An M3 public-key encryption scheme
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Unbelievable Security. Matching AES Security Using Public Key Systems
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Elliptic Curves: Number Theory and Cryptography
Elliptic Curves: Number Theory and Cryptography
A One Round Protocol for Tripartite Diffie–Hellman
Journal of Cryptology
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Journal of Cryptology
A Taxonomy of Pairing-Friendly Elliptic Curves
Journal of Cryptology
Pairing-Based cryptography at high security levels
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Hi-index | 7.29 |
In this paper, we give a family of elliptic curves E in the form y^2=x^3-c over the prime field F"p with embedding degree k=1. This was carried out by computing the explicit formula of the number of points #E(F"p) of the elliptic curve y^2=x^3-c. Using this computation, we show that the elliptic curve y^2=x^3-1 over F"p for the primes p of the form 27A^2+1 has an embedding degree k=1. Finally, we give examples of those primes p for which the security level of the pairing-based cryptographic protocols on the curve y^2=x^3-1 over F"p is equivalent to 128-, 192-, or 256-bit AES keys.