[1]BONEH D, FRANKLIN M. Identity based encryption from the Weil pairing [C]// Advances in Cryptology-CRYPTO 2001: Proceedings of the 21st Annual International Cryptology Conference, LNCS 2139. Berlin: Springer-Verlag, 213-229.[2]BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing [C]// ASIACRYPT'01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer-Verlag, 2001: 514-532.[3]SMART N P. An identity based authenticated key agreement protocol based on the Weil pairing [J]. Electronics Letters, 2002, 38(13): 630-632.[4]赵昌安,张方国.双线性对有效计算研究进展[J].软件学报,2009,20(11):3001-3009.[5]MILLER V S. The Weil pairing and its efficient calculation [J]. Journal of Cryptology, 2004, 17(4): 235-261. [6]BARRETO P S, KIM H Y, LYNN B, et al. Efficient algorithms for pairing-based cryptosystems [C]// CRYPTO'02: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 2002: 354-368.[7]KWON S. Efficient Tate pairing computation for elliptic curves over binary fields [C]// Proceedings of the 10th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2005: 134-145.[8]BARRETO P S, GALBRAITH S D, O'HEIGEARTAIGH C, et al. Efficient pairing computation on supersingular Abelian varieties [J]. Designs, Codes and Cryptography, 2007, 42(3): 239-271.[9]SHU C, KWON S, GAJ K. FPGA accelerated Tate pairing based cryptosystems over binary fields [C]// FPT 2006: IEEE International Conference on Field Programmable Technology. Piscataway: IEEE Press, 2006: 173-180.[10]FONG K, HANKERSON D, LOPEZ J, et al. Field inversion and point halving revisited [J]. IEEE Transactions on Computers, 2004, 53(8): 1047-1067.[11]KIM T H, TAKAGI T, HAN D G, et al. Power analysis attacks and countermeasures on ηT pairing over binary fields [J]. Electronics and Telecommunications Research Institute Journal, 2008, 30(1): 68-80.[12]GRANGER R, PAGE D, STAM M. On small characteristic algebraic tori in pairing based cryptography [J]. LMS Journal of Computation and Mathematics, 2006, 9(3): 64-85.[13]OSWALD E. On side-channel attacks and the application of algorithmic countermeasures [D]. Graz, Austria: Graz University of Technology, 2003.[14]PAGE D, VERCAUTEREN F. A fault attack on pairing based cryptography [J]. IEEE Transactions on Computers, 2006, 55(9): 1075-1080.[15]SCOTT M. Computing the Tate pairing [C]// Proceedings of the 2005 International Conference on Topics in Cryptology. Berlin: Springer-Verlag, 2005: 293-304. |