Abstract — Since their introduction in constructive crypto-graphic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of protocols. Software implementations being rather slow, the study of hardware archi-tectures became an active research area. In this paper, we discuss several algorithms to compute the ηT pairing in characteristic three and suggest further improvements. These algorithms involve addition, multiplication, cubing, inver-sion, and sometimes cube root extraction over F3m. We propose a hardware accelerator based on a unified arithmetic operator able to perform the operations required by a given algorithm. We describe the implementation of a compact coprocessor for the field F397 give...
Abstract. Characteristic three fields denoted by F3n, where n ≥ 1, are used in curve based cryptogra...
Abstract. Although identity based cryptography o ers a number of functional advantages over conventi...
Nowadays, elliptic curve cryptosystems are widely distributed. Its fundamental operation is scalar m...
Abstract—Since their introduction in constructive cryptographic applications, pairings over (hyper)e...
Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic c...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
In this paper, we propose a modified ηT pairing algo-rithm in characteristic three which does not ne...
Recently, there have been many proposals for secure and novel cryptographic protocols that are built...
Abstract. In this paper we examine a number of ways of implementing characteristic three arithmetic ...
Abstract. This paper is devoted to the design of fast parallel accel-erators for the cryptographic T...
We describe here how to implement the arithmetic operations over F32m, F33m, and F36m involved in th...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
Pairings on hyperelliptic curves have been applied to many cryptographic schemes, and it is importan...
Abstract. Characteristic three fields denoted by F3n, where n ≥ 1, are used in curve based cryptogra...
Abstract. Although identity based cryptography o ers a number of functional advantages over conventi...
Nowadays, elliptic curve cryptosystems are widely distributed. Its fundamental operation is scalar m...
Abstract—Since their introduction in constructive cryptographic applications, pairings over (hyper)e...
Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic c...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
In this paper, we propose a modified ηT pairing algo-rithm in characteristic three which does not ne...
Recently, there have been many proposals for secure and novel cryptographic protocols that are built...
Abstract. In this paper we examine a number of ways of implementing characteristic three arithmetic ...
Abstract. This paper is devoted to the design of fast parallel accel-erators for the cryptographic T...
We describe here how to implement the arithmetic operations over F32m, F33m, and F36m involved in th...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
Pairings on hyperelliptic curves have been applied to many cryptographic schemes, and it is importan...
Abstract. Characteristic three fields denoted by F3n, where n ≥ 1, are used in curve based cryptogra...
Abstract. Although identity based cryptography o ers a number of functional advantages over conventi...
Nowadays, elliptic curve cryptosystems are widely distributed. Its fundamental operation is scalar m...