2007
DOI: 10.1007/978-3-540-74735-2_17
|View full text |Cite
|
Sign up to set email alerts
|

Arithmetic Operators for Pairing-Based Cryptography

Abstract: Abstract. Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of protocols. Software implementations being rather slow, the study of hardware architectures became an active research area. In this paper, we first study an accelerator for the ηT pairing over F3 [x]/(x 97 + x 12 + 2). Our architecture is based on a unified arithmetic operator which performs addition, multiplication, and cubing over F 3 97 . This de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
9

Year Published

2008
2008
2014
2014

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(23 citation statements)
references
References 31 publications
(59 reference statements)
0
14
0
9
Order By: Relevance
“…Finally, we explored the trade-offs involved in the hardware implementation of the modified Tate pairing for both characteristic two and three. Our architectures are based on the unified arithmetic operator introduced in [3], and achieve a better area-time trade-off compared to previously published solutions [10,15,17,19,20,[28][29][30]33].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, we explored the trade-offs involved in the hardware implementation of the modified Tate pairing for both characteristic two and three. Our architectures are based on the unified arithmetic operator introduced in [3], and achieve a better area-time trade-off compared to previously published solutions [10,15,17,19,20,[28][29][30]33].…”
Section: Resultsmentioning
confidence: 99%
“…However, supplementing a pairing coprocessor with dedicated hardware for the EEA is not the most appropriate solution. Computing the inverse of a ∈ F 2 m by means of multiplications and squarings over F 2 m according to Fermat's little theorem and Itoh and Tsujii's work [14] allows one to keep the circuit area as small as possible without impacting too severely on the performances [3]. Since…”
Section: Overall Cost Evaluationsmentioning
confidence: 99%
“…We define the bilinear pairing takes the form e : EðIF p m Þ Â EðIF p km Þ ! IF Ã p km (the definition given here is from [17], [18]), where p is a prime, m is a positive integer, and k is the embedding degree (or security multiplier). In this case, we utilize an asymmetric pairing e : G G 1 Â G G 2 !…”
Section: Performance Analysis For Cpdp Schemementioning
confidence: 99%
“…After the modular reductions, the D partial products and the accumulator have added thanks to a binary tree of adders over Fpm [5], [6], [7]. Consequently, to optimize the critical path of this multi-operand adder, one should choose a parameter D of the form 2n − 1 (typically D = 3, 7, 15 or 31).…”
Section: Table 22 Multiplication Frobenius Map Over Fpmmentioning
confidence: 99%