A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases
Information and Computation
The implementation of elliptic curve cryptosystems
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
A course in computational algebraic number theory
A course in computational algebraic number theory
Finite fields
Elliptic curves in cryptography
Elliptic curves in cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Supersingular Abelian Varieties in Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Self-Blindable Credential Certificates from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Supersingular Curves in Cryptography
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
IEEE Transactions on Information Theory
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Hardware Implementation of Finite Fields of Characteristic Three
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Secret Handshakes from Pairing-Based Key Agreements
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Secure key issuing in ID-based cryptography
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Role-based cascaded delegation
Proceedings of the ninth ACM symposium on Access control models and technologies
Authenticating tripartite key agreement protocol with pairings
Journal of Computer Science and Technology
The generalized Weil pairing and the discrete logarithm problem on elliptic curves
Theoretical Computer Science - Latin American theorotical informatics
Identity-Based Fault-Tolerant Conference Key Agreement
IEEE Transactions on Dependable and Secure Computing
An abuse-free fair contract signing protocol based on the RSA signature
WWW '05 Proceedings of the 14th international conference on World Wide Web
Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three
IEEE Transactions on Computers
An Identity Based Encryption system
Proceedings of the 3rd international symposium on Principles and practice of programming in Java
Signcryption with Non-interactive Non-repudiation
Designs, Codes and Cryptography
Elliptic Curves Suitable for Pairing Based Cryptography
Designs, Codes and Cryptography
Generating More MNT Elliptic Curves
Designs, Codes and Cryptography
Efficient Computation of Roots in Finite Fields
Designs, Codes and Cryptography
Software implementation of Tate pairing over GF(2m)
Proceedings of the conference on Design, automation and test in Europe: Designers' forum
On the relationship between squared pairings and plain pairings
Information Processing Letters
Improved generalized Atkin algorithm for computing square roots in finite fields
Information Processing Letters
Refinements of Miller's algorithm for computing the Weil/Tate pairing
Journal of Algorithms
Implementation of cryptosystems based on Tate pairing
Journal of Computer Science and Technology
A Fault Attack on Pairing-Based Cryptography
IEEE Transactions on Computers
Providing witness anonymity in peer-to-peer systems
Proceedings of the 13th ACM conference on Computer and communications security
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
Formulas for cube roots in F3m
Discrete Applied Mathematics
Threshold key issuing in identity-based cryptosystems
Computer Standards & Interfaces
Hardware acceleration of the Tate pairing on a genus 2 hyperelliptic curve
Journal of Systems Architecture: the EUROMICRO Journal
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
Hardware architectures for the Tate pairing over GF(2m)
Computers and Electrical Engineering
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
Computers and Electrical Engineering
Efficient and secure protocol in fair document exchange
Computer Standards & Interfaces
Eta pairing computation on general divisors over hyperelliptic curves y2=xp-x+d
Journal of Symbolic Computation
Special polynomial families for generating more suitable pairing-friendly elliptic curves
EHAC'06 Proceedings of the 5th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Computing cryptographic pairing in sensors
ACM SIGBED Review - Special issue on the RTSS forum on deeply embedded real-time computing
A pairing-based authentication scheme for protecting multiple mobile agent hosts
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
A pairing SW implementation for Smart-Cards
Journal of Systems and Software
Privacy preserving set intersection based on bilinear groups
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks
Computer Communications
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
One-Way Signature Chaining: a new paradigm for group cryptosystems
International Journal of Information and Computer Security
Efficient Implementation of Tate Pairing on a Mobile Phone Using Java
Computational Intelligence and Security
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery
Computational Intelligence and Security
Ate Pairing on Hyperelliptic Curves
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A Coprocessor for the Final Exponentiation of the ηTPairing in Characteristic Three
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Highly Regular Right-to-Left Algorithms for Scalar Multiplication
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Arithmetic Operators for Pairing-Based Cryptography
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
A New Direct Anonymous Attestation Scheme from Bilinear Maps
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
An Efficient ID-Based Proxy Signature Scheme from Pairings
Information Security and Cryptology
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Information Security and Cryptology
Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing Computation on Twisted Edwards Form Elliptic Curves
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairings on Hyperelliptic Curves with a Real Model
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field
Journal of Systems Architecture: the EUROMICRO Journal
Compact and Anonymous Role-Based Authorization Chain
ACM Transactions on Information and System Security (TISSEC)
An improved identity-based key agreement protocol and its security proof
Information Sciences: an International Journal
New left-to-right minimal weight signed-digit radix-r representation
Computers and Electrical Engineering
Efficient and Short Certificateless Signature
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Computing pairings using x-coordinates only
Designs, Codes and Cryptography
On the application of pairing based cryptography to wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A Necessary Condition for Gauss Period Normal Bases to Be the Same Normal Basis
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A More Compact Representation of XTR Cryptosystem
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Implementation of the Pairing on Mobilephones Using BREW
IEICE - Transactions on Information and Systems
Ring signature scheme for ECC-based anonymous signcryption
Computer Standards & Interfaces
CCA-Secure Proxy Re-encryption without Pairings
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Secure and Efficient Group Key Agreements for Cluster Based Networks
Transactions on Computational Science IV
Improved Implementations of Cryptosystems Based on Tate Pairing
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A Schnorr-Like Lightweight Identity-Based Signature Scheme
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Efficient and secure protocols for privacy-preserving set operations
ACM Transactions on Information and System Security (TISSEC)
Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Faster Pairings on Special Weierstrass Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Fast Hashing to G2 on Pairing-Friendly Curves
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Faster $\mathbb{F}_p$-Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
ARM: anonymous routing protocol for mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Efficient and generalized pairing computation on Abelian varieties
IEEE Transactions on Information Theory
Identity-based threshold cryptography for electronic voting
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
Securing resource-constrained wireless ad hoc networks
IEEE Wireless Communications
FPGA and ASIC implementations of the ηT pairing in characteristic three
Computers and Electrical Engineering
Identity-Based Authentication for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
An efficient dynamic-identity based signature scheme for secure network coding
Computer Networks: The International Journal of Computer and Telecommunications Networking
Networking aspects for the security of game input
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Improved generalized Atkin algorithm for computing square roots in finite fields
Information Processing Letters
On the relationship between squared pairings and plain pairings
Information Processing Letters
Refinements of Miller's algorithm for computing the Weil/Tate pairing
Journal of Algorithms
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks
IEEE Transactions on Wireless Communications
ID-based key management strategies of clustering wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Identity-based encryption based on DHIES
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Delaying and merging operations in scalar multiplication: applications to curve-based cryptosystems
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Pairing calculation on supersingular genus 2 curves
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Anonymous secure communication in wireless mobile ad-hoc networks
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
Secure signed radix-r recoding methods for constrained-embedded devices
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Some efficient algorithms for the final exponentiation of ηT pairing
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Efficient computations of the Tate pairing for the large MOV degrees
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Constructing elliptic curves with prescribed embedding degrees
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Hardware performance characterization of block cipher structures
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Two efficient and provably secure schemes for server-assisted threshold signatures
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Encapsulated scalar multiplications and line functions in the computation of Tate pairing
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
New left-to-right radix-r signed-digit recoding algorithm for pairing-based cryptosystems
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
An abuse-free fair contract-signing protocol based on the RSA signature
IEEE Transactions on Information Forensics and Security
Reduction optimal trinomials for efficient software implementation of the ηT pairing
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
An hybrid approach for efficient multicast stream authentication over unsecured channels
ProvSec'07 Proceedings of the 1st international conference on Provable security
Construction of a hybrid HIBE protocol secure against adaptive attacks: without random oracle
ProvSec'07 Proceedings of the 1st international conference on Provable security
Optimised versions of the ate and twisted ate pairings
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Universal ηT pairing algorithm over arbitrary extension degree
WISA'07 Proceedings of the 8th international conference on Information security applications
Efficient implementation of the pairing on mobilephones using BREW
WISA'07 Proceedings of the 8th international conference on Information security applications
An efficient countermeasure against side channel attacks for pairing computation
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An analysis of the vector decomposition problem
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
User-friendly grid security architecture and protocols
Proceedings of the 13th international conference on Security protocols
Secure mobile content delivery using dynamic group key agreement with batch verification
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
A flexible processor for the characteristic 3 ηT pairing
International Journal of High Performance Systems Architecture
Computers & Mathematics with Applications
Private key agreement and secure communication for heterogeneous sensor networks
Journal of Parallel and Distributed Computing
IEEE Transactions on Information Theory
How to secure multi-domain wireless mesh networks
Wireless Networks
Efficient bit-parallel multipliers over finite fields GF(2m)
Computers and Electrical Engineering
Identity based threshold cryptography and blind signatures for electronic voting
WSEAS Transactions on Computers
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
New software speed records for cryptographic pairings
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
Efficient cluster-based group key agreement protocols for wireless ad hoc networks
Journal of Network and Computer Applications
Computationally sound analysis of protocols using bilinear pairings
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Constructing tower extensions of finite fields for implementation of pairing-based cryptography
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Delaying mismatched field multiplications in pairing computations
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Network-on-Chip interconnect for pairing-based cryptographic IP cores
Journal of Systems Architecture: the EUROMICRO Journal
Independently verifiable decentralized role-based delegation
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
Identity-based chameleon hash scheme without key exposure
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Efficient and short certificateless signatures secure against realistic adversaries
The Journal of Supercomputing
Computing bilinear pairings on elliptic curves with automorphisms
Designs, Codes and Cryptography
An analysis of affine coordinates for pairing computation
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
High-speed software implementation of the optimal ate pairing over Barreto-Naehrig curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Compact hardware for computing the tate pairing over 128-bit-security supersingular curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
High speed flexible pairing cryptoprocessor on FPGA platform
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Optionally identifiable private handshakes
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Faster and lower memory scalar multiplication on supersingular curves in characteristic three
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Weakness of Shim's new ID-based tripartite multiple-key agreement protocol
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Strongly secure identity-based authenticated key agreement protocols
Computers and Electrical Engineering
A correlation power analysis attack against tate pairing on FPGA
ARC'11 Proceedings of the 7th international conference on Reconfigurable computing: architectures, tools and applications
A family of implementation-friendly BN elliptic curves
Journal of Systems and Software
AOS: an anonymous overlay system for mobile ad hoc networks
Wireless Networks
Faster explicit formulas for computing pairings over ordinary curves
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
A practical (non-interactive) publicly verifiable secret sharing scheme
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Another elliptic curve model for faster pairing computation
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
FPGA implementation of pairings using residue number system and lazy reduction
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Security of prime field pairing cryptoprocessor against differential power attack
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Cryptographic pairings based on elliptic nets
IWSEC'11 Proceedings of the 6th International conference on Advances in information and computer security
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
Extending scalar multiplication using double bases
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
HIBE with short public parameters without random oracle
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Deniable authenticated key establishment for internet protocols
Proceedings of the 11th international conference on Security Protocols
A new signature scheme without random oracles from bilinear pairings
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Side channel analysis of practical pairing implementations: which path is more secure?
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Multi-receiver identity-based key encapsulation with shortened ciphertext
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
ID-Based series-parallel multisignature schemes for multi-messages from bilinear maps
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
An analysis of double base number systems and a sublinear scalar multiplication algorithm
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Security of two-party identity-based key agreement
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Fine grained control of security capability and forward security in a pairing based signature scheme
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
A new method of building more non-supersingular elliptic curves
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Dynamic group key agreement in tree-based setting
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Efficient tate pairing computation for elliptic curves over binary fields
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
ID-based authenticated key agreement for low-power mobile devices
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Faster pairings using an elliptic curve with an efficient endomorphism
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
ID-Based aggregate signatures from bilinear pairings
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Efficient identity-based signatures and blind signatures
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A remark on implementing the weil pairing
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
ID-Based access control and authority delegations
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Fast bilinear maps from the tate-lichtenbaum pairing on hyperelliptic curves
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
A reconfigurable implementation of the tate pairing computation over GF(2m)*
ARC'10 Proceedings of the 6th international conference on Reconfigurable Computing: architectures, Tools and Applications
Java implementation for pairing-based cryptosystems
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Efficient exponentiation in GF(pm) using the Frobenius map
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Cryptosystems based on elliptic curve pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
An efficient and divisible payment scheme for m-commerce
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Public key encryption with conjunctive field keyword search
WISA'04 Proceedings of the 5th international conference on Information Security Applications
A ring signature scheme using bilinear pairings
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Verifiable pairing and its applications
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Secret handshakes from ID-based message recovery signatures: A new generic approach
Computers and Electrical Engineering
A dynamic key infrastructure for GRID
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Hardware acceleration of the tate pairing in characteristic three
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Efficient hardware for the tate pairing calculation in characteristic three
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Tripartite key exchange in the canetti-krawczyk proof model
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
HEAD: hybrid encryption with delegated decryption capability
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
New ID-Based threshold signature scheme from bilinear pairings
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Efficient computation of tate pairing in projective coordinate over general characteristic fields
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Identity based threshold ring signature
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Batch verifications with ID-Based signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A method for efficient parallel computation of Tate pairing
International Journal of Grid and Utility Computing
Achieving efficient conjunctive keyword searches over encrypted data
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Faster squaring in the cyclotomic subgroup of sixth degree extensions
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Faster pairing computations on curves with high-degree twists
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Proof-carrying proxy certificates
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Avoiding full extension field arithmetic in pairing computations
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Generalization of the Selective-ID security model for HIBE protocols
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Security-Mediated certificateless cryptography
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Certificateless public-key signature: security model and efficient construction
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
New constructions of constant size ciphertext HIBE without random oracle
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Authenticated group key agreement for multicast
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Authenticated and communication efficient group key agreement for clustered ad hoc networks
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Efficient ID-Based one-time proxy signature and its application in e-cheque
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
High-speed parallel software implementation of the ηT pairing
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Distributed signcryption from pairings
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
How to solve key escrow and identity revocation in identity-based encryption schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
Provably secure tripartite password protected key exchange protocol based on elliptic curves
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Yet another forward secure signature from bilinear pairings
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Key length estimation of pairing-based cryptosystems using ηT pairing
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Ordinary abelian varieties having small embedding degree
Finite Fields and Their Applications
On the distribution of irreducible trinomials over F3
Finite Fields and Their Applications
Isomorphism classes of elliptic and hyperelliptic curves over finite fields F(2g+1)n
Finite Fields and Their Applications
Algebraic curves and cryptography
Finite Fields and Their Applications
Securing wireless mesh networks in a unified security framework with corruption-resilience
Computer Networks: The International Journal of Computer and Telecommunications Networking
Public key encryption with conjunctive keyword search and its extension to a multi-user system
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Implementing cryptographic pairings
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Implementing cryptographic pairings over barreto-naehrig curves
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Instruction set extensions for pairing-based cryptography
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
The importance of the final exponentiation in pairings when considering fault attacks
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
The tate pairing via elliptic nets
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Eta pairing computation on general divisors over hyperelliptic curves y2 = x7 - x ± 1
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Efficient identity-based signcryption scheme for multiple receivers
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Securing pairing-based cryptography on smartcards
International Journal of Information and Computer Security
Acceleration of composite order bilinear pairing on graphics hardware
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Parallel GF(3m) multiplier for trinomials
Information Processing Letters
Breaking pairing-based cryptosystems using ηT pairing over GF(397)
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
New identity-based three-party authenticated key agreement protocol with provable security
Journal of Network and Computer Applications
On efficient pairings on elliptic curves over extension fields
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
An improved twisted ate pairing over KSS curves with k=18
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Faster pairing coprocessor architecture
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Implementing pairings at the 192-bit security level
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Speeding up ate pairing computation in affine coordinates
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Secure dual-core cryptoprocessor for pairings over Barreto-Naehrig curves on FPGA platform
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Efficient communication scheme with confidentiality and privacy for vehicular networks
Computers and Electrical Engineering
Inverting the final exponentiation of tate pairings on ordinary elliptic curves using faults
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
Mobile Networks and Applications
On the arithmetic operations over finite fields of characteristic three with low complexity
Journal of Computational and Applied Mathematics
Identity-based chameleon hashing and signatures without key exposure
Information Sciences: an International Journal
Formulas for cube roots in F3m using shifted polynomial basis
Information Processing Letters
Hi-index | 0.13 |
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by a factor of about 55 compared to previously known methods in characteristic 3, and attain performance comparable to that of RSA in larger characteristics. We also propose faster algorithms for scalar multiplication in characteristic 3 and square root extraction over Fpm, the latter technique being also useful in contexts other than that of pairing-based cryptography.