2002
DOI: 10.1007/3-540-45455-1_26
|View full text |Cite
|
Sign up to set email alerts
|

Implementing the Tate Pairing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
214
0

Year Published

2003
2003
2018
2018

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 380 publications
(221 citation statements)
references
References 13 publications
0
214
0
Order By: Relevance
“…To our knowledge, [29] is the first work that describes GF (3 m ) architectures for applications of cryptographic significance, thus we describe it in some detail. The authors describe a representation similar to the one used by [10] to represent their polynomials. They combine all the least significant bits of the coefficients of an element, say A, into one value and all the most significant bits of the coefficients of A into a second value (notice the coefficients of A are elements of GF (3) and thus 2 bits are needed to represent each of them).…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…To our knowledge, [29] is the first work that describes GF (3 m ) architectures for applications of cryptographic significance, thus we describe it in some detail. The authors describe a representation similar to the one used by [10] to represent their polynomials. They combine all the least significant bits of the coefficients of an element, say A, into one value and all the most significant bits of the coefficients of A into a second value (notice the coefficients of A are elements of GF (3) and thus 2 bits are needed to represent each of them).…”
Section: Related Workmentioning
confidence: 99%
“…Three implementation were developed which support the fields GF (3 97 ), GF (2 151 ), and GF (2 241 ). The fields GF (3 97 ) and GF (2 241 ) are used in Weil and Tate pairing schemes for systems with comparable degrees of security (see [10,5,29]). The field GF (2 151 ) offers security comparable to that of GF (3 97 ) for cryptosystems based on the EC discrete logarithm problem.…”
Section: Irreducible Polynomials Over Gf (3)mentioning
confidence: 99%
See 2 more Smart Citations
“…In this case, the verifying process remains just two pairing computations. Although pairing computation is expensive, there are many improvements in implementation of the pairings as in [4,12]. Utilizing those good implementations, our scheme can be efficient in performance.…”
Section: Discussionmentioning
confidence: 99%