Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Affine Pairings on ARM

    We report on relative performance numbers for affine and projective pairings on a dual-core Cortex A9 ARM processor. Using a fast inversion in the base field and doing inversion in extension fields by using th...

    Tolga Acar, Kristin Lauter, Michael Naehrig in Pairing-Based Cryptography – Pairing 2012 (2013)

  2. No Access

    Chapter and Conference Paper

    Accumulators and U-Prove Revocation

    This work introduces the most efficient universal accumulator known today. For the first time, we have an accumulator which does not depend on hidden order groups, does not require any exponentiations in the t...

    Tolga Acar, Sherman S. M. Chow, Lan Nguyen in Financial Cryptography and Data Security (2013)

  3. Chapter and Conference Paper

    Revocation for Delegatable Anonymous Credentials

    This paper introduces and formalizes homomorphic proofs that allow ‘adding’ proofs and proof statements to get a new proof of the ‘sum’ statement. Additionally, we introduce a construction of homomorphic proofs, ...

    Tolga Acar, Lan Nguyen in Public Key Cryptography – PKC 2011 (2011)

  4. Chapter and Conference Paper

    Cryptographic Agility and Its Relation to Circular Encryption

    We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, individually secure schemes can s...

    Tolga Acar, Mira Belenkiy, Mihir Bellare in Advances in Cryptology – EUROCRYPT 2010 (2010)

  5. No Access

    Article

    Montgomery Multiplication in GF(2k)

    We show that the multiplication operation c=a · b · r-1 in the field GF(2k can be implemented significantly faster in software than the standard multiplication, where r is a special fixed element of the field. Th...

    Cetin K. Koc, Tolga Acar in Designs, Codes and Cryptography (1998)