2009
DOI: 10.1007/978-3-642-10433-6_28
|View full text |Cite
|
Sign up to set email alerts
|

Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
49
0
1

Year Published

2010
2010
2014
2014

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(50 citation statements)
references
References 22 publications
0
49
0
1
Order By: Relevance
“…The software implementation results of 128-bit secure pairings computed over different elliptic curves are enlisted in Table 6. The most efficient software for computing 128-bit pairings on supersingular elliptic curves over F 2 1223 is proposed in [7]. It takes 3.08ms on eight parallel cores of a core i7 2.8GHz processor.…”
Section: Comparison With Existing Designsmentioning
confidence: 99%
See 1 more Smart Citation
“…The software implementation results of 128-bit secure pairings computed over different elliptic curves are enlisted in Table 6. The most efficient software for computing 128-bit pairings on supersingular elliptic curves over F 2 1223 is proposed in [7]. It takes 3.08ms on eight parallel cores of a core i7 2.8GHz processor.…”
Section: Comparison With Existing Designsmentioning
confidence: 99%
“…However, to the best of our knowledge there is no hardware implementation results available in the literature which computes 128-bit secure pairings below one ms time limit. Highspeed software implementations reported in [6,7] compute 128-bit secure pairings in 0.832ms and 1.87ms. The work proposed by Beuchat et al [5] describes design architectures for η T pairings on supersingular elliptic curves over characteristic two and three fields for a maximum of 105-bit and 109-bit security, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…This paper presents IMAKA-Tate, a light-weight identity protection and mutual authentication using Identity-based Encryption (IBE) method. Particularly, it relies on cryptographic Tate (ƞT) pairing over super singular elliptic curves, ternary field [1]. IMAKATate method is tailored to tackle the specific challenges for security and privacy in the constrained nature of smart RFID.…”
Section: Introductionmentioning
confidence: 99%
“…Investigating the extent of parallelizing eta pairing on GPU platforms is an important area of current research. Although several implementations of eta pairing have already been published in the literature [3,5,11], most of them are CPU-based, and aim at improving the performance of single eta-pairing computations. However, many applications (like authentication in vehicular ad hoc networks) requir e computing large numbers of eta pairings in short intervals.…”
Section: Introductionmentioning
confidence: 99%