diff options
Diffstat (limited to 'crypto/src/math/ec/custom/sec/SecP224K1FieldElement.cs')
-rw-r--r-- | crypto/src/math/ec/custom/sec/SecP224K1FieldElement.cs | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/crypto/src/math/ec/custom/sec/SecP224K1FieldElement.cs b/crypto/src/math/ec/custom/sec/SecP224K1FieldElement.cs index 422b8294a..eb740419f 100644 --- a/crypto/src/math/ec/custom/sec/SecP224K1FieldElement.cs +++ b/crypto/src/math/ec/custom/sec/SecP224K1FieldElement.cs @@ -99,7 +99,7 @@ namespace Org.BouncyCastle.Math.EC.Custom.Sec { //return Multiply(b.Invert()); uint[] z = Nat224.Create(); - Mod.Invert(SecP224K1Field.P, ((SecP224K1FieldElement)b).x, z); + SecP224K1Field.Inv(((SecP224K1FieldElement)b).x, z); SecP224K1Field.Multiply(z, x, z); return new SecP224K1FieldElement(z); } @@ -122,7 +122,7 @@ namespace Org.BouncyCastle.Math.EC.Custom.Sec { //return new SecP224K1FieldElement(ToBigInteger().ModInverse(Q)); uint[] z = Nat224.Create(); - Mod.Invert(SecP224K1Field.P, x, z); + SecP224K1Field.Inv(x, z); return new SecP224K1FieldElement(z); } @@ -138,7 +138,7 @@ namespace Org.BouncyCastle.Math.EC.Custom.Sec * First, raise this element to the exponent 2^221 - 2^29 - 2^9 - 2^8 - 2^6 - 2^4 - 2^1 (i.e. m + 1) * * Breaking up the exponent's binary representation into "repunits", we get: - * { 191 1s } { 1 0s } { 19 1s } { 2 0s } { 1 1s } { 1 0s} { 1 1s } { 1 0s} { 3 1s } { 1 0s} + * { 191 1s } { 1 0s } { 19 1s } { 2 0s } { 1 1s } { 1 0s } { 1 1s } { 1 0s } { 3 1s } { 1 0s } * * Therefore we need an addition chain containing 1, 3, 19, 191 (the lengths of the repunits) * We use: [1], 2, [3], 4, 8, 11, [19], 23, 42, 84, 107, [191] |