{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:12:50Z","timestamp":1725491570160},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540734888"},{"type":"electronic","value":"9783540734895"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73489-5_11","type":"book-chapter","created":{"date-parts":[[2007,9,11]],"date-time":"2007-09-11T08:58:06Z","timestamp":1189501086000},"page":"208-224","source":"Crossref","is-referenced-by-count":7,"title":["Instruction Set Extensions for Pairing-Based Cryptography"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Vejda","sequence":"first","affiliation":[]},{"given":"Dan","family":"Page","sequence":"additional","affiliation":[]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Ahmadi, O., Hankerson, D., Menezes, A.: Formulas for Cube Roots in F3 m . Available at: http:\/\/www.cacr.math.uwaterloo.ca\/ajmeneze\/publications\/cuberoots.pdf"},{"key":"11_CR2","first-page":"226","volume-title":"Application-Specific Systems, Architectures and Processors (ASAP)","author":"L.-S. Au","year":"2003","unstructured":"Au, L.-S., Burgess, N.: Unified Radix-4 Multiplier for GF(p) and GF(2 n ). In: Application-Specific Systems, Architectures and Processors (ASAP), pp. 226\u2013236. IEEE Press, Los Alamitos (2003)"},{"key":"11_CR3","unstructured":"Austrin, P.: Efficient Arithmetic in Finite Fields of Small, Odd Characteristic. MSc Thesis, Royal Institute of Technology, Stockholm (2004)"},{"issue":"9","key":"11_CR4","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1109\/TEC.1961.5219227","volume":"10","author":"A. Avizienis","year":"1961","unstructured":"Avizienis, A.: Signed-Digit Number Representations for Fast Parallel Arithmetic. IRE Transactions on Electronic Computers\u00a010(9), 389\u2013400 (1961)","journal-title":"IRE Transactions on Electronic Computers"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1006\/jpdc.1994.1093","volume":"22","author":"J.-C. Bajard","year":"1994","unstructured":"Bajard, J.-C., Duprat, J., Kla, S., Muller, J.-M.: Some Operators for On-Line Radix-2 Computations. Journal of Parallel and Distributed Computing\u00a022(2), 336\u2013345 (1994)","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"11_CR6","unstructured":"Barreto, P.S.L.M., Galbraith, S., \u00d3h\u00c9igeartaigh, C., Scott, M.: Efficient Pairing Computation on Supersingular Abelian Varieties. In: Cryptology ePrint Archive, Report 2004\/375 (2004)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P.S.L.M. Barreto","year":"2002","unstructured":"Barreto, P.S.L.M., Kim, H., Lynn, B., Scott, M.: Efficient Algorithms for Pairing-Based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 354\u2013368. Springer, Heidelberg (2002)"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/ITNG.2006.107","volume-title":"Information Technology: New Generations (ITNG)","author":"G. Bertoni","year":"2006","unstructured":"Bertoni, G., Breveglieri, L., Fragneto, P., Pelosi, G.: Parallel Hardware Architectures for the Cryptographic Tate Pairing. In: Information Technology: New Generations (ITNG), pp. 186\u2013191. IEEE Press, Los Alamitos (2006)"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-36563-X_11","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Guajardo, J., Kumar, S., Orlando, G., Paar, C., Wollinger, T.: Efficient GF(p m ) Arithmetic Architectures for Cryptographic Applications. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 158\u2013175. Springer, Heidelberg (2003)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Beuchat, J.-L., Shirase, M., Takagi, T., Okamoto, E.: An Algorithm for the \u03b7 T Pairing Calculation in Characteristic Three and its Hardware Implementation. In: Cryptology ePrint Archive, Report 2006\/327 (2006)","DOI":"10.1109\/ARITH.2007.10"},{"issue":"4","key":"11_CR11","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1147\/sj.294.0526","volume":"29","author":"P.G. Comba","year":"1990","unstructured":"Comba, P.G.: Exponentiation cryptosystems on the IBM PC. IBM Systems Journal\u00a029(4), 526\u2013538 (1990)","journal-title":"IBM Systems Journal"},{"key":"11_CR12","unstructured":"Dutta, R., Barua, R., Sarkar, P.: Pairing-Based Cryptographic Protocols: A Survey. In: Cryptology ePrint Archive, Report 2004\/064 (2004)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-40061-5_7","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"I. Duursma","year":"2003","unstructured":"Duursma, I., Lee, H.: Tate Pairing Implementation for Hyperelliptic Curves y 2\u2009=\u2009x p \u2009\u2212\u2009x\u2009+\u2009d. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 111\u2013123. Springer, Heidelberg (2003)"},{"key":"11_CR14","unstructured":"Fong, K., Hankerson, D., L\u00f3pez, J., Menezes, A.: Field Inversion and Point Halving Revisited. Technical Report CORR 2003-18, University of Waterloo (2003)"},{"key":"11_CR15","unstructured":"Gaisler, J.: The LEON-2 Processor User\u2019s Manual (Version 1.0.30) (July 2005), Available for download at http:\/\/www.gaisler.com"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45455-1_26","volume-title":"Algorithmic Number Theory (ANTS-V)","author":"S. Galbraith","year":"2002","unstructured":"Galbraith, S., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) Algorithmic Number Theory (ANTS-V). LNCS, vol.\u00a02369, pp. 324\u2013337. Springer, Heidelberg (2002)"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/11545262_29","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"P. Grabher","year":"2005","unstructured":"Grabher, P., Page, D.: Hardware Acceleration of the Tate Pairing in Characteristic Three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 398\u2013411. Springer, Heidelberg (2005)"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/11792086_34","volume-title":"Algorithmic Number Theory (ANTS-VII)","author":"R. Granger","year":"2006","unstructured":"Granger, R., Page, D., Smart, N.P.: High Security Pairing-Based Cryptography Revisited. In: Hess, F., Pauli, S., Pohst, M. (eds.) Algorithmic Number Theory (ANTS-VII). LNCS, vol.\u00a04076, pp. 480\u2013494. Springer, Heidelberg (2006)"},{"issue":"7","key":"11_CR19","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/TC.2005.120","volume":"54","author":"R. Granger","year":"2005","unstructured":"Granger, R., Page, D., Stam, M.: Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three. IEEE Transactions on Computers\u00a054(7), 852\u2013860 (2005)","journal-title":"IEEE Transactions on Computers"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/3-540-44709-1_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"J. Gro\u00dfsch\u00e4dl","year":"2001","unstructured":"Gro\u00dfsch\u00e4dl, J.: A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2 m ). In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 202\u2013218. Springer, Heidelberg (2001)"},{"key":"11_CR21","first-page":"111","volume-title":"Application-Specific Systems, Architectures and Processors (ASAP)","author":"J. Gro\u00dfsch\u00e4dl","year":"2004","unstructured":"Gro\u00dfsch\u00e4dl, J., Kumar, S., Paar, C.: Architectural Support for Arithmetic in Optimal Extension Fields. In: Application-Specific Systems, Architectures and Processors (ASAP), pp. 111\u2013124. IEEE Press, Los Alamitos (2004)"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-540-28632-5_10","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J. Gro\u00dfsch\u00e4dl","year":"2004","unstructured":"Gro\u00dfsch\u00e4dl, J., Sava\u015f, E.: Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m ). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 133\u2013147. Springer, Heidelberg (2004)"},{"key":"11_CR23","unstructured":"Gro\u00dfsch\u00e4dl, J., Tillich, S., Szekely, A.: Cryptography Instruction Set Extensions to the SPARC\u00a0V8 Architecture. Preprint (submitted for publication, 2007)"},{"key":"11_CR24","volume-title":"Guide to Elliptic Curve Cryptography","author":"D.R. Hankerson","year":"2004","unstructured":"Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"issue":"1","key":"11_CR25","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1112\/S1461157000000747","volume":"5","author":"K. Harrison","year":"2002","unstructured":"Harrison, K., Page, D., Smart, N.P.: Software Implementation of Finite Fields of Characteristic Three, for use in Pairing Based Cryptosystems. LMS Journal of Computation and Mathematics\u00a05(1), 181\u2013193 (2002)","journal-title":"LMS Journal of Computation and Mathematics"},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"4595","DOI":"10.1109\/TIT.2006.881709","volume":"52","author":"F. Hess","year":"2006","unstructured":"Hess, F., Smart, N.P., Vercauteren, F.: The Eta Pairing Revisited. Transactions on Information Theory\u00a052, 4595\u20134602 (2006)","journal-title":"Transactions on Information Theory"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/11545262_30","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"T. Kerins","year":"2005","unstructured":"Kerins, T., Marnane, W.P., Popovici, E.M., Barreto, P.S.L.M.: Efficient Hardware for the Tate Pairing Calculation in Characteristic Three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 412\u2013426. Springer, Heidelberg (2005)"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/978-3-540-30117-2_10","volume-title":"Field Programmable Logic and Application","author":"T. Kerins","year":"2004","unstructured":"Kerins, T., Popovici, E., Marnane, W.P.: Algorithms and Architectures for Use in FPGA Implementations of Identity Based Encryption Schemes. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol.\u00a03203, pp. 74\u201383. Springer, Heidelberg (2004)"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1007\/978-3-540-30117-2_60","volume-title":"Field Programmable Logic and Application","author":"S. Kumar","year":"2004","unstructured":"Kumar, S., Paar, C.: Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol.\u00a03203, pp. 586\u2013595. Springer, Heidelberg (2004)"},{"key":"11_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/11506157_12","volume-title":"Information Security and Privacy","author":"S. Kwon","year":"2005","unstructured":"Kwon, S.: Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 134\u2013145. Springer, Heidelberg (2005)"},{"key":"11_CR31","unstructured":"Miller, V.: Short programs for functions on curves. Available at: http:\/\/crypto.stanford.edu\/miller\/miller.pdf"},{"issue":"170","key":"11_CR32","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Mathematics of Computation\u00a044(170), 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"11_CR33","unstructured":"\u00d6zt\u00fcrk, E., Savas, E., Sunar, B.: A Versatile Montgomery Multiplier Architecture with Characteristic Three Support. Available at: http:\/\/ece.wpi.edu\/~sunar\/preprints\/versatile.pdf"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/3-540-36400-5_38","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D. Page","year":"2003","unstructured":"Page, D., Smart, N.P.: Hardware Implementation of Finite Fields of Characteristic Three. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 529\u2013539. Springer, Heidelberg (2003)"},{"key":"11_CR35","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/ITNG.2006.29","volume-title":"Information Technology: New Generations (ITNG)","author":"R. Ronan","year":"2006","unstructured":"Ronan, R., \u00d3h\u00c9igeartaigh, C., Murphy, C., Scott, M., Kerins, T., Marnane, W.P.: An Embedded Processor for a Pairing-Based Cryptosystem. In: Information Technology: New Generations (ITNG), pp. 192\u2013197. IEEE Press, Los Alamitos (2006)"},{"key":"11_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/3-540-44499-8_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"E. Savas","year":"2000","unstructured":"Savas, E., Tenca, A.F., Ko\u00e7, \u00c7.K.: A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2 m ). In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 277\u2013295. Springer, Heidelberg (2000)"},{"key":"11_CR37","unstructured":"Scott, M.: Implementing Cryptographic Pairings, Available at: ftp:\/\/ftp.computing.dcu.ie\/pub\/resources\/crypto\/pairings.pdf"},{"key":"11_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/11894063_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"M. Scott","year":"2006","unstructured":"Scott, M., Costigan, N., Abdulwahab, W.: Implementing Cryptographic Pairings on Smartcards. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 134\u2013147. Springer, Heidelberg (2006)"},{"issue":"7","key":"11_CR39","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1109\/12.256444","volume":"41","author":"N. Takagi","year":"1992","unstructured":"Takagi, N., Yajima, S.: Modular Multiplication Hardware Algorithms with a Redundant Representation and their Application to RSA Cryptosystem. IEEE Transactions on Computers\u00a041(7), 887\u2013891 (1992)","journal-title":"IEEE Transactions on Computers"},{"issue":"8","key":"11_CR40","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1109\/12.156537","volume":"41","author":"N. Takagi","year":"1992","unstructured":"Takagi, N.: A Radix-4 Modular Multiplication Hardware Algorithm for Modular Exponentiation. IEEE Transactions on Computers\u00a041(8), 949\u2013956 (1992)","journal-title":"IEEE Transactions on Computers"},{"key":"11_CR41","unstructured":"Shirase, M., Takagi, T., Okamoto, E.: Some Efficient Algorithms for the Final Exponentiation of \u03b7 T Pairing. In: Cryptology ePrint Archive, Report 2006\/431 (2006)"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Shu, C., Kwon, S., Gaj, K.: FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields. In: Cryptology ePrint Archive, Report 2006\/179 (2006)","DOI":"10.1109\/FPT.2006.270309"},{"key":"11_CR43","unstructured":"SPARC International, Inc. The SPARC Architecture Manual Version\u00a08 (August 1993), Available for download at http:\/\/www.sparc.org\/standards\/V8.pdf"}],"container-title":["Lecture Notes in Computer Science","Pairing-Based Cryptography \u2013 Pairing 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73489-5_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:14:14Z","timestamp":1619518454000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73489-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540734888","9783540734895"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73489-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}