[1] |
Miller V S. Short Programs for Functions on Curves[DB/OL]. http://crypto.stanford.edu/miller/miller.pdf, 1986-05-06.
|
[2] |
Joux A. A one round protocol for tripartite Diffie-Hellman[C]// Proceedings of the 4th International Symposium on Algorithmic Number Theory. 2000:385-394.
|
[3] |
赵昌安,张方国. 双线性对有效计算研究进展[J]. 软件学报, 2009,20(11):3001-3009.
|
[4] |
Boneh D, Franklin M K. Identity-based encryption from the Weil pairing[C]// Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology. 2001:213-229.
|
[5] |
Hess F, Smart N P, Vercauteren F. The Eta pairing revisited[J]. IEEE Transactions on Information Theory, 2006,52(10):4595-4602.
|
[6] |
Zhao C, Zhang F, Huang J. A note on theAte pairing[J]. International Journal of Information Security, 2008,7(6):379-382.
|
[7] |
Alfred Menezes, Scott Vanstone, Tatsuaki Okamoto. Reducing elliptic curve logarithms to logarithms in a finite field[C]// Proceedings of the 23rd Annual ACM Symposium on Theory of Computing. 1991:80-89.
|
[8] |
Jean-Claude Bajard, Laurent Imbert, Graham A Jullien, et al. A CRT-based Montgomery Multiplication for Finite Fields of Small Characteristic[DB/OL]. http://hal.archives-ouvertes.fr/docs/00/10/64/55/pdf/d512.pdf, 2005-07-15.
|
[9] |
Wang Mao-cai, Hu Han-ping, Dai Guang-ming. An efficient algorithms for Tate pairing computation[J]. Journal of Communication and Computer, 2007,4(8):20-23.
|
[10] |
Alfred Menezes. An Introduction to Pairing-based Cryptography[DB/OL]. http://cacr.uwaterloo.ca/~ajmeneze/publications/pairings.pdf, 2008-12-20.
|
[11] |
Soonhak Kwon. Efficient Tate pairing computation for supersingular elliptic curves over binary fields[C]// Proceedings of the 10th Australasian Conference on Information Security and Privacy. 2005:134-145.
|
[12] |
McCusker K, O’Connor N, Diamond D. Low-energy finite field arithmetic primitives for implementing security in wireless sensor networks[C]// Proceedings of the 2006 International Conference on Communications, Circuit and Systems. 2006,3:1537-1541.
|
[13] |
Darrel Hankerson, Alfred Menezes, Scott Vanstone. 椭圆曲线密码学导论[M]. 张焕国译. 北京:电子工业出版社, 2005:55.
|
[14] |
Henri Cohen, Gerhard Frey, Roberto Avanzi, et al. Handbook of Elliptic and Hyperelliptic Curve Cryptography[M]. Chapman & Hall/CRC, 2006:196.
|