{"id":"https://openalex.org/W4323320155","doi":"https://doi.org/10.46586/tches.v2023.i2.270-285","title":"Some New Methods to Generate Short Addition Chains","display_name":"Some New Methods to Generate Short Addition Chains","publication_year":2023,"publication_date":"2023-03-06","ids":{"openalex":"https://openalex.org/W4323320155","doi":"https://doi.org/10.46586/tches.v2023.i2.270-285"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2023.i2.270-285","is_oa":true,"landing_page_url":"http://dx.doi.org/10.46586/tches.v2023.i2.270-285","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/10284/9732","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/10284/9732","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060901735","display_name":"Yuanchao Ding","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuanchao Ding","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China; State Key Laboratory of Cryptology, P.O. Box, Beijing, China","School of Cyber Science and Technology, Beihang University, Beijing, China","State Key Laboratory of Cryptology, P.O. Box, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China; State Key Laboratory of Cryptology, P.O. Box, Beijing, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038375764","display_name":"Hua Guo","orcid":"https://orcid.org/0000-0001-9901-053X"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Guo","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China; State Key Laboratory of Cryptology, P.O. Box, Beijing, China","State Key Laboratory of Cryptology, P.O. Box, Beijing, China","School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China; State Key Laboratory of Cryptology, P.O. Box, Beijing, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021543347","display_name":"Yewei Guan","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yewei Guan","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China; State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","School of Cyber Science and Technology, Beihang University, Beijing, China","State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China; State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044721481","display_name":"Hutao Song","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hutao Song","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China; State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","School of Cyber Science and Technology, Beihang University, Beijing, China","State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China; State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074201509","display_name":"Xiyong Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiyong Zhang","raw_affiliation_strings":["Beijing Institute of Satellite Information Engineering, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Satellite Information Engineering, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100425107","display_name":"Jianwei Liu","orcid":"https://orcid.org/0000-0003-2965-3518"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwei Liu","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5060901735"],"corresponding_institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.1716,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.52343759,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"270","last_page":"285"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7036224603652954},{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.6195443272590637},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.607019305229187},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.6000089049339294},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5935149192810059},{"id":"https://openalex.org/keywords/sliding-window-protocol","display_name":"Sliding window protocol","score":0.568260908126831},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5409804582595825},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.5142711997032166},{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.48376011848449707},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4824841320514679},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.47713279724121094},{"id":"https://openalex.org/keywords/window","display_name":"Window (computing)","score":0.4748159646987915},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.46445441246032715},{"id":"https://openalex.org/keywords/binary-tree","display_name":"Binary tree","score":0.4127761125564575},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3459681570529938},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.285500168800354},{"id":"https://openalex.org/keywords/scalar","display_name":"Scalar (mathematics)","score":0.2795256972312927},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2657567262649536},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.243230938911438},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.15596285462379456},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12677177786827087},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.0775412917137146}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7036224603652954},{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.6195443272590637},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.607019305229187},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.6000089049339294},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5935149192810059},{"id":"https://openalex.org/C102392041","wikidata":"https://www.wikidata.org/wiki/Q592860","display_name":"Sliding window protocol","level":3,"score":0.568260908126831},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5409804582595825},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.5142711997032166},{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.48376011848449707},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4824841320514679},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.47713279724121094},{"id":"https://openalex.org/C2778751112","wikidata":"https://www.wikidata.org/wiki/Q835016","display_name":"Window (computing)","level":2,"score":0.4748159646987915},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.46445441246032715},{"id":"https://openalex.org/C197855036","wikidata":"https://www.wikidata.org/wiki/Q380172","display_name":"Binary tree","level":2,"score":0.4127761125564575},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3459681570529938},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.285500168800354},{"id":"https://openalex.org/C57691317","wikidata":"https://www.wikidata.org/wiki/Q1289248","display_name":"Scalar (mathematics)","level":2,"score":0.2795256972312927},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2657567262649536},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.243230938911438},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.15596285462379456},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12677177786827087},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0775412917137146},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tches.v2023.i2.270-285","is_oa":true,"landing_page_url":"http://dx.doi.org/10.46586/tches.v2023.i2.270-285","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/10284/9732","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8c2b123c1c1e4e18b4478a349b626a05","is_oa":true,"landing_page_url":"https://doaj.org/article/8c2b123c1c1e4e18b4478a349b626a05","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2023.i2.270-285","is_oa":true,"landing_page_url":"http://dx.doi.org/10.46586/tches.v2023.i2.270-285","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/10284/9732","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1100817172","display_name":null,"funder_award_id":"619320","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1637248431","display_name":null,"funder_award_id":"61932014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2322052668","display_name":null,"funder_award_id":"61972018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5496764350","display_name":null,"funder_award_id":"U21B2021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8212683116","display_name":null,"funder_award_id":"U21B2021, 61972018, 61932014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4323320155.pdf"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1490113652","https://openalex.org/W1570820619","https://openalex.org/W2022845275","https://openalex.org/W2116500946","https://openalex.org/W2143287611","https://openalex.org/W2336651822","https://openalex.org/W2404675348","https://openalex.org/W2558315765","https://openalex.org/W2591576425","https://openalex.org/W2620927448","https://openalex.org/W2695039285","https://openalex.org/W2752061190","https://openalex.org/W2888985087","https://openalex.org/W2919243153","https://openalex.org/W3045110342","https://openalex.org/W3101154670"],"related_works":["https://openalex.org/W4235485585","https://openalex.org/W670148","https://openalex.org/W1507420113","https://openalex.org/W4242613270","https://openalex.org/W2107014706","https://openalex.org/W28274153","https://openalex.org/W2736837562","https://openalex.org/W2020808628","https://openalex.org/W2113040119","https://openalex.org/W2767903583"],"abstract_inverted_index":{"Modular":[0],"exponentiation":[1],"and":[2,12,98,121,141,173,190],"scalar":[3],"multiplication":[4],"are":[5,101],"important":[6,29],"operations":[7],"in":[8,181],"most":[9,28],"public-key":[10],"cryptosystems,":[11],"their":[13],"efficient":[14],"computation":[15],"is":[16,24,47,57,87,124,135],"essential":[17],"to":[18,32,59,67,89,116,137,157,186],"cryptosystems.":[19],"The":[20,108,132,161],"shortest":[21,41],"addition":[22,42,70,154,178],"chain":[23,43,179],"one":[25],"of":[26,36,44,176],"the":[27,34,82,105,113,119,139,148,158,166,177,182,187,191],"mathematical":[30],"concepts":[31],"realize":[33],"optimization":[35],"computation.":[37],"However,":[38],"finding":[39],"a":[40,75,94,127],"length":[45],"r":[46],"generally":[48],"regarded":[49],"as":[50],"an":[51],"NP-hard":[52],"problem,":[53],"whose":[54,84],"time":[55,85],"complexity":[56,86],"comparable":[58],"O(r!).":[60],"This":[61],"paper":[62],"proposes":[63],"some":[64],"novel":[65],"methods":[66,150],"generate":[68],"short":[69],"chains.":[71],"We":[72],"firstly":[73],"present":[74],"Simplified":[76],"Power-tree":[77],"method":[78,97,111,164,189,193],"by":[79,103,126],"deeply":[80],"deleting":[81],"power-tree":[83],"reduced":[88],"O(r2).":[90],"In":[91],"this":[92],"paper,":[93],"Cross":[95,109,162],"Window":[96,106,110,163,192],"its":[99,122],"variant":[100],"introduced":[102],"improving":[104],"method.":[107],"uses":[112],"cross":[114],"correlation":[115],"deal":[117],"with":[118,165],"windows":[120],"pre-computation":[123],"optimized":[125],"new":[128,149],"Addition":[129,167],"Sequence":[130,168],"Algorithm.":[131],"theoretical":[133],"analysis":[134],"conducted":[136],"show":[138,146],"correctness":[140],"effectiveness.":[142],"Meanwhile,":[143],"our":[144],"experiments":[145],"that":[147],"can":[151,170],"obtain":[152],"shorter":[153],"chains":[155],"compared":[156,185],"existing":[159],"methods.":[160],"algorithm":[169],"attain":[171],"44.74%":[172],"9.51%":[174],"reduction":[175],"length,":[180],"best":[183],"case,":[184],"Binary":[188],"respectively.":[194]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
