
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Junfeng Fan, Frederik Vercauteren, Ingrid Verbauwhede, "Efficient Hardware Implementation of FpArithmetic for PairingFriendly Curves," IEEE Transactions on Computers, vol. 61, no. 5, pp. 676685, May, 2012.  
BibTex  x  
@article{ 10.1109/TC.2011.78, author = {Junfeng Fan and Frederik Vercauteren and Ingrid Verbauwhede}, title = {Efficient Hardware Implementation of FpArithmetic for PairingFriendly Curves}, journal ={IEEE Transactions on Computers}, volume = {61}, number = {5}, issn = {00189340}, year = {2012}, pages = {676685}, doi = {http://doi.ieeecomputersociety.org/10.1109/TC.2011.78}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Computers TI  Efficient Hardware Implementation of FpArithmetic for PairingFriendly Curves IS  5 SN  00189340 SP676 EP685 EPD  676685 A1  Junfeng Fan, A1  Frederik Vercauteren, A1  Ingrid Verbauwhede, PY  2012 KW  Pairingfriendly curves KW  modular reduction. VL  61 JA  IEEE Transactions on Computers ER   
[1] D.F. Aranha, K. Karabina, P. Longa, C.H. Gebotys, and J. López, “Faster Explicit Formulas for Computing Pairings over Ordinary Curves,” Proc. Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt '11), 2011.
[2] D.F. Aranha, J. López, and D. Hankerson, “HighSpeed Parallel Software Implementation of the $\eta_T$ Pairing,” Proc. Cryptographers' Track at RSA Conf. (CTRSA '10), pp. 89105, 2010.
[3] R.M. Avanzi, H. Cohen, C. Doche, G. Frey, T. Lange, K. Nguyen, and F. Vercauteren, Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, 2005.
[4] P.S.L.M. Barreto, H.Y. Kim, B. Lynn, and M. Scott, “Efficient Algorithms for PairingBased Cryptosystems,” CRYPTO '02: Proc. 22nd Ann. Int'l Cryptology Conf. Advances in Cryptology, pp. 354368, 2002.
[5] P. Barrett, “Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor,” Proc. Int'l Cryptology Conf., pp. 311323, 1986.
[6] J.L. Beuchat, J.E. GonzálezDíaz, S. Mitsunari, E. Okamoto, F. RodríguezHenríquez, and T. Teruya, “HighSpeed Software Implementation of the Optimal Ate Pairing over BarretoNaehrig Curves,” Pairing '10: Proc. Fourth Int'l Conf. PairingBased Cryptography, pp. 2139, 2010.
[7] J.L. Beuchat, E. LópezTrejo, L. MartínezRamos, S. Mitsunari, and F. RodríguezHenríquez, “MultiCore Implementation of the Tate Pairing over Supersingular Elliptic Curves,” CANS '09: Proc. Eighth Int'l Conf. Cryptology and Network Security, pp. 413432, 2009.
[8] G.R. Blakley, “A Computer Algorithm for Calculating the Product AB Modulo M,” IEEE Trans. Computers, vol. C32, no. 5, pp. 497500, May 1983.
[9] F. Brezing and A. Weng, “Elliptic Curves Suitable for Pairing Based Cryptography,” Designs, Codes and Cryptography, vol. 37, pp. 133141, 2003.
[10] Ç.K. Koç, T. Acar, and B.S. Kaliski, “Analyzing and Comparing Montgomery Multiplication Algorithms,” IEEE Micro, vol. 16, no. 3, pp. 2633, June 1996.
[11] J. Chung and M.A. Hasan, “LowWeight Polynomial Form Integers for Efficient Modular Multiplication,” IEEE Trans. Computers, vol. 56, no. 1, pp. 4457, Jan. 2007.
[12] J. Chung and M.A. Hasan, “Montgomery Reduction Algorithm for Modular Multiplication Using LowWeight Polynomial Form Integers,” ARITH '07: Proc. 18th IEEE Symp. Computer Arithmetic, pp. 230239, 2007.
[13] A. Devegili, C.Ó' hÉigeartaigh, M. Scott, and R. Dahab, “Multiplication and Squaring on PairingFriendly Fields. Cryptology ePrint Archive, Report 2006/471,” http:/eprint.iacr.org, 2011.
[14] A. Devegili, M. Scott, and R. Dahab, “Implementing Cryptographic Pairings over BarretoNaehrig Curves,” Pairing '07: Proc. Int'l Conf. PairingBased Cryptography, pp. 197207, 2007.
[15] J.F. Dhem, “Design of an Efficient PublicKey Cryptographic Library for RISCBased Smart Cards,” PhD thesis, Université Catholique de Louvain, LouvainlaNeuve, 1998.
[16] N. Estibals, “Compact Hardware for Computing the Tate Pairing over 128BitSecurity Supersingular Curves,” Pairing '10: Proc. Fourth Int'l Conf. PairingBased Cryptography, pp. 397416, 2010.
[17] J. Fan, F. Vercauteren, and I. Verbauwhede, “Faster ${\hbox{\rlap{I}\kern 2.0pt{\hbox{F}}}}_p$ Arithmetic for Cryptographic Pairings on BarretoNaehrig Curves,” Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES '09), pp. 240253, 2009.
[18] D. Freeman, M. Scott, and E. Teske, “A Taxonomy of PairingFriendly Elliptic Curves,” J. Cryptology, vol. 23, no. 2, pp. 224280, 2010.
[19] S. Ghosh, D. Mukhopadhyay, and D.R. Chowdhury, “High Speed Flexible Pairing Cryptoprocessor on FPGA Platform,” Pairing '10: Proc. Fourth Int'l Conf. PairingBased Cryptography, pp. 450466, 2010.
[20] P. Grabher, J. Großschädl, and D. Page, “On Software Parallel Implementation of Cryptographic Pairings,” Proc. Selected Areas in Cryptography, pp. 3449, 2008.
[21] D. Hankerson, A. Menezes, and M. Scott, “Software Implementation of Pairings,” IdentityBased Cryptography, M. Joye and G. Neven, eds., IOS Press 2008.
[22] F. Hess, “Pairing Lattices,” Pairing '08: Proc. Second Int'l Conf. PairingBased Cryptography, pp. 1838, 2008.
[23] F. Hess, N.P. Smart, and F. Vercauteren, “The Eta Pairing Revisited,” IEEE Trans. Information Theory, vol. 52, no. 10, pp. 45954602, Oct. 2006.
[24] D. Kammler, D. Zhang, P. Schwabe, H. Scharwaechter, M. Langenberg, D. Auras, G. Ascheid, R. Leupers, R. Mathar, and H. Meyr, “Designing an ASIP for Cryptographic Pairings over BarretoNaehrig Curves,” Proc. 11th Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '09), pp. 254271, 2009.
[25] A. Karatsuba and Y. Ofman, “Multiplication of Multidigit Numbers on Automata,” Doklady Akademii Nauk SSSR, vol. 145, no. 2, pp. 293294, 1962.
[26] E. Lee, H.S Lee, and C.M. Park, “Efficient and Generalized Pairing Computation on Abelian Varieties,” Cryptology ePrint Archive, Report 2009/040, http:/eprint.iacr.org/, 2011.
[27] V.S. Miller, “Short Programs for Functions on Curves, 1986,” Unpublished Manuscript, http://crypto.stanford.edu/millermiller.pdf , 2011.
[28] V.S. Miller, “The Weil Pairing, and Its Efficient Calculation,” J. Cryptology, vol. 17, no. 4, pp. 235261, 2004.
[29] P.L. Montgomery, “Modular Multiplication without Trial Division,” Math. of Computation, vol. 44, no. 170, pp. 519521, 1985.
[30] P.L. Montgomery, “Five, Six, and SevenTerm KaratsubaLike Formulae,” IEEE Trans. Computers, vol. 54, no. 3, pp. 362369, Mar. 2005.
[31] M. Naehrig, R. Niederhagen, and P. Schwabe, “New Software Speed Records for Cryptographic Pairings,” LATINCRYPT '10: Proc. First Int'l Conf. Progress in Cryptology: Cryptology and Information Security in Latin Am., pp. 109123, 2010.
[32] P.S.L.M. Barreto and M. Naehrig, “PairingFriendly Elliptic Curves of Prime Order,” Proc. Selected Areas in Cryptography (SAC '05), pp. 319331, 2006.
[33] F. Vercauteren, “Optimal Pairings,” IEEE Trans. Information Theory, vol. 56, no. 1, pp. 455461, Jan. 2010.