메뉴 건너뛰기




Volumn 4547 LNCS, Issue , 2007, Pages 85-102

Software implementation of arithmetic in double-struck F sign3m

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; EMBEDDED SYSTEMS; GAUSSIAN DISTRIBUTION; POLYNOMIALS;

EID: 38149128214     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73074-3_8     Document Type: Conference Paper
Times cited : (25)

References (34)
  • 3
    • 27244435853 scopus 로고    scopus 로고
    • A note on efficient computation of cube roots in characteristic 3
    • Technical Report 2004/305, Cryptology ePrint Archive
    • Barreto, P.: A note on efficient computation of cube roots in characteristic 3, Technical Report 2004/305, Cryptology ePrint Archive (2004)
    • (2004)
    • Barreto, P.1
  • 5
    • 33745604534 scopus 로고    scopus 로고
    • Barreto, P., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 319-331. Springer, Heidelberg (2006)
    • Barreto, P., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 319-331. Springer, Heidelberg (2006)
  • 7
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM Journal on Computing 32, 586-615 (2003)
    • (2003) SIAM Journal on Computing , vol.32 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 8
    • 38149046724 scopus 로고    scopus 로고
    • Boyen, X., Martin, L.: Identity-based cryptography standard (IBCS) #1: Supersingular curve implementations of the BF and BB1 cryptosystems, IETF Internet Draft (December 2006)
    • Boyen, X., Martin, L.: Identity-based cryptography standard (IBCS) #1: Supersingular curve implementations of the BF and BB1 cryptosystems, IETF Internet Draft (December 2006)
  • 9
    • 33645751214 scopus 로고    scopus 로고
    • Security proof of Sakai-Kasahara's identity-based encryption scheme
    • Smart, N.P, ed, Cryptography and Coding, Springer, Heidelberg
    • Chen, L., Cheng, Z.: Security proof of Sakai-Kasahara's identity-based encryption scheme. In: Smart, N.P. (ed.) Cryptography and Coding. LNCS, vol. 3796, pp. 442-459. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3796 , pp. 442-459
    • Chen, L.1    Cheng, Z.2
  • 12
    • 36549032633 scopus 로고    scopus 로고
    • Pairings for cryptographers
    • Technical Report 2006/165, Cryptology ePrint Archive
    • Galbraith, S., Paterson, K., Smart, N.: Pairings for cryptographers, Technical Report 2006/165, Cryptology ePrint Archive (2006)
    • (2006)
    • Galbraith, S.1    Paterson, K.2    Smart, N.3
  • 13
    • 27244436453 scopus 로고    scopus 로고
    • Grabher, P., Page, D.: Hardware acceleration of the Tate pairing in characteristic three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 398-411. Springer, Heidelberg (2005)
    • Grabher, P., Page, D.: Hardware acceleration of the Tate pairing in characteristic three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 398-411. Springer, Heidelberg (2005)
  • 14
    • 23044475619 scopus 로고    scopus 로고
    • Hardware and software normal basis arithmetic for pairing based cryptography in characteristic three
    • Granger, R., Page, D., Stam, M.: Hardware and software normal basis arithmetic for pairing based cryptography in characteristic three. IEEE Transactions on Computers 54, 852-860 (2005)
    • (2005) IEEE Transactions on Computers , vol.54 , pp. 852-860
    • Granger, R.1    Page, D.2    Stam, M.3
  • 16
    • 0037743010 scopus 로고    scopus 로고
    • Software implementation of finite fields of characteristic three, for use in pairing-based cryptosystems
    • Harrison, K., Page, D., Smart, N.: Software implementation of finite fields of characteristic three, for use in pairing-based cryptosystems. LMS Journal of Computation and Mathematics 5, 181-193 (2002)
    • (2002) LMS Journal of Computation and Mathematics , vol.5 , pp. 181-193
    • Harrison, K.1    Page, D.2    Smart, N.3
  • 17
    • 0001492981 scopus 로고
    • A modified Massey-Omura parallel multiplier for a class of finite fields
    • Hasan, M., Wang, M., Bhargava, V.: A modified Massey-Omura parallel multiplier for a class of finite fields. IEEE Transactions on Computers 42, 1278-1280 (1993)
    • (1993) IEEE Transactions on Computers , vol.42 , pp. 1278-1280
    • Hasan, M.1    Wang, M.2    Bhargava, V.3
  • 19
    • 38149050742 scopus 로고    scopus 로고
    • Intel Corporation, IA-32 Intel Architecture Software Developer's Manual, 1: Basic Architecture. Number 245470-007, (2002) available from http://developer.intel.com.
    • Intel Corporation, IA-32 Intel Architecture Software Developer's Manual, Vol. 1: Basic Architecture. Number 245470-007, (2002) available from http://developer.intel.com.
  • 20
    • 27244434197 scopus 로고    scopus 로고
    • Kerins, T., Marnane, W., Popovici, E., Barreto, P.: Efficient hardware for the Tate pairing calculation in characteristic three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, 3659, pp. 412-426. Springer, Heidelberg (2005)
    • Kerins, T., Marnane, W., Popovici, E., Barreto, P.: Efficient hardware for the Tate pairing calculation in characteristic three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 412-426. Springer, Heidelberg (2005)
  • 21
    • 84946820591 scopus 로고    scopus 로고
    • Unbelievable security: Matching AES security using public key systems
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Lenstra, A.: Unbelievable security: Matching AES security using public key systems. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 67-86. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 67-86
    • Lenstra, A.1
  • 22
    • 84947777892 scopus 로고    scopus 로고
    • 2m
    • Roy, B, Okamoto, E, eds, INDOCRYP'T 2000, Springer, Heidelberg
    • 2m. In: Roy, B., Okamoto, E. (eds.) INDOCRYP'T 2000. LNCS, vol. 1977, pp. 203-212. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1977 , pp. 203-212
    • López, J.1    Dahab, R.2
  • 24
    • 84956974817 scopus 로고    scopus 로고
    • Efficient software implementation for finite field multiplication in normal basis
    • Qing, S, Okamoto, T, Zhou, J, eds, ICICS 2001, Springer, Heidelberg
    • Ning, P., Yin, Y.: Efficient software implementation for finite field multiplication in normal basis. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol. 2229, pp. 177-189. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2229 , pp. 177-189
    • Ning, P.1    Yin, Y.2
  • 25
    • 35248887146 scopus 로고    scopus 로고
    • Page, D., Smart, N.: Hardware implementation of finite fields of characteristic three. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 529-539. Springer, Heidelberg (2003)
    • Page, D., Smart, N.: Hardware implementation of finite fields of characteristic three. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 529-539. Springer, Heidelberg (2003)
  • 26
    • 33747034323 scopus 로고    scopus 로고
    • Efficient algorithms and architectures for field multiplication using Gaussian normal bases
    • Reyhani-Masoleh, A.: Efficient algorithms and architectures for field multiplication using Gaussian normal bases. IEEE Transactions on Computers 55, 34-47 (2006)
    • (2006) IEEE Transactions on Computers , vol.55 , pp. 34-47
    • Reyhani-Masoleh, A.1
  • 27
    • 33645585449 scopus 로고    scopus 로고
    • ID based cryptosystems with pairing on elliptic curve
    • Technical Report 2003/054, Cryptology ePrint Archive
    • Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve, Technical Report 2003/054, Cryptology ePrint Archive (2003)
    • (2003)
    • Sakai, R.1    Kasahara, M.2
  • 28
    • 38149127596 scopus 로고    scopus 로고
    • The number field sieve for integers of low weight
    • Technical Report 2006/107, Cryptology ePrint Archive
    • Schirokauer, O.: The number field sieve for integers of low weight, Technical Report 2006/107, Cryptology ePrint Archive (2006)
    • (2006)
    • Schirokauer, O.1
  • 29
    • 24144479376 scopus 로고    scopus 로고
    • Scott, M.: Computing the Tate pairing. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 293-304. Springer, Heidelberg (2005)
    • Scott, M.: Computing the Tate pairing. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 293-304. Springer, Heidelberg (2005)
  • 30
    • 38149111353 scopus 로고    scopus 로고
    • Scott, M.: MIRACL - Multiprecision Integer and Rational Arithmetic C Library, http://www.computing.dcu.ie/~mike/miracl.html
    • Scott, M.: MIRACL - Multiprecision Integer and Rational Arithmetic C Library, http://www.computing.dcu.ie/~mike/miracl.html
  • 31
    • 34548112540 scopus 로고    scopus 로고
    • Implementing cryptographic pairings
    • preprint
    • Scott, M.: Implementing cryptographic pairings, preprint (2006)
    • (2006)
    • Scott, M.1
  • 32
    • 33750710411 scopus 로고    scopus 로고
    • Scott, M., Costigan, N., Abdulwahab, W.: Implementing cryptographic pairings on smartcards. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 134-147. Springer, Heidelberg (2006)
    • Scott, M., Costigan, N., Abdulwahab, W.: Implementing cryptographic pairings on smartcards. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 134-147. Springer, Heidelberg (2006)
  • 33
    • 0004328283 scopus 로고
    • Weaver, D, Germond, T, eds, Version 9, Prentice-Hall, Englewood Cliffs
    • Weaver, D., Germond, T. (eds.): The SPARC Architecture Manual (Version 9). Prentice-Hall, Englewood Cliffs (1994)
    • (1994) The SPARC Architecture Manual
  • 34
    • 0036859286 scopus 로고    scopus 로고
    • Finite field multiplier using redundant representation
    • Wu, H., Hasan, A., Blake, I., Gao, S.: Finite field multiplier using redundant representation. IEEE Transactions on Computers 51, 1306-1316 (2002)
    • (2002) IEEE Transactions on Computers , vol.51 , pp. 1306-1316
    • Wu, H.1    Hasan, A.2    Blake, I.3    Gao, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.