Exponentiating in Pairing Groups
暂无分享,去创建一个
[1] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[2] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[3] Alfred Menezes,et al. Pairing-Based Cryptography at High Security Levels , 2005, IMACC.
[4] Marc Joye,et al. Efficient Arithmetic on Hessian Curves , 2010, Public Key Cryptography.
[5] H. Edwards. A normal form for elliptic curves , 2007 .
[6] Michael Scott,et al. Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography , 2010, WAIFI.
[7] Jongin Lim,et al. Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms , 2002, EUROCRYPT.
[8] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.
[9] Jens Groth,et al. Short Pairing-Based Non-interactive Zero-Knowledge Arguments , 2010, ASIACRYPT.
[10] Tanja Lange,et al. Faster Pairing Computations on Curves with High-Degree Twists , 2010, Public Key Cryptography.
[11] Paulo S. L. M. Barreto,et al. Constructing Elliptic Curves with Prescribed Embedding Degrees , 2002, SCN.
[12] Tanja Lange,et al. Twisted Hessian Curves , 2015, LATINCRYPT.
[13] Paulo S. L. M. Barreto,et al. Pairing-Friendly Elliptic Curves of Prime Order , 2005, Selected Areas in Cryptography.
[14] Nigel P. Smart,et al. The Hessian Form of an Elliptic Curve , 2001, CHES.
[15] Victor S. Miller,et al. The Weil Pairing, and Its Efficient Calculation , 2004, Journal of Cryptology.
[16] Marc Joye,et al. Hessian Elliptic Curves and Side-Channel Attacks , 2001, CHES.
[17] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[18] Michael Scott,et al. Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field , 2008, Pairing.
[19] Scott A. Vanstone,et al. Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms , 2001, CRYPTO.
[20] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[21] Francisco Rodríguez-Henríquez,et al. Implementing Pairings at the 192-bit Security Level , 2012, IACR Cryptol. ePrint Arch..
[22] Michael Scott,et al. Exponentiation in Pairing-Friendly Groups Using Homomorphisms , 2008, Pairing.
[23] M. Scott,et al. Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves , 2011, Journal of Cryptology.
[24] A. Brauer. On addition chains , 1939 .
[25] Michael Rosen,et al. A classical introduction to modern number theory , 1982, Graduate texts in mathematics.
[26] Koray Karabina. Squaring in cyclotomic subgroups , 2013, Math. Comput..
[27] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[28] Steven D. Galbraith,et al. Mathematics of Public Key Cryptography , 2012 .
[29] Patrick Longa,et al. Four-Dimensional Gallant–Lambert–Vanstone Scalar Multiplication , 2011, Journal of Cryptology.
[30] Tanja Lange,et al. Twisted Edwards Curves , 2008, AFRICACRYPT.
[31] Craig Costello,et al. High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition , 2013, CHES.
[32] Tanja Lange,et al. Analysis and optimization of elliptic-curve single-scalar multiplication , 2007, IACR Cryptol. ePrint Arch..
[33] Michael Hamburg,et al. Fast and compact elliptic-curve cryptography , 2012, IACR Cryptol. ePrint Arch..
[34] M. Naehrig. Constructive and computational aspects of cryptographic pairings , 2009 .
[35] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[36] Ed Dawson,et al. Jacobi Quartic Curves Revisited , 2009, ACISP.
[37] Tanja Lange,et al. Faster Addition and Doubling on Elliptic Curves , 2007, ASIACRYPT.
[38] Patrick Longa,et al. Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves , 2014, CT-RSA.
[39] Frederik Vercauteren,et al. The Eta Pairing Revisited , 2006, IEEE Transactions on Information Theory.
[40] Patrick Longa,et al. Faster Explicit Formulas for Computing Pairings over Ordinary Curves , 2011, EUROCRYPT.
[41] Craig Costello,et al. Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings , 2011, INDOCRYPT.
[42] Michael Scott,et al. Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions , 2009, IACR Cryptol. ePrint Arch..
[43] Marc Joye,et al. The Jacobi Model of an Elliptic Curve and Side-Channel Analysis , 2003, AAECC.
[44] Ed Dawson,et al. New Formulae for Efficient Elliptic Curve Arithmetic , 2007, INDOCRYPT.
[45] Yasuyuki Nogami,et al. Integer Variable chi-Based Ate Pairing , 2008, Pairing.
[46] H. Hisil. Elliptic curves, group law, and efficient computation , 2010 .
[47] Paulo S. L. M. Barreto,et al. A family of implementation-friendly BN elliptic curves , 2011, J. Syst. Softw..
[48] Joseph H. Silverman,et al. The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.
[49] Ed Dawson,et al. Twisted Edwards Curves Revisited , 2008, IACR Cryptol. ePrint Arch..