Since the introduction of bilinear pairing to public key cryptography in 2001, pairing has been considered as one of the most expensive public key operations in terms of both computational complexity and memory requirement. Recently some work has been done on improving the computation time of pairing on resource-constrained wireless sensors. However, little has been focused on reducing the memory consumption. In this paper, we propose three new algorithms for speeding up the computation and reducing the memory footprint of cubing, modular reduction and polynomial multiplication in ηT pairing over finite fields of characteristic three. We further propose new programming techniques for making the implementation even more lightweight. Our expe...
Recent advances in the development of compact microprocessors have brought forth new applications in...
Elliptic curve cryptography (ECC) and Tate pairing are two new types of public-key cryptographic sch...
Abstract. The recent discovery of the constructive use of pairings in cryptography has opened up a w...
Abstract—Computing Bilinear Pairing on sensor platforms has become an important research topic since...
Abstract. We describe fast new algorithms to implement recent cryptosystems based on the Tate pairin...
The software implementation of cryptographic schemes for wireless sensor networks poses a challenge ...
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In part...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In part...
Abstract. The research on pairing-based cryptography brought forth a wide range of protocols interes...
In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless s...
Abstract. In this paper we describe an efficient implementation of the Tate and Ate pairings using B...
Abstract. The computation speed of pairing based cryptosystems is slow compared with the other publi...
Tate pairing is a bilinear map used in identity based cryptography schemes. In this paper, we propos...
Elliptic curve cryptography (ECC) and Tate pairing are two new types of public-key cryptographic sch...
Recent advances in the development of compact microprocessors have brought forth new applications in...
Elliptic curve cryptography (ECC) and Tate pairing are two new types of public-key cryptographic sch...
Abstract. The recent discovery of the constructive use of pairings in cryptography has opened up a w...
Abstract—Computing Bilinear Pairing on sensor platforms has become an important research topic since...
Abstract. We describe fast new algorithms to implement recent cryptosystems based on the Tate pairin...
The software implementation of cryptographic schemes for wireless sensor networks poses a challenge ...
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In part...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In part...
Abstract. The research on pairing-based cryptography brought forth a wide range of protocols interes...
In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless s...
Abstract. In this paper we describe an efficient implementation of the Tate and Ate pairings using B...
Abstract. The computation speed of pairing based cryptosystems is slow compared with the other publi...
Tate pairing is a bilinear map used in identity based cryptography schemes. In this paper, we propos...
Elliptic curve cryptography (ECC) and Tate pairing are two new types of public-key cryptographic sch...
Recent advances in the development of compact microprocessors have brought forth new applications in...
Elliptic curve cryptography (ECC) and Tate pairing are two new types of public-key cryptographic sch...
Abstract. The recent discovery of the constructive use of pairings in cryptography has opened up a w...