Although identity-based cryptography offers a number of functional advantages over conventional public key methods, the computational costs are significantly greater. The dominant part of this cost is the Tate pairing, which, in characteristic three, is best computed using the algorithm of Duursma and Lee. However, in hardware and constrained environments, this algorithm is unattractive since it requires online computation of cube roots or enough storage space to precompute required results. We examine the use of normal basis arithmetic in characteristic three in an attempt to get the best of both worlds: an efficient method for computing the Tate pairing that requires no precomputation and that may also be implemented in hardware to accele...
Abstract — Since their introduction in constructive crypto-graphic applications, pairings over (hype...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
Abstract. This paper is devoted to the design of fast parallel accel-erators for the cryptographic T...
Although identity-based cryptography offers a number of functional advantages over conventional publ...
Although identity-based cryptography offers a number of functional advantages over conventional publ...
Abstract. Although identity based cryptography o ers a number of functional advantages over conventi...
Recently, there have been many proposals for secure and novel cryptographic protocols that are built...
In this paper, we propose a modified ηT pairing algo-rithm in characteristic three which does not ne...
Abstract. In this paper we examine a number of ways of implementing characteristic three arithmetic ...
Abstract—Since their introduction in constructive cryptographic applications, pairings over (hyper)e...
Abstract. We describe fast new algorithms to implement recent cryptosystems based on the Tate pairin...
Abstract. In this paper the benefits of implementation of the Tate pairing computation in dedicated ...
Abstract. In this article we propose a study of the modified Tate pairing in characteristics two and...
Identity-based cryptography uses pairing functions, which are sophisticated bilinear maps defined on...
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In part...
Abstract — Since their introduction in constructive crypto-graphic applications, pairings over (hype...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
Abstract. This paper is devoted to the design of fast parallel accel-erators for the cryptographic T...
Although identity-based cryptography offers a number of functional advantages over conventional publ...
Although identity-based cryptography offers a number of functional advantages over conventional publ...
Abstract. Although identity based cryptography o ers a number of functional advantages over conventi...
Recently, there have been many proposals for secure and novel cryptographic protocols that are built...
In this paper, we propose a modified ηT pairing algo-rithm in characteristic three which does not ne...
Abstract. In this paper we examine a number of ways of implementing characteristic three arithmetic ...
Abstract—Since their introduction in constructive cryptographic applications, pairings over (hyper)e...
Abstract. We describe fast new algorithms to implement recent cryptosystems based on the Tate pairin...
Abstract. In this paper the benefits of implementation of the Tate pairing computation in dedicated ...
Abstract. In this article we propose a study of the modified Tate pairing in characteristics two and...
Identity-based cryptography uses pairing functions, which are sophisticated bilinear maps defined on...
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In part...
Abstract — Since their introduction in constructive crypto-graphic applications, pairings over (hype...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
Abstract. This paper is devoted to the design of fast parallel accel-erators for the cryptographic T...