{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:39:47Z","timestamp":1742398787962},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540465591"},{"type":"electronic","value":"9783540465614"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11894063_11","type":"book-chapter","created":{"date-parts":[[2006,10,16]],"date-time":"2006-10-16T17:49:01Z","timestamp":1161020941000},"page":"134-147","source":"Crossref","is-referenced-by-count":88,"title":["Implementing Cryptographic Pairings on Smartcards"],"prefix":"10.1007","author":[{"given":"Michael","family":"Scott","sequence":"first","affiliation":[]},{"given":"Neil","family":"Costigan","sequence":"additional","affiliation":[]},{"given":"Wesam","family":"Abdulwahab","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"http:\/\/www.mips.com\/content\/Products\/Architecture\/SmartMIPSASE\/ProductCatalog\/P_SmartMIPSASE\/productBrief"},{"key":"11_CR2","unstructured":"Barreto, P.S.L.M.: The pairing-based crypto lounge, \n                    \n                      http:\/\/paginas.terra.com.br\/informatica\/paulobarreto\/pblounge.html"},{"key":"11_CR3","unstructured":"Barreto, P.S.L.M., Galbraith, S., O\u2019hEigeartaigh, C., Scott, M.: Efficient pairing computation on supersingular abelian varietie. Cryptology ePrint Archive, Report 2004\/375 (2004), \n                    \n                      http:\/\/eprint.iacr.org\/2004\/375"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P.S.L.M. Barreto","year":"2002","unstructured":"Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 354\u2013368. Springer, Heidelberg (2002)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-36413-7_19","volume-title":"Security in Communication Networks","author":"P.S.L.M. Barreto","year":"2003","unstructured":"Barreto, P.S.L.M., Lynn, B., Scott, M.: Constructing elliptic curves with prescribed embedding degrees. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol.\u00a02576, pp. 257\u2013267. Springer, Heidelberg (2003)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-24654-1_2","volume-title":"Selected Areas in Cryptography","author":"P.S.L.M. Barreto","year":"2004","unstructured":"Barreto, P.S.L.M., Lynn, B., Scott, M.: On the selection of pairing-friendly groups. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 17\u201325. Springer, Heidelberg (2004)"},{"key":"11_CR7","unstructured":"Barreto, P.S.L.M., Naehrig, M.: Pairing-friendly elliptic curves of prime order. Cryptology ePrint Archive, Report 2005\/133 (2005), \n                    \n                      http:\/\/eprint.iacr.org\/2005\/133"},{"key":"11_CR8","unstructured":"Bertoni, G.M., Chen, L., Fragneto, P., Harrison, K.A., Pelosi, G.: Computing tate pairing on smartcards (2005), \n                    \n                      http:\/\/www.st.com\/stonline\/products\/families\/smartcard\/ches2005_v4.pdf"},{"volume-title":"Advances in Elliptic Curve Cryptography","year":"2005","key":"11_CR9","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P. (eds.): Advances in Elliptic Curve Cryptography, vol.\u00a02. Cambridge University Press, Cambridge (2005)"},{"issue":"3","key":"11_CR10","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM Journal of Computing\u00a032(3), 586\u2013615 (2003)","journal-title":"SIAM Journal of Computing"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"11_CR12","unstructured":"Chen, L., Cheng, Z.: Security proof of Sakai-Kasahara\u2019s identity-based encryption scheme (2005), \n                    \n                      http:\/\/eprint.iacr.org\/2005\/226"},{"key":"11_CR13","unstructured":"Chevallier-Mames, B., Coron, J.-S., McCullagh, N., Naccache, D., Scott, M.: Secure delegation of elliptic-curve pairing (2005), \n                    \n                      http:\/\/eprint.iacr.org\/2005\/150"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TIT.1984.1056941","volume":"30","author":"D. Coppersmith","year":"1984","unstructured":"Coppersmith, D.: Fast evaluation of logarithms in fields of characteristics two. IEEE Transactions on Information Theory\u00a030, 587\u2013594 (1984)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-40061-5_7","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"I. Duursma","year":"2003","unstructured":"Duursma, I., Lee, H.-S.: Tate pairing implementation for hyperelliptic curves y\n                  2\u2009=\u2009x\n                  \n                    p\n                  \u2009\u2212\u2009x\u2009+\u2009d. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 111\u2013123. Springer, Heidelberg (2003)"},{"issue":"5","key":"11_CR16","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/18.771254","volume":"45","author":"G. Frey","year":"1999","unstructured":"Frey, G., M\u00fcller, M., R\u00fcck, H.: The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Transactions on Information Theory\u00a045(5), 1717\u20131719 (1999)","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR17","unstructured":"Gemplus. ID based Cryptography and Smartcards (2005), \n                    \n                      http:\/\/www.gemplus.com\/smart\/rd\/publications\/pdf\/Joy05iden.pdf"},{"key":"11_CR18","unstructured":"Granger, R., Page, D., Stam, M.: Hardware and software normal basis arithmetic for pairing based cryptography in characteristic three. Cryptology ePrint Archive, Report2004\/157 (2004), \n                    \n                      http:\/\/eprint.iacr.org\/2004\/157"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-28632-5_10","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J. Gro\u00dfsch\u00e4dl","year":"2004","unstructured":"Gro\u00dfsch\u00e4dl, J., Savas, E.: Instruction set extensions for fast arithmetic in finite fields GF(p) and GF(2\n                    \n                      \n                    \n                    $^{\\mbox{m}}$\n                  ). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 133\u2013147. Springer, Heidelberg (2004)"},{"key":"11_CR20","volume-title":"Computer Architecture - a Qualitative Approach","author":"J. Hennessy","year":"2003","unstructured":"Hennessy, J., Patterson, D.: Computer Architecture - a Qualitative Approach, 3rd edn. Morgan Kaufmann, San Francisco (2003)","edition":"3"},{"key":"11_CR21","unstructured":"Hess, F., Smart, N., Vercauteren, F.: The eta pairing revisited. Cryptology ePrint Archive, Report2006\/110 (2006), \n                    \n                      http:\/\/eprint.iacr.org\/2006\/110"},{"key":"11_CR22","unstructured":"IEEE Standard Specifications for Public-Key Cryptography \u2013 IEEE Std 1363:2000. IEEE Computer Society, New York (2000)"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A one-round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45682-1_5","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A.K. Lenstra","year":"2001","unstructured":"Lenstra, A.K.: Unbelievable security. Matching AES security using public key systems. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 67\u201386. Springer, Heidelberg (2001)"},{"key":"11_CR25","unstructured":"Lercier, R.: Discrete logarithms in GF(p). Posting to NMBRTHRY List (2001)"},{"key":"11_CR26","unstructured":"McCullagh, N., Barreto, P.S.L.M.: Efficient and forward-secure identity-based signcryption. Cryptology ePrint Archive, Report2004\/117 (2004), \n                    \n                      http:\/\/eprint.iacr.org\/2004\/117"},{"key":"11_CR27","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"A. Menezes","year":"1993","unstructured":"Menezes, A.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Dordrecht (1993)"},{"key":"11_CR28","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1996), URL: \n                    \n                      http:\/\/cacr.math.uwaterloo.ca\/hac"},{"key":"11_CR29","unstructured":"Miller, V.: Short programs for functions on curves (unpublished, manuscript) (1986), \n                    \n                      http:\/\/crypto.stanford.edu\/miller\/miller.pdf"},{"key":"11_CR30","unstructured":"Nogami, Y., Morikawa, Y.: A fast implementation of elliptic curve cryptosystem with prime order defined over \n                    \n                      \n                    \n                    $f_{p^8}$\n                   (1998), \n                    \n                      http:\/\/www.trans.cne.okayama-u.ac.jp\/nogami-group\/papers\/kiyou2.pdf"},{"key":"11_CR31","unstructured":"Page, D., Smart, N.P., Vercauteren, F.: A comparison of MNT curves and supersingular curves. Cryptology ePrint Archive (2004), \n                    \n                      http:\/\/eprint.iacr.org\/2004\/165"},{"key":"11_CR32","unstructured":"Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve. Cryptography ePrint Archive, Report 2003\/054 (2003), \n                    \n                      http:\/\/eprint.iacr.org\/2003\/054"},{"key":"11_CR33","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan (2000)"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-30574-3_20","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"M. Scott","year":"2005","unstructured":"Scott, M.: Computing the Tate pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 293\u2013304. Springer, Heidelberg (2005)"},{"key":"11_CR35","unstructured":"Scott, M.: (2006), \n                    \n                      http:\/\/ftp.computing.dcu.ie\/pub\/crypto\/miracl.zip"},{"key":"11_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/978-3-540-28628-8_9","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"M. Scott","year":"2004","unstructured":"Scott, M., Barreto, P.: Compressed pairings. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 140\u2013156. Springer, Heidelberg (2004), Also available from: \n                    \n                      http:\/\/eprint.iacr.org\/2004\/032\/"},{"key":"11_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"11_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/3-540-45682-1_7","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"E. Thom\u00e9","year":"2001","unstructured":"Thom\u00e9, E.: Computation of discrete logarithms in \n                    \n                      \n                    \n                    $\\mathbb{F}_{2^{607}}$\n                  . In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 107\u2013124. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11894063_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T14:00:12Z","timestamp":1558274412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11894063_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540465591","9783540465614"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/11894063_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}