Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
We assemble and reorganize the recent work in the area of hyperelliptic pairings: We survey the research on constructing hyperelliptic curves suitable for pairing-based cryptography. We also showcase the hyperelliptic pairings proposed to... more
    • by 
    •   4  
      Pairing-based cryptographyTate pairingAte PairingHyperelliptic Curve
We use a combination of metrics to un- derstand, model, and evaluate the impact of Pair Pro- gramming on software development. Pair Program- ming is a core technique in the hot process paradigm of Extreme Programming. At the expense of... more
    • by 
    •   9  
      Software DevelopmentBusiness ValueAte PairingPair Programming
    • by  and +1
    •   4  
      MathematicsCryptographyTate pairingAte Pairing
This paper presents a design-space exploration of an application- specic instruction-set processor (ASIP) for the computation of various crypto- arithmetic in these elds is crucial for fast com- putation of pairings. Moreover, computation... more
    • by  and +1
    •   4  
      Ate PairingDesign Space ExplorationElliptic Curve CryptographyEmbedded System
    • by 
    •   13  
      CryptographyPure MathematicsElliptic curvesTate pairing
Abstract. We assemble and reorganize the recent work in the area of hyperelliptic pairings: We survey the research on constructing hyperelliptic curves suitable for pairing-based cryptography. We also showcase the hyperelliptic pairings... more
    • by 
    •   4  
      Pairing-based cryptographyTate pairingAte PairingHyperelliptic Curve
    • by 
    •   12  
      CryptographyPure MathematicsElliptic curvesTate pairing
In this paper we show an efficient implementation of the Tate, ate and R-ate pairings in magma. This will be demonstrated by using the KSS curves with embedding degree k = 18.
    • by 
    •   4  
      Computer ScienceTate pairingKSS curvesAte Pairing
    • by 
    •   4  
      Pairing-based cryptographyTate pairingAte PairingElliptic Curve Cryptography
    • by 
    •   3  
      Tate pairingKSS curvesAte Pairing
    • by 
    •   6  
      Pairing-based cryptographyAte PairingCryptographic ProtocolsDifferential Power Analysis
    • by 
    •   5  
      Pairing-friendly curvesTate pairingR-ate pairingKSS curves