The most powerful known primitive in public-key cryptography is undoubtedly elliptic curve pairings. Upon their introduction just over ten years ago the computation of pairings was far too slow for them to be considered a practical option. This resulted in a vast amount of research from many mathematicians and computer scientists around the globe aiming to improve this computation speed. From the use of modern results in algebraic and arithmetic geometry to the application of foundational number theory that dates back to the days of Gauss and Euler, cryptographic pairings have since experienced a great deal of improvement. As a result, what was an extremely expensive computation that took several minutes is now a high-speed operation tha...
Les couplages sont des primitives cryptographiques qui interviennent désormais dans de nombreux prot...
The Weil and Tate pairings have found several new applications in cryptography. To efficiently imple...
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13...
pairing implementation, high-security pairings, hyperelliptic curves, group law, Jacobian arithmetic...
This paper presents new software speed records for the computation of cryptographic pairings. More s...
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In part...
Abstract. The security and performance of pairing based cryptography has provoked a large volume of ...
[[abstract]]The bilinear pairings such as Weil pairing and Tate pairing on elliptic curves have rece...
The security and performance of pairing based cryptography has provoked a large volume of research, ...
Abstract Recently there has been an explosion of interest in the use of pairings on elliptic curvesi...
This paper presents efficient formulas for computing cryptographic pairings on the curve y 2 = c x 3...
This article appeared as Chapter 9 of the book Topics in Computational Number Theory inspired by Pe...
any required final revisions, as accepted by my examiners. I understand that my thesis may be made e...
Abstract. We describe fast new algorithms to implement recent cryptosystems based on the Tate pairin...
Les couplages sont des primitives cryptographiques qui interviennent désormais dans de nombreux prot...
The Weil and Tate pairings have found several new applications in cryptography. To efficiently imple...
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13...
pairing implementation, high-security pairings, hyperelliptic curves, group law, Jacobian arithmetic...
This paper presents new software speed records for the computation of cryptographic pairings. More s...
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In part...
Abstract. The security and performance of pairing based cryptography has provoked a large volume of ...
[[abstract]]The bilinear pairings such as Weil pairing and Tate pairing on elliptic curves have rece...
The security and performance of pairing based cryptography has provoked a large volume of research, ...
Abstract Recently there has been an explosion of interest in the use of pairings on elliptic curvesi...
This paper presents efficient formulas for computing cryptographic pairings on the curve y 2 = c x 3...
This article appeared as Chapter 9 of the book Topics in Computational Number Theory inspired by Pe...
any required final revisions, as accepted by my examiners. I understand that my thesis may be made e...
Abstract. We describe fast new algorithms to implement recent cryptosystems based on the Tate pairin...
Les couplages sont des primitives cryptographiques qui interviennent désormais dans de nombreux prot...
The Weil and Tate pairings have found several new applications in cryptography. To efficiently imple...
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13...