This paper presents efficient formulas to compute Miller doubling and Miller addition utilizing degree-3 twists on curves with j-invariant 0 written in Hessian form. We give the formulas for both odd and even embedding degrees and for pairings on both G 1 × G 2 and G 2 × G 1 . We propose the use of embedding degrees 15 and 21 for 128-bit and 192-bit security respectively in light of the NFS attacks and their variants. We give a comprehensive comparison with other curve models; our formulas give the fastest known pairing computation for embedding degrees 15, 21, and 24. </p
This paper presents the first study of pairing computation on curves with embedding degree $15$. We ...
Elliptic curve can be seen as the intersection of two quadratic surfaces in space. In this paper, we...
This paper considers a generalized form for Hessian curves. The family of generalized Hessian curves...
This paper presents efficient formulas to compute Miller doubling and Miller addition utilizing degr...
Research on efficient pairing implementation has focussed on reducing the loop length and on using h...
Recent algorithmic improvements of discrete logarithm computation in special extension fields threat...
In this paper, we first propose a geometric approach to explain the group law on Jacobi quartic curv...
The security of many public-key cryptosystems relies on the existence of groups in which the discret...
In this paper, we propose an elaborate geometric approach to explain the group law on Jacobi quartic...
International audienceMiller's algorithm is at the heart of all pairing-based cryp-tosystems since i...
This paper considers the computation of the Ate pairing on the Hessian model of elliptic curves. Due...
At Pairing 2010, Lauter et al\u27s analysis showed that Ate pairing computation in affine coordinate...
In 2010, Freeman, Scott, and Teske published a well-known taxonomy compiling the best known families...
In this paper, we propose an elaborate geometry approach to explain the group law on twisted Edwards...
Since 2015, there has been a significant decrease in the asymptotic complexity of computing discrete...
This paper presents the first study of pairing computation on curves with embedding degree $15$. We ...
Elliptic curve can be seen as the intersection of two quadratic surfaces in space. In this paper, we...
This paper considers a generalized form for Hessian curves. The family of generalized Hessian curves...
This paper presents efficient formulas to compute Miller doubling and Miller addition utilizing degr...
Research on efficient pairing implementation has focussed on reducing the loop length and on using h...
Recent algorithmic improvements of discrete logarithm computation in special extension fields threat...
In this paper, we first propose a geometric approach to explain the group law on Jacobi quartic curv...
The security of many public-key cryptosystems relies on the existence of groups in which the discret...
In this paper, we propose an elaborate geometric approach to explain the group law on Jacobi quartic...
International audienceMiller's algorithm is at the heart of all pairing-based cryp-tosystems since i...
This paper considers the computation of the Ate pairing on the Hessian model of elliptic curves. Due...
At Pairing 2010, Lauter et al\u27s analysis showed that Ate pairing computation in affine coordinate...
In 2010, Freeman, Scott, and Teske published a well-known taxonomy compiling the best known families...
In this paper, we propose an elaborate geometry approach to explain the group law on twisted Edwards...
Since 2015, there has been a significant decrease in the asymptotic complexity of computing discrete...
This paper presents the first study of pairing computation on curves with embedding degree $15$. We ...
Elliptic curve can be seen as the intersection of two quadratic surfaces in space. In this paper, we...
This paper considers a generalized form for Hessian curves. The family of generalized Hessian curves...