A note on efficient computation of cube roots in characteristic 3, Cryptology ePrint Archive Report, vol.305, 2004. ,
Efficient pairing computation on supersingular Abelian varieties, Designs, Codes and Cryptography, vol.8, issue.14, 2004. ,
DOI : 10.1007/s10623-006-9033-6
Efficient Algorithms for Pairing-Based Cryptosystems, Advances in Cryptology ? CRYPTO 2002, number 2442 in Lecture Notes in Computer Science, pp.354-368, 2002. ,
DOI : 10.1007/3-540-45708-9_23
Parallel Hardware Architectures for the Cryptographic Tate Pairing, Third International Conference on Information Technology: New Generations (ITNG'06), 2006. ,
DOI : 10.1109/ITNG.2006.107
A coprocessor for the final exponentiation of the ?T pairing in characteristic three, Cryptology ePrint Archive Report, p.45, 2007. ,
An algorithm for the ?T pairing calculation in characteristic three and its hardware implementation, Cryptology ePrint Archive Report, vol.327, 2006. ,
Pairing-based cryptographic protocols: A survey, Cryptology ePrint Archive Report, vol.64, 2004. ,
Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p ??? x + d, Advances in Cryptology ? ASIACRYPT 2003, number 2894 in Lecture Notes in Computer Science, pp.111-123, 2003. ,
DOI : 10.1007/978-3-540-40061-5_7
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves, Math. Comp, vol.62, issue.206, pp.865-874, 1994. ,
Implementing the Tate Pairing, Algorithmic Number Theory ? ANTS V, number 2369 in Lecture Notes in Computer Science, pp.324-337, 2002. ,
DOI : 10.1007/3-540-45455-1_26
Hardware Acceleration of the Tate Pairing in Characteristic Three, Cryptographic Hardware and Embedded Systems ? CHES 2005, number 3659 in Lecture Notes in Computer Science, pp.398-411, 2005. ,
DOI : 10.1007/11545262_29
High Security Pairing-Based Cryptography Revisited, Cryptology ePrint Archive Report, p.59, 2006. ,
DOI : 10.1007/11792086_34
Itoh-Tsujii inversion in standard basis and its application in cryptography and codes. Designs, Codes and Cryptography, pp.207-216, 2002. ,
A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases, Information and Computation, vol.78, issue.3, pp.171-177, 1988. ,
DOI : 10.1016/0890-5401(88)90024-7
A One Round Protocol for Tripartite Diffie-Hellman, Algorithmic Number Theory Symposium, ANTS-IV, number 1838 in Lecture Notes in Computer Science, pp.385-394, 2000. ,
Efficient Hardware for the Tate Pairing Calculation in Characteristic Three, Cryptographic Hardware and Embedded Systems ? CHES 2005, number 3659 in Lecture Notes in Computer Science, pp.412-426, 2005. ,
DOI : 10.1007/11545262_30
Algorithms and Architectures for Use in FPGA Implementations of Identity Based Encryption Schemes, Programmable Logic and Applications, number 3203 in Lecture Notes in Computer Science, pp.74-83, 2004. ,
DOI : 10.1007/978-3-540-30117-2_10
Pairing-Based Cryptography at High Security Levels, Cryptography and Coding, number 3796 in Lecture Notes in Computer Science, pp.13-36, 2005. ,
DOI : 10.1007/11586821_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9402
Efficient Tate pairing computation for supersingular elliptic curves over binary fields, Cryptology ePrint Archive Report, vol.303, 2004. ,
Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Transactions on Information Theory, vol.39, issue.5, pp.1639-1646, 1993. ,
DOI : 10.1109/18.259647
Cryptographic Algorithms on Reconfigurable Hardware, 2006. ,
Some efficient algorithms for the final exponentiation of ?T pairing, Cryptology ePrint Archive Report, vol.431, 2006. ,
FPGA accelerated tate pairing based cryptosystems over binary fields, 2006 IEEE International Conference on Field Programmable Technology, 2006. ,
DOI : 10.1109/FPT.2006.270309
The Arithmetic of Elliptic Curves. Number 106 in Graduate Texts in Mathematics, 1986. ,
Low energy digit-serial/parallel finite field multipliers, The Journal of VLSI Signal Processing, vol.19, issue.2, pp.149-166, 1998. ,
DOI : 10.1023/A:1008013818413
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems, Journal of Cryptology, vol.17, issue.4, pp.277-296, 2004. ,