diff --git a/README.md b/README.md index c4bb6c4..178fd0c 100644 --- a/README.md +++ b/README.md @@ -108,7 +108,7 @@ iterations of Miller-Rabin Probabilistic Primality Test (FIPS 186-4 C.3.1)
Modular inverse.
bigint
Modular exponentiation b**e mod n
+Modular exponentiation b**e mod n. Currently using the right-to-left binary method
Promise
A probably-prime (Miller-Rabin), cryptographically-secure, random-number generator.
@@ -236,7 +236,7 @@ Modular inverse.
## modPow(b, e, n) ⇒ bigint
-Modular exponentiation b**e mod n
+Modular exponentiation b**e mod n. Currently using the right-to-left binary method
**Kind**: global function
**Returns**: bigint
- b**e mod n
diff --git a/dist/bigint-crypto-utils-latest.browser.js b/dist/bigint-crypto-utils-latest.browser.js
index 388d584..5b9001f 100644
--- a/dist/bigint-crypto-utils-latest.browser.js
+++ b/dist/bigint-crypto-utils-latest.browser.js
@@ -187,7 +187,8 @@ var bigintCryptoUtils = (function (exports) {
}
/**
- * Modular exponentiation b**e mod n
+ * Modular exponentiation b**e mod n. Currently using the right-to-left binary method
+ *
* @param {number|bigint} b base
* @param {number|bigint} e exponent
* @param {number|bigint} n modulo
diff --git a/dist/bigint-crypto-utils-latest.browser.mod.js b/dist/bigint-crypto-utils-latest.browser.mod.js
index 9726f72..fc0a59e 100644
--- a/dist/bigint-crypto-utils-latest.browser.mod.js
+++ b/dist/bigint-crypto-utils-latest.browser.mod.js
@@ -184,7 +184,8 @@ function modInv(a, n) {
}
/**
- * Modular exponentiation b**e mod n
+ * Modular exponentiation b**e mod n. Currently using the right-to-left binary method
+ *
* @param {number|bigint} b base
* @param {number|bigint} e exponent
* @param {number|bigint} n modulo
diff --git a/dist/bigint-crypto-utils-latest.node.js b/dist/bigint-crypto-utils-latest.node.js
index 9ba3d28..5ce215b 100644
--- a/dist/bigint-crypto-utils-latest.node.js
+++ b/dist/bigint-crypto-utils-latest.node.js
@@ -194,7 +194,8 @@ function modInv(a, n) {
}
/**
- * Modular exponentiation b**e mod n
+ * Modular exponentiation b**e mod n. Currently using the right-to-left binary method
+ *
* @param {number|bigint} b base
* @param {number|bigint} e exponent
* @param {number|bigint} n modulo