[1] Miller V S. Short Programs for Functions on Curves[DB/OL]. http://crypto.stanford.edu/miller/miller.pdf, 1986-05-06.
[2] Joux A. A one round protocol for tripartite Diffie-Hellman[C]// Proceedings of the 4th International Symposium on Algorithmic Number Theory. 2000:385-394.
[3] 赵昌安,张方国. 双线性对有效计算研究进展[J]. 软件学报, 2009,20(11):3001-3009.
[4] Boneh D, Franklin M K. Identity-based encryption from the Weil pairing[C]// Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology. 2001:213-229.
[5] Hess F, Smart N P, Vercauteren F. The Eta pairing revisited[J]. IEEE Transactions on Information Theory, 2006,52(10):4595-4602.
[6] Zhao C, Zhang F, Huang J. A note on the Ate pairing[J]. International Journal of Information Security, 2008,7(6):379-382.
[7] Alfred Menezes, Scott Vanstone, Tatsuaki Okamoto. Reducing elliptic curve logarithms to logarithms in a finite field[C]// Proceedings of the 23rd Annual ACM Symposium on Theory of Computing. 1991:80-89.
[8] Jean-Claude Bajard, Laurent Imbert, Graham A Jullien, et al. A CRT-based Montgomery Multiplication for Finite Fields of Small Characteristic[DB/OL]. http://hal.archives-ouvertes.fr/docs/00/10/64/55/pdf/d512.pdf, 2005-07-15.
[9] Wang Mao-cai, Hu Han-ping, Dai Guang-ming. An efficient algorithms for Tate pairing computation[J]. Journal of Communication and Computer, 2007,4(8):20-23.
[10] Alfred Menezes. An Introduction to Pairing-based Cryptography[DB/OL]. http://cacr.uwaterloo.ca/~ajmeneze/publications/pairings.pdf, 2008-12-20.
[11] Soonhak Kwon. Efficient Tate pairing computation for supersingular elliptic curves over binary fields[C]// Proceedings of the 10th Australasian Conference on Information Security and Privacy. 2005:134-145.
[12] McCusker K, O’Connor N, Diamond D. Low-energy finite field arithmetic primitives for implementing security in wireless sensor networks[C]// Proceedings of the 2006 International Conference on Communications, Circuit and Systems. 2006,3:1537-1541.
[13] Darrel Hankerson, Alfred Menezes, Scott Vanstone. 椭圆曲线密码学导论[M]. 张焕国译. 北京:电子工业出版社, 2005:55.
[14] Henri Cohen, Gerhard Frey, Roberto Avanzi, et al. Handbook of Elliptic and Hyperelliptic Curve Cryptography[M]. Chapman & Hall/CRC, 2006:196. |