This study reports on an implementation of cryptographic pairings in a general purpose computer algebra system. For security levels equivalent to the different AES flavours, we exhibit suitable curves in parametric families and show that optimal ate and twisted ate pairings exist and can be efficiently evaluated. We provide a correct description of Miller's algorithm for signed binary expansions such as the NAF and extend a recent variant due to Boxall et al. to addition-subtraction chains. We analyse and compare several algorithms proposed in the literature for the final exponentiation. Finally, we give recommendations on which curve and pairing to choose at each security level.Algorithmic Number Theory in Computer Scienc
(eng) Since their introduction in constructive cryptographic applications, pairings over (hyper)elli...
Recent progress on pairing implementation has made certain pairings extremely simple and fast to com...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
International audienceThis study reports on an implementation of cryptographic pairings in a general...
pairing implementation, high-security pairings, hyperelliptic curves, group law, Jacobian arithmetic...
Abstract This paper presents new software speed records for the computation of cryptographic pairing...
The most powerful known primitive in public-key cryptography is undoubtedly elliptic curve pairings....
International audienceFollowing the emergence of Kim and Barbulescu's new number field sieve (exTNFS...
Abstract. In this paper we describe an efficient implementation of the Tate and Ate pairings using B...
Abstract. The security and performance of pairing based cryptography has provoked a large volume of ...
The subject of my thesis is the study of pairings, and particularly pairing based cryptography. My f...
Pairings have found a range of applications in many areas of cryptography. As such, to utilize the ...
The security and performance of pairing based cryptography has provoked a large volume of research, ...
AbstractMany research papers in pairing-based cryptography treat pairings as a “black box”. These pa...
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In part...
(eng) Since their introduction in constructive cryptographic applications, pairings over (hyper)elli...
Recent progress on pairing implementation has made certain pairings extremely simple and fast to com...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
International audienceThis study reports on an implementation of cryptographic pairings in a general...
pairing implementation, high-security pairings, hyperelliptic curves, group law, Jacobian arithmetic...
Abstract This paper presents new software speed records for the computation of cryptographic pairing...
The most powerful known primitive in public-key cryptography is undoubtedly elliptic curve pairings....
International audienceFollowing the emergence of Kim and Barbulescu's new number field sieve (exTNFS...
Abstract. In this paper we describe an efficient implementation of the Tate and Ate pairings using B...
Abstract. The security and performance of pairing based cryptography has provoked a large volume of ...
The subject of my thesis is the study of pairings, and particularly pairing based cryptography. My f...
Pairings have found a range of applications in many areas of cryptography. As such, to utilize the ...
The security and performance of pairing based cryptography has provoked a large volume of research, ...
AbstractMany research papers in pairing-based cryptography treat pairings as a “black box”. These pa...
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In part...
(eng) Since their introduction in constructive cryptographic applications, pairings over (hyper)elli...
Recent progress on pairing implementation has made certain pairings extremely simple and fast to com...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...