메뉴 건너뛰기




Volumn 4249 LNCS, Issue , 2006, Pages 134-147

Implementing cryptographic pairings on smartcards

Author keywords

Elliptic curves; Fast implementations; Pairing based cryptosystems

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER SCIENCE; CRYPTOGRAPHY;

EID: 33750710411     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11894063_11     Document Type: Conference Paper
Times cited : (145)

References (38)
  • 1
    • 84941186988 scopus 로고    scopus 로고
    • http://www.mips.com/content/Products/Architecture/SmartMIPSASE/ ProductCatalog/P_SmartMIPSASE/productBrief.
  • 4
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • Advances in Cryptology - Crypto'2002. Springer-Verlag
    • P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. In Advances in Cryptology - Crypto'2002, volume 2442 of Lecture Notes in Computer Science, pages 354-368. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 354-368
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Lynn, B.3    Scott, M.4
  • 5
    • 35248835023 scopus 로고    scopus 로고
    • Constructing elliptic curves with prescribed embedding degrees
    • Security in Communication Networks - SCN'2002. Springer-Verlag
    • P. S. L. M. Barreto, B. Lynn, and M. Scott. Constructing elliptic curves with prescribed embedding degrees. In Security in Communication Networks - SCN'2002, volume 2576 of Lecture Notes in Computer Science, pages 263-273. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2576 , pp. 263-273
    • Barreto, P.S.L.M.1    Lynn, B.2    Scott, M.3
  • 6
    • 35048900981 scopus 로고    scopus 로고
    • On the selection of pairing-friendly groups
    • Selected Areas in Cryptography - SAC'2003, Ottawa, Canada. Springer-Verlag
    • Paulo S. L. M. Barreto, B. Lynn, and M. Scott. On the selection of pairing-friendly groups. In Selected Areas in Cryptography - SAC'2003, volume 3006 of Lecture Notes in Computer Science, pages 17-25, Ottawa, Canada, 2003. Springer-Verlag.
    • (2003) Lecture Notes in Computer Science , vol.3006 , pp. 17-25
    • Barreto, P.S.L.M.1    Lynn, B.2    Scott, M.3
  • 7
    • 27244440989 scopus 로고    scopus 로고
    • Pairing-friendly elliptic curves of prime order
    • P.S.L.M. Barreto and M. Naehrig. Pairing-friendly elliptic curves of prime order. Cryptology ePrint Archive, Report 2005/133, 2005. http://eprint.iacr.org/ 2005/133.
    • (2005) Cryptology ePrint Archive, Report , vol.2005 , Issue.133
    • Barreto, P.S.L.M.1    Naehrig, M.2
  • 9
    • 23044483770 scopus 로고    scopus 로고
    • I. F. Blake, G. Seroussi, and N. P. Smart, editors. Cambridge University Press
    • I. F. Blake, G. Seroussi, and N. P. Smart, editors. Advances in Elliptic Curve Cryptography, Volume 2. Cambridge University Press, 2005.
    • (2005) Advances in Elliptic Curve Cryptography, Volume 2
  • 10
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586-615, 2003.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 11
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Advances in Cryptology - Asiacrypt'2001. Springer-Verlag
    • D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In Advances in Cryptology - Asiacrypt'2001, volume 2248 of Lecture Notes in Computer Science, pages 514-532. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 14
    • 0021468777 scopus 로고
    • Fast evaluation of logarithms in fields of characteristics two
    • D. Coppersmith. Fast evaluation of logarithms in fields of characteristics two. In IEEE Transactions on Information Theory, volume 30, pages 587-594, 1984.
    • (1984) IEEE Transactions on Information Theory , vol.30 , pp. 587-594
    • Coppersmith, D.1
  • 15
    • 0345490614 scopus 로고    scopus 로고
    • p - x + d
    • Advances in Cryptology - Asiacrypt'2003. Springer-Ver lag
    • p - x + d. In Advances in Cryptology - Asiacrypt'2003, volume 2894 of Lecture Notes in Computer Science, pages 111-123. Springer-Ver lag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2894 , pp. 111-123
    • Duursma, I.1    Lee, H.-S.2
  • 16
    • 0032649638 scopus 로고    scopus 로고
    • The Täte pairing and the discrete logarithm applied to elliptic curve cryptosystems
    • G. Frey, M. Müller, and H. Rück. The Täte pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Transactions on Information Theory, 45(5):1717-1719, 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.5 , pp. 1717-1719
    • Frey, G.1    Müller, M.2    Rück, H.3
  • 18
    • 84941174362 scopus 로고    scopus 로고
    • Hardware and software normal basis arithmetic for pairing based cryptography in characteristic three
    • R. Granger, D. Page, and M. Stam. Hardware and software normal basis arithmetic for pairing based cryptography in characteristic three. Cryptology ePrint Archive, Report 2004/157, 2004. http://eprint.iacr.org/2004/157.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.157
    • Granger, R.1    Page, D.2    Stam, M.3
  • 23
    • 84946844750 scopus 로고    scopus 로고
    • A one-round protocol for tripartite Diffie-Hellman
    • Algorithm Number Theory Symposium - ANTS IV. Springer-Verlag
    • A. Joux. A one-round protocol for tripartite Diffie-Hellman. In Algorithm Number Theory Symposium - ANTS IV, volume 1838 of Lecture Notes in Computer Science, pages 385-394. Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1838 , pp. 385-394
    • Joux, A.1
  • 24
    • 84946820591 scopus 로고    scopus 로고
    • Unbelievable security. Matching AES security using public key systems
    • Springer-Verlag
    • A. K. Lenstra. Unbelievable security. Matching AES security using public key systems. In Advances in Cryptology - Asiacrypt 2001, volume 2248, pages 67-86. Springer-Verlag, 2001.
    • (2001) Advances in Cryptology - Asiacrypt 2001 , vol.2248 , pp. 67-86
    • Lenstra, A.K.1
  • 26
    • 33646848363 scopus 로고    scopus 로고
    • Efficient and forward-secure identity-based signcryption
    • N. McCullagh and P. S.L. M. Barreto. Efficient and forward-secure identity-based signcryption. Cryptology ePrint Archive, Report 2004/117, 2004. http://-eprint.iacr.org/2004/117
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.117
    • McCullagh, N.1    Barreto, P.S.L.M.2
  • 30
    • 33750692047 scopus 로고    scopus 로고
    • p8, 1998. http://www.trans.cne.okayama-u.-ac.jp/nogami-group/papers/kiyou(2).pdf.
    • (1998) p8
    • Nogami, Y.1    Morikawa, Y.2
  • 32
    • 33645585449 scopus 로고    scopus 로고
    • ID based cryptosystems with pairing on elliptic curve
    • R. Sakai and M. Kasahara. ID based cryptosystems with pairing on elliptic curve. Cryptography ePrint Archive, Report 2003/054, 2003. http://eprint.iacr. org/2003/054.
    • (2003) Cryptography ePrint Archive, Report , vol.2003 , Issue.54
    • Sakai, R.1    Kasahara, M.2
  • 34
    • 24144479376 scopus 로고    scopus 로고
    • Computing the Tate pairing
    • CT-RSA. Springer-Verlag
    • M. Scott. Computing the Tate pairing. In CT-RSA, volume 3376 of Lecture Notes in Computer Science, pages 293-304. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 293-304
    • Scott, M.1
  • 35
    • 84941183293 scopus 로고    scopus 로고
    • M. Scott, 2006. http://ftp.computing.dcu.ie/pub/crypto/mirac1.zip.
    • (2006)
    • Scott, M.1
  • 36
    • 35048849890 scopus 로고    scopus 로고
    • Compressed pairings
    • Advances in Cryptology -Crypto' 2004. Springer-Verlag
    • M. Scott and P. Barreto. Compressed pairings. In Advances in Cryptology -Crypto' 2004, volume 3152 of Lecture Notes in Computer Science, pages 140-156. Springer-Verlag, 2004. Also available from http://eprint.iacr.org/2004/032/.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 140-156
    • Scott, M.1    Barreto, P.2
  • 37
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Proceedings of Crypto 1984. Springer-Verlag
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of Crypto 1984, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1984.
    • (1984) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1
  • 38
    • 0000074889 scopus 로고    scopus 로고
    • 2607
    • Advances in Cryptology - Asiacrypt'2001. Springer-Verlag
    • 2607. In Advances in Cryptology - Asiacrypt'2001, volume 2248 of Lecture Notes in Computer Science, pages 107-124. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 107-124
    • Thomé, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.