International audienceBecause pairings have many applications, many hardware and software pairing implementations can be found in the literature. However, the parameters generally used have been invalidated by the recent results on the discrete logarithm problem over pairing friendly elliptic curves (Kim and Barbulescu in CRYPTO 2016, volume 9814 of lecture notes in computer science, Springer, Berlin, pp 543–571, 2016). New parameters must be generated to insure enough security in pairing based protocols. More generally it could be useful to generate nice pairing parameters in many real-world applications (specific security level, resistance to specific attacks on a protocol, database of curves). The main purpose of this paper is to describ...
The security of many public-key cryptosystems relies on the existence of groups in which the discret...
Abstract. In this paper we describe an efficient implementation of the Tate and Ate pairings using B...
Pairings are a powerful tool to build advanced cryptographic schemes. The most efficient way to inst...
International audienceBecause pairings have many applications, many hardware and software pairing im...
Many hardware and software pairing implementations can be found in the literature and some pairing f...
For the last decade, elliptic curve cryptography has gained increasing interest in industry and in t...
https://www.iacr.org/docs/pub_2013-16.htmlThis paper is the IACR version. It can be made freely avai...
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13...
There have been recent advances in solving the finite extension field discrete logarithm problem as ...
For the last decade, elliptic curve cryptography has gained increasing interest in industry and in t...
International audienceFollowing the emergence of Kim and Barbulescu's new number field sieve (exTNFS...
Recent algorithmic improvements of discrete logarithm computation in special extension fields threat...
Since 2015, there has been a significant decrease in the asymptotic complexity of computing discrete...
We present two contributions in this paper. First, we give a quantitative analysis of the scarcity o...
draft-kasamatsu-bncurves-01 Elliptic curves with pairings are useful tools for constructing cryptogr...
The security of many public-key cryptosystems relies on the existence of groups in which the discret...
Abstract. In this paper we describe an efficient implementation of the Tate and Ate pairings using B...
Pairings are a powerful tool to build advanced cryptographic schemes. The most efficient way to inst...
International audienceBecause pairings have many applications, many hardware and software pairing im...
Many hardware and software pairing implementations can be found in the literature and some pairing f...
For the last decade, elliptic curve cryptography has gained increasing interest in industry and in t...
https://www.iacr.org/docs/pub_2013-16.htmlThis paper is the IACR version. It can be made freely avai...
Pairing-friendly curves with odd prime embedding degrees at the 128-bit security level, such as BW13...
There have been recent advances in solving the finite extension field discrete logarithm problem as ...
For the last decade, elliptic curve cryptography has gained increasing interest in industry and in t...
International audienceFollowing the emergence of Kim and Barbulescu's new number field sieve (exTNFS...
Recent algorithmic improvements of discrete logarithm computation in special extension fields threat...
Since 2015, there has been a significant decrease in the asymptotic complexity of computing discrete...
We present two contributions in this paper. First, we give a quantitative analysis of the scarcity o...
draft-kasamatsu-bncurves-01 Elliptic curves with pairings are useful tools for constructing cryptogr...
The security of many public-key cryptosystems relies on the existence of groups in which the discret...
Abstract. In this paper we describe an efficient implementation of the Tate and Ate pairings using B...
Pairings are a powerful tool to build advanced cryptographic schemes. The most efficient way to inst...