IACR News item: 26 July 2013
Joppe W. Bos, Craig Costello, Michael Naehrig
ePrint Report
We study exponentiations in pairing groups for the most common security levels and show that, although the Weierstrass model is preferable for pairing computation, it can be worthwhile to map to alternative curve representations for the non-pairing group operations in protocols.
Additional news items may be found on the IACR news page.