Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptographic applications, an ever increasing number of protocols based on pairings have appeared in the literature. Software implementations being rather slow, the study of hardware architectures became an active research area. Beuchat et al. proposed for instance a coprocessor which computes the characteristic three ηT pairing, from which the Tate pairing can easily be derived, in 33µs on a Cyclone II FPGA. However, a final exponentiation is required to ensure a unique output value and the authors proposed to supplement their ηT pairing accelerator with a coprocessor for exponentiation. Thus, the challenge consists in designing the smallest possible ...
International audienceThis paper is devoted to the design of fast parallel accelerators for the cryp...
Tate pairing is a bilinear map used in identity based cryptography schemes. In this paper, we propos...
Identity based cryptography offers a number of functional advantages over traditional public key cry...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
Abstract — Since their introduction in constructive crypto-graphic applications, pairings over (hype...
Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic c...
Abstract—Since their introduction in constructive cryptographic applications, pairings over (hyper)e...
Abstract. This paper is devoted to the design of fast parallel accel-erators for the cryptographic T...
Recently, there have been many proposals for secure and novel cryptographic protocols that are built...
In this paper, we propose a modified ηT pairing algo-rithm in characteristic three which does not ne...
International audienceThis paper is devoted to the design of fast parallel accelerators for the cryp...
Tate pairing is a bilinear map used in identity based cryptography schemes. In this paper, we propos...
Identity based cryptography offers a number of functional advantages over traditional public key cry...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
Abstract — Since their introduction in constructive crypto-graphic applications, pairings over (hype...
Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic c...
Abstract—Since their introduction in constructive cryptographic applications, pairings over (hyper)e...
Abstract. This paper is devoted to the design of fast parallel accel-erators for the cryptographic T...
Recently, there have been many proposals for secure and novel cryptographic protocols that are built...
In this paper, we propose a modified ηT pairing algo-rithm in characteristic three which does not ne...
International audienceThis paper is devoted to the design of fast parallel accelerators for the cryp...
Tate pairing is a bilinear map used in identity based cryptography schemes. In this paper, we propos...
Identity based cryptography offers a number of functional advantages over traditional public key cry...