11![ECCEfficient and Generalized Pairing Computation on Abelian Varieties Hyang-Sook Lee Ewha Womans University ECCEfficient and Generalized Pairing Computation on Abelian Varieties Hyang-Sook Lee Ewha Womans University](https://www.pdfsearch.io/img/fc64150281226f75fa233edd3df73307.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2008-10-03 22:36:38
|
---|
12![Tate pairing implementation for hyperelliptic curves y 2 = xp − x + d Iwan Duursma1 and Hyang-Sook Lee2 1 ? Tate pairing implementation for hyperelliptic curves y 2 = xp − x + d Iwan Duursma1 and Hyang-Sook Lee2 1 ?](https://www.pdfsearch.io/img/4611fc9b53a65c9542c5431578f618fc.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2007-09-01 21:55:01
|
---|
13![Pairings Elliptic curves Tate pairing Ate pairing Ate Pairing on Hyperelliptic Curves Pairings Elliptic curves Tate pairing Ate pairing Ate Pairing on Hyperelliptic Curves](https://www.pdfsearch.io/img/63b1b263e253f85785d4924f8b60f150.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2007-06-12 08:49:39
|
---|
14![Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther† Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†](https://www.pdfsearch.io/img/2fca5269378f0106729305a43af459c9.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-01-24 04:01:18
|
---|
15![Faster Pairing Computations on Curves with High-Degree Twists Craig Costello1 , Tanja Lange2 , and Michael Naehrig2 1 Information Security Institute Faster Pairing Computations on Curves with High-Degree Twists Craig Costello1 , Tanja Lange2 , and Michael Naehrig2 1 Information Security Institute](https://www.pdfsearch.io/img/d6a69eea9b921736b9f49ab5940ec824.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-06-14 04:16:49
|
---|
16![Comparing Implementation Efficiency of Ordinary and Squared Pairings Christine Abegail Antonio1 , Satoru 2 and Ken Nakamula3 Department of Mathematics, Tokyo Metropolitan University Minami-Osawa, Hachioji-shi Tokyo, Japa Comparing Implementation Efficiency of Ordinary and Squared Pairings Christine Abegail Antonio1 , Satoru 2 and Ken Nakamula3 Department of Mathematics, Tokyo Metropolitan University Minami-Osawa, Hachioji-shi Tokyo, Japa](https://www.pdfsearch.io/img/cf56e81511622c52ab9aa467d1d18e10.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2007-12-07 19:51:10
|
---|
17![Articles Articles on Mathematics Fisher, T., Schaefer, E.F. and Stoll, M. The yoga of the Cassels Tate pairing, LMS J. Comput. Math., 13, 2010, [removed]Kachisa, E.J., Schaefer, E.F. and Scott, M. Constructing Brezing-We Articles Articles on Mathematics Fisher, T., Schaefer, E.F. and Stoll, M. The yoga of the Cassels Tate pairing, LMS J. Comput. Math., 13, 2010, [removed]Kachisa, E.J., Schaefer, E.F. and Scott, M. Constructing Brezing-We](https://www.pdfsearch.io/img/9e22117e6626eabdeece1d2527fa8dbf.jpg) | Add to Reading ListSource URL: math.scu.eduLanguage: English - Date: 2015-01-28 15:07:01
|
---|
18![Constructing Abelian Varieties for Pairing-Based Cryptography Constructing Abelian Varieties for Constructing Abelian Varieties for Pairing-Based Cryptography Constructing Abelian Varieties for](https://www.pdfsearch.io/img/6666d4f91c2cd3e6acb40ee8225145c5.jpg) | Add to Reading ListSource URL: theory.stanford.eduLanguage: English - Date: 2009-05-04 09:49:01
|
---|
19![Abelian Varieties and Pairing-Based Cryptography Theoretical foundations Practical results Pairing-friendly Hyperelliptic Curves and Weil Restriction Abelian Varieties and Pairing-Based Cryptography Theoretical foundations Practical results Pairing-friendly Hyperelliptic Curves and Weil Restriction](https://www.pdfsearch.io/img/17b2998d24f2e422cd17caa4559f2a14.jpg) | Add to Reading ListSource URL: theory.stanford.eduLanguage: English - Date: 2009-09-23 22:25:58
|
---|
20![An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and](https://www.pdfsearch.io/img/41098dafc3b14670b8c85efafd3da5b6.jpg) | Add to Reading ListSource URL: cacr.uwaterloo.caLanguage: English - Date: 2013-10-27 06:53:30
|
---|