Sciweavers

173 search results - page 23 / 35
» Overview of Elliptic Curve Cryptography
Sort
View
WAIFI
2010
Springer
194views Mathematics» more  WAIFI 2010»
14 years 2 months ago
Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography
A cryptographic pairing evaluates as an element of a finite extension field, and the evaluation itself involves a considerable amount of extension field arithmetic. It is recogn...
Naomi Benger, Michael Scott
IJNSEC
2010
152views more  IJNSEC 2010»
13 years 4 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
PKC
2010
Springer
162views Cryptology» more  PKC 2010»
14 years 1 months ago
Faster Pairing Computations on Curves with High-Degree Twists
Research on efficient pairing implementation has focussed on reducing the loop length and on using high-degree twists. Existence of twists of degree larger than 2 is a very restric...
Craig Costello, Tanja Lange, Michael Naehrig
ICISC
2004
99views Cryptology» more  ICISC 2004»
13 years 11 months ago
Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation
Abstract. This paper extends results concerning efficient exponentiation in groups where inversion is easy (e.g. in elliptic curve cryptography). It examines the right-to-left and ...
Bodo Möller
CHES
2005
Springer
111views Cryptology» more  CHES 2005»
14 years 3 months ago
Hardware Acceleration of the Tate Pairing in Characteristic Three
Although identity based cryptography offers many functional advantages over conventional public key alternatives, the computational costs are significantly greater. The core comp...
Philipp Grabher, Dan Page