Daniel Krenn

Learn More
Efficient scalar multiplication in Abelian groups (which is an important operation in public key cryptography) can be performed using digital expansions. Apart from rational integer bases (double-and-add algorithm), imaginary quadratic integer bases are of interest for elliptic curve cryptography , because the Frobenius endomorphism fulfils a quadratic(More)
For fixed t ≥ 2, we consider the class of representations of 1 as sum of unit fractions whose denominators are powers of t or equivalently the class of canonical compact t-ary Huffman codes or equivalently rooted t-ary plane " canonical " trees. We study the probabilistic behaviour of the height (limit distribution is shown to be normal), the number of(More)
We present an average case analysis of two variants of dual-pivot quicksort, one with a non-algorithmic comparison-optimal partitioning strategy, the other with a closely related algorithmic strategy. For both we calculate the expected number of comparisons exactly as well as asymptotically, in particular, we provide exact expressions for the linear,(More)
2016 All Rights Reserved ii ACKNOWLEDGEMENTS First and foremost, I would like to thank my advisor, Dr. Boris Baltes, for consistent feedback, recommendations, and support (both motivational and monetary). I am especially grateful to my advisor for supporting me on a thesis topic outside of his interests. I would also like to thank my thesis committee(More)
We present an average case analysis of a variant of dual-pivot quicksort. We show that the used algorithmic partitioning strategy is optimal, i.e., it minimizes the expected number of key comparisons. For the analysis, we calculate the expected number of comparisons exactly as well as asymptotically, in particular, we provide exact expressions for the(More)