Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three
暂无分享,去创建一个
Eiji Okamoto | Kazutaka Saito | Yuto Kawahara | Naoki Kanayama | Tadanori Teruya | Tetsutaro Kobayashi | Tetsutaro Kobayashi | E. Okamoto | Naoki Kanayama | Tadanori Teruya | Yuto Kawahara | Kazutaka Saito
[1] A. Miyaji,et al. Pairing-Based Cryptography - Pairing 2010 , 2011 .
[2] Eiji Okamoto,et al. A Note on the Pairing Computation Using Normalized Miller Functions , 2012, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] Frederik Vercauteren,et al. Optimal Pairings , 2010, IEEE Transactions on Information Theory.
[5] Sanjit Chatterjee,et al. Comparing two pairing-based aggregate signature schemes , 2010, Des. Codes Cryptogr..
[6] Leonard M. Adleman,et al. The function field sieve , 1994, ANTS.
[7] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[8] Hyang-Sook Lee,et al. Efficient and Generalized Pairing Computation on Abelian Varieties , 2009, IEEE Transactions on Information Theory.
[9] Frederik Vercauteren,et al. The Eta Pairing Revisited , 2006, IEEE Transactions on Information Theory.
[10] Francisco Rodríguez-Henríquez,et al. High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves , 2010, Pairing.
[11] Koh-ichi Nagao,et al. Improvement of ThéLeriault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus , 2004, IACR Cryptol. ePrint Arch..
[12] Tsuyoshi Takagi,et al. Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397) , 2012, ASIACRYPT.
[13] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[14] Changan Zhao,et al. Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9 , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[15] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[16] Paulo S. L. M. Barreto,et al. Efficient pairing computation on supersingular Abelian varieties , 2007, IACR Cryptol. ePrint Arch..
[17] Victor S. Miller,et al. The Weil Pairing, and Its Efficient Calculation , 2004, Journal of Cryptology.
[18] Don Coppersmith,et al. Discrete logarithms inGF(p) , 2005, Algorithmica.
[19] Michael Scott,et al. A Taxonomy of Pairing-Friendly Elliptic Curves , 2010, Journal of Cryptology.
[20] Jinhui Chao,et al. Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions , 2005, IACR Cryptol. ePrint Arch..
[21] Martijn Stam,et al. Understanding Adaptivity: Random Systems Revisited , 2012, ASIACRYPT.
[22] Eric R. Verheul,et al. Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems , 2001, Journal of Cryptology.
[23] Antoine Joux,et al. The Special Number Field Sieve in 𝔽pn - Application to Pairing-Friendly Constructions , 2013, Pairing.
[24] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[25] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[26] Francisco Rodríguez-Henríquez,et al. Weakness of 𝔽36·509 for Discrete Logarithm Cryptography , 2013, Pairing.
[27] Jiwu Huang,et al. A note on the Ate pairing , 2008, International Journal of Information Security.
[28] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[29] Antoine Joux,et al. The Special Number Field Sieve in $\mathbb{F}_{p^{n}}$ , 2013 .
[30] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[31] Scott A. Vanstone,et al. Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms , 2001, CRYPTO.
[32] Nicolas Thériault,et al. A double large prime variation for small genus hyperelliptic index calculus , 2004, Math. Comput..
[33] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[34] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.