-
2
-
-
0000753472
-
Low complexity normal bases
-
Ash, D., Blake, I., Vanstone, S.: Low complexity normal bases. Discrete Applied Mathematics 25, 191-210 (1989)
-
(1989)
Discrete Applied Mathematics
, vol.25
, pp. 191-210
-
-
Ash, D.1
Blake, I.2
Vanstone, S.3
-
3
-
-
27244435853
-
A note on efficient computation of cube roots in characteristic 3
-
Technical Report 2004/305, Cryptology ePrint Archive
-
Barreto, P.: A note on efficient computation of cube roots in characteristic 3, Technical Report 2004/305, Cryptology ePrint Archive (2004)
-
(2004)
-
-
Barreto, P.1
-
4
-
-
33847698965
-
Efficient pairing computation on supersingular abelian varieties
-
Barreto, P., Galbraith, S., hÉigeartaigh, C., Scott, M.: Efficient pairing computation on supersingular abelian varieties. Designs, Codes and Cryptography 42, 239-271 (2007)
-
(2007)
Designs, Codes and Cryptography
, vol.42
, pp. 239-271
-
-
Barreto, P.1
Galbraith, S.2
hÉigeartaigh, C.3
Scott, M.4
-
5
-
-
33745604534
-
-
Barreto, P., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 319-331. Springer, Heidelberg (2006)
-
Barreto, P., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 319-331. Springer, Heidelberg (2006)
-
-
-
-
6
-
-
0004129394
-
-
Kluwer, Dordrecht
-
Blake, I., Gao, X., Menezes, A., Mullin, R., Vanstone, S., Yaghoobian, T.: Applications of Finite Fields. Kluwer, Dordrecht (1993)
-
(1993)
Applications of Finite Fields
-
-
Blake, I.1
Gao, X.2
Menezes, A.3
Mullin, R.4
Vanstone, S.5
Yaghoobian, T.6
-
7
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM Journal on Computing 32, 586-615 (2003)
-
(2003)
SIAM Journal on Computing
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
38149046724
-
-
Boyen, X., Martin, L.: Identity-based cryptography standard (IBCS) #1: Supersingular curve implementations of the BF and BB1 cryptosystems, IETF Internet Draft (December 2006)
-
Boyen, X., Martin, L.: Identity-based cryptography standard (IBCS) #1: Supersingular curve implementations of the BF and BB1 cryptosystems, IETF Internet Draft (December 2006)
-
-
-
-
9
-
-
33645751214
-
Security proof of Sakai-Kasahara's identity-based encryption scheme
-
Smart, N.P, ed, Cryptography and Coding, Springer, Heidelberg
-
Chen, L., Cheng, Z.: Security proof of Sakai-Kasahara's identity-based encryption scheme. In: Smart, N.P. (ed.) Cryptography and Coding. LNCS, vol. 3796, pp. 442-459. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3796
, pp. 442-459
-
-
Chen, L.1
Cheng, Z.2
-
10
-
-
33747036684
-
Software multiplication using Gaussian normal bases
-
Dahab, R., Hankerson, D., Hu, F., Long, M., López, J., Menezes, A.: Software multiplication using Gaussian normal bases. IEEE Transactions on Computers 55, 974-984 (2006)
-
(2006)
IEEE Transactions on Computers
, vol.55
, pp. 974-984
-
-
Dahab, R.1
Hankerson, D.2
Hu, F.3
Long, M.4
López, J.5
Menezes, A.6
-
11
-
-
3242670828
-
Field inversion and point halving revisited
-
Fong, K., Hankerson, D., López, J., Menezes, A.: Field inversion and point halving revisited. IEEE Transactions on Computers 53, 1047-1059 (2004)
-
(2004)
IEEE Transactions on Computers
, vol.53
, pp. 1047-1059
-
-
Fong, K.1
Hankerson, D.2
López, J.3
Menezes, A.4
-
12
-
-
36549032633
-
Pairings for cryptographers
-
Technical Report 2006/165, Cryptology ePrint Archive
-
Galbraith, S., Paterson, K., Smart, N.: Pairings for cryptographers, Technical Report 2006/165, Cryptology ePrint Archive (2006)
-
(2006)
-
-
Galbraith, S.1
Paterson, K.2
Smart, N.3
-
13
-
-
27244436453
-
-
Grabher, P., Page, D.: Hardware acceleration of the Tate pairing in characteristic three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 398-411. Springer, Heidelberg (2005)
-
Grabher, P., Page, D.: Hardware acceleration of the Tate pairing in characteristic three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 398-411. Springer, Heidelberg (2005)
-
-
-
-
14
-
-
23044475619
-
Hardware and software normal basis arithmetic for pairing based cryptography in characteristic three
-
Granger, R., Page, D., Stam, M.: Hardware and software normal basis arithmetic for pairing based cryptography in characteristic three. IEEE Transactions on Computers 54, 852-860 (2005)
-
(2005)
IEEE Transactions on Computers
, vol.54
, pp. 852-860
-
-
Granger, R.1
Page, D.2
Stam, M.3
-
15
-
-
11244267013
-
-
Springer, Heidelberg
-
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
16
-
-
0037743010
-
Software implementation of finite fields of characteristic three, for use in pairing-based cryptosystems
-
Harrison, K., Page, D., Smart, N.: Software implementation of finite fields of characteristic three, for use in pairing-based cryptosystems. LMS Journal of Computation and Mathematics 5, 181-193 (2002)
-
(2002)
LMS Journal of Computation and Mathematics
, vol.5
, pp. 181-193
-
-
Harrison, K.1
Page, D.2
Smart, N.3
-
17
-
-
0001492981
-
A modified Massey-Omura parallel multiplier for a class of finite fields
-
Hasan, M., Wang, M., Bhargava, V.: A modified Massey-Omura parallel multiplier for a class of finite fields. IEEE Transactions on Computers 42, 1278-1280 (1993)
-
(1993)
IEEE Transactions on Computers
, vol.42
, pp. 1278-1280
-
-
Hasan, M.1
Wang, M.2
Bhargava, V.3
-
18
-
-
33846452379
-
The eta pairing revisited
-
Hess, F., Smart, N., Vercauteren, F.: The eta pairing revisited. IEEE Transactions on Information Theory 52, 4595-4602 (2006)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, pp. 4595-4602
-
-
Hess, F.1
Smart, N.2
Vercauteren, F.3
-
19
-
-
38149050742
-
-
Intel Corporation, IA-32 Intel Architecture Software Developer's Manual, 1: Basic Architecture. Number 245470-007, (2002) available from http://developer.intel.com.
-
Intel Corporation, IA-32 Intel Architecture Software Developer's Manual, Vol. 1: Basic Architecture. Number 245470-007, (2002) available from http://developer.intel.com.
-
-
-
-
20
-
-
27244434197
-
-
Kerins, T., Marnane, W., Popovici, E., Barreto, P.: Efficient hardware for the Tate pairing calculation in characteristic three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 412-426. Springer, Heidelberg (2005)
-
Kerins, T., Marnane, W., Popovici, E., Barreto, P.: Efficient hardware for the Tate pairing calculation in characteristic three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 412-426. Springer, Heidelberg (2005)
-
-
-
-
21
-
-
84946820591
-
Unbelievable security: Matching AES security using public key systems
-
Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
-
Lenstra, A.: Unbelievable security: Matching AES security using public key systems. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 67-86. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 67-86
-
-
Lenstra, A.1
-
22
-
-
84947777892
-
2m
-
Roy, B, Okamoto, E, eds, INDOCRYP'T 2000, Springer, Heidelberg
-
2m. In: Roy, B., Okamoto, E. (eds.) INDOCRYP'T 2000. LNCS, vol. 1977, pp. 203-212. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1977
, pp. 203-212
-
-
López, J.1
Dahab, R.2
-
23
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E84-A, 1234-1243 (2001)
-
(2001)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E84-A
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
24
-
-
84956974817
-
Efficient software implementation for finite field multiplication in normal basis
-
Qing, S, Okamoto, T, Zhou, J, eds, ICICS 2001, Springer, Heidelberg
-
Ning, P., Yin, Y.: Efficient software implementation for finite field multiplication in normal basis. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 177-189. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2229
, pp. 177-189
-
-
Ning, P.1
Yin, Y.2
-
25
-
-
35248887146
-
-
Page, D., Smart, N.: Hardware implementation of finite fields of characteristic three. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 529-539. Springer, Heidelberg (2003)
-
Page, D., Smart, N.: Hardware implementation of finite fields of characteristic three. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 529-539. Springer, Heidelberg (2003)
-
-
-
-
26
-
-
33747034323
-
Efficient algorithms and architectures for field multiplication using Gaussian normal bases
-
Reyhani-Masoleh, A.: Efficient algorithms and architectures for field multiplication using Gaussian normal bases. IEEE Transactions on Computers 55, 34-47 (2006)
-
(2006)
IEEE Transactions on Computers
, vol.55
, pp. 34-47
-
-
Reyhani-Masoleh, A.1
-
27
-
-
33645585449
-
ID based cryptosystems with pairing on elliptic curve
-
Technical Report 2003/054, Cryptology ePrint Archive
-
Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve, Technical Report 2003/054, Cryptology ePrint Archive (2003)
-
(2003)
-
-
Sakai, R.1
Kasahara, M.2
-
28
-
-
38149127596
-
The number field sieve for integers of low weight
-
Technical Report 2006/107, Cryptology ePrint Archive
-
Schirokauer, O.: The number field sieve for integers of low weight, Technical Report 2006/107, Cryptology ePrint Archive (2006)
-
(2006)
-
-
Schirokauer, O.1
-
29
-
-
24144479376
-
-
Scott, M.: Computing the Tate pairing. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 293-304. Springer, Heidelberg (2005)
-
Scott, M.: Computing the Tate pairing. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 293-304. Springer, Heidelberg (2005)
-
-
-
-
30
-
-
38149111353
-
-
Scott, M.: MIRACL - Multiprecision Integer and Rational Arithmetic C Library, http://www.computing.dcu.ie/~mike/miracl.html
-
Scott, M.: MIRACL - Multiprecision Integer and Rational Arithmetic C Library, http://www.computing.dcu.ie/~mike/miracl.html
-
-
-
-
31
-
-
34548112540
-
Implementing cryptographic pairings
-
preprint
-
Scott, M.: Implementing cryptographic pairings, preprint (2006)
-
(2006)
-
-
Scott, M.1
-
32
-
-
33750710411
-
-
Scott, M., Costigan, N., Abdulwahab, W.: Implementing cryptographic pairings on smartcards. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 134-147. Springer, Heidelberg (2006)
-
Scott, M., Costigan, N., Abdulwahab, W.: Implementing cryptographic pairings on smartcards. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 134-147. Springer, Heidelberg (2006)
-
-
-
-
33
-
-
0004328283
-
-
Weaver, D, Germond, T, eds, Version 9, Prentice-Hall, Englewood Cliffs
-
Weaver, D., Germond, T. (eds.): The SPARC Architecture Manual (Version 9). Prentice-Hall, Englewood Cliffs (1994)
-
(1994)
The SPARC Architecture Manual
-
-
-
34
-
-
0036859286
-
Finite field multiplier using redundant representation
-
Wu, H., Hasan, A., Blake, I., Gao, S.: Finite field multiplier using redundant representation. IEEE Transactions on Computers 51, 1306-1316 (2002)
-
(2002)
IEEE Transactions on Computers
, vol.51
, pp. 1306-1316
-
-
Wu, H.1
Hasan, A.2
Blake, I.3
Gao, S.4
|