A comparison between hardware accelerators for the modified Tate pairing over and

JL Beuchat, N Brisebarre, J Detrey, E Okamoto… - … Conference on Pairing …, 2008 - Springer
In this article we propose a study of the modified Tate pairing in characteristics two and
three. Starting from the η T pairing introduced by Barreto et al.[1], we detail various …

Efficient algorithms for Tate pairing

T Kobayashi, K Aoki, H Imai - IEICE Transactions on Fundamentals …, 2006 - search.ieice.org
This paper presents new algorithms for the Tate pairing on a prime field. Recently, many
pairing-based cryptographic schemes have been proposed. However, computing pairings …

A FPGA coprocessor for the cryptographic Tate pairing over Fp

A Barenghi, G Bertoni, L Breveglieri… - … : New Generations (itng …, 2008 - ieeexplore.ieee.org
Identity based cryptography offers a number of functional advantages over traditional public
key cryptosystems and has attracted much research interest in the last few years. The …

Hardware acceleration of the Tate pairing on a genus 2 hyperelliptic curve

R Ronan, C Murphy, M Scott, T Kerins - Journal of Systems Architecture, 2007 - Elsevier
Many novel and interesting cryptographic protocols have recently been designed with
bilinear pairings comprising their main calculation. The ηT method for pairing calculation is …

Efficient Algorithms for Tate Pairing

K Tetsutaro, A Kazumaro, I Hideki - IEICE transactions on fundamentals …, 2006 - cir.nii.ac.jp
抄録 This paper presents new algorithms for the Tate pairing on a prime field. Recently,
many pairing-based cryptographic schemes have been proposed. However, computing …

A method for efficient parallel computation of Tate pairing

Z Su, C Sun, H Li, J Ma - International Journal of Grid and …, 2012 - inderscienceonline.com
The calculation of pairing plays a key role in pairing-based cryptography. Usually, the
calculation is based on Miller's algorithm. However, most of the optimisations of Miller's …

Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three

R Granger, D Page, M Stam - IEEE Transactions on Computers, 2005 - ieeexplore.ieee.org
Although identity-based cryptography offers a number of functional advantages over
conventional public key methods, the computational costs are significantly greater. The …

Computing the Tate pairing

M Scott - Cryptographers' Track at the RSA Conference, 2005 - Springer
We describe, in detail sufficient for easy implementation, a fast method for calculation of the
Tate pairing, as required for pairing-based cryptographic protocols. We point out various …

Parallel hardware architectures for the cryptographic Tate pairing

G Bertoni, L Breveglieri, P Fragneto… - … New Generations (ITNG …, 2006 - ieeexplore.ieee.org
Identity-based cryptography uses pairing functions, which are sophisticated bilinear maps
defined on elliptic curves. Computing pairings efficiently in software is presently a relevant …

[PDF][PDF] Implementing pairing-based cryptosystems

Z Cheng, M Nistazakis - Proceedings of IWWST, 2005 - academia.edu
Pairing-based cryptosystems have been developing very fast in the last few years. As the
key primitive, pairing is also the heaviest operation in these systems. The performance of …