E. Towers, D. P. Towers, J. D. C. Jones, Time efficient Chinese remainder theorem algorithm for full-field fringe phase analysis in multi-wavelenght interferometry, Optics Express 12, pp. 1136--1143, (2004). [ Links ]

[30] S. B. Verkhovsky, Enhanced Euclid algorithm for modular multiplicative inverse and its application in Cryptographic protocols, Int. J. Commun. Network and System Sc 3, pp. 901--906, (2010). [ Links ]

[31] S. Vollala, B.S. Degum, N. Ramasubramanian, Hardware desing for multiplicative modular inverse based on table look up technique, IEEE Computing and Network Commun (CoCoNet), pp. 520--523, (2015). [ Links ]

[32] Y. Wang, Residue to binary converters based on net Chinese remainder theorems, IEEE Trans Circuits Syst. 47, pp. 197--204, (2000). [ Links ]

[33] S. Wei, Computation of modular multiplicative inverse using residue signed-digit additions, IEEE Conf. Pub: 2016 International SoC Design Conference (ISOCC) , pp. 85--86, (2016). [ Links ]

Received: July 2017; Accepted: October 2017

Creative Commons License This is an open-access article distributed under the terms of the Creative Commons Attribution License