After the discovering of pairing-based cryptography, de-
velopers and researchers have been studding and developing
new techniques and methods for constructing more efficiently
implementation of pairings protocols and algorithms.The first
pairing is introduced by Weil Andre in 1948 called Weil
pairing, after that more pairing are appear like tate pairing,
ate pairing and a lot more. The benefice of Elliptic curve
cryptosystems which was discovered by Neal Koblitz [1] and
Victor Miller [2] are to reduce the key sizes of the keys utilize
in public key cryptography. Some works like presented in
[3] interested in signature numeric. The authors in [4] show
that we can use the final exponentiation in pairings as one
of the countermeasures against fault attacks. In [5], [6], [7],
[13] Nadia El and others show a study case of working with
elliptic curve with embedding degree 5,9,15 and 27. Also in
[9], [10], [11], [12] researchers show the case of working with
curve with embedding degree 18. In [8] they give a study of
security level of optimal ate pairing.
In the present article, we seek to obtain efficient ways to
pairing computation for curves of embedding degree 54. We
will see how to improve arithmetic operation in curves with
embedding degree 54 by using the tower building technique.
We will give three cases studies that show, when we use a
degree 2 twists, we can handle most operations in Fp2,Fp6
and Fp18 , and when we use a degree 3 twists, we can handle
most operations in Fp3,Fp6,Fp9,Fp18 and Fp27 instead. By
making use of an tower building technique, we also improve
the arithmetic of Fp6,Fp18 and Fp54 in order to get better
results. Finally we will compare these cases to know which
path is the optimal path.
In this paper, we will investigate and examine what will
happens in case of optimal ate pairing with embedding degree
54.
The paper is organized as follow. Section 2 we recall some
background on the main pairing proprieties also ate pairing,
and Miller Algorithm. Section 3 presents our main theorem
in this work. Section 4 will presents the results of our work.
Finally, Section 5 concludes this paper.
In everything that follows, Ewill represent an elliptic curve
with equation
y2=x3+ax+bfor bFqwith qprime number. The symbol
aopt will denote the optimal ate pairing. We shall use, without
explicit mention, the following :
G1(E(Fq)): additive group of cardinal nN.
G2(E(Fqk)): additive group of cardinal nN.
G3F
qkµn: cyclic multiplicative group of cardinal
nN.
µn={u¯
Fq|un= 1}.
P: the point at infinity of the elliptic curve.
k: the embedding degree: the smallest integer such that
rdivides qk1.
fs,P : a rational function associated to the point P and
some integer s.
m,s,i: multiplication, squaring, inversion in field Fp.
M2, S2, I2: multiplication, squaring, inversion in field
Fp2.
M3, S3, I3: multiplication, squaring, inversion in field
Fp3.
M6, S6, I6: multiplication, squaring, inversion in field
Fp6.
M9, S9, I9: multiplication, squaring, inversion in field
Fp9.
M18, S18, I18: multiplication, squaring, inversion in field
Fp18
M27, S27, I27: multiplication, squaring, inversion in field
Fp27 .
Tower Building Technique on Elliptic Curve with Embedding
Degree 54
ASSOUJAA ISMAIL, EZZOUAK SIHAM
Sidi Mohammed Ben Abdellah University
Faculty of science Dhar El Mahrez
Department of mathematics, Lab: LASMA
Fez, MOROCCO.
Abstract: Pairing based cryptography is one of the newest security solution that attract a lot of attention, because
we can work with efficient and faster pairing to make the security a lot practical, also the working with extension
finite field of the form 𝔽pk is more useful and secure with k ≥ 12 the implementation become more important.
In this paper, we will presents cases studies of improving pairing arithmetic calculation on curves with
embedding degree 54. We use the tower building technique, and study the case when using a degree 3 twist to
carry out most operations in 𝔽p3 and 𝔽p6 or 𝔽p9 and 𝔽p18 or 𝔽p27, or when using a degree 2 twist to handle most
of the operations in 𝔽p2 and 𝔽p6 and 𝔽p18 .
Key-Words: —Optimal ate pairing, Miller Algorithm, Embedding degree 54, Twist curve
Received: April 22, 2024. Revised: September 13, 2024. Accepted: October 14, 2024. Published: November 14, 2024.
1. Introduction
2. Mathematical Background
PROOF
DOI: 10.37394/232020.2024.4.8
Assoujaa Ismail, Ezzouak Siham
E-ISSN: 2732-9941
91
Volume 4, 2024
M54, S54, I54: multiplication, squaring, inversion in field
Fp54
Remark 1: In this paper, our main objective is to identify
the optimal path with the lowest cost. Although the cost of
multiplication remains the same in each path we choose, we
aim to determine the path with the minimum cost of squaring
or inversion.
Proposition 1:
We investigate these cases by following the process outlined
below:
1) Transform the elliptic curve with embedding degree k
using the variable change (x, y)(xu2/d, yu3/d)
2) Choose an appropriate irreducible polynomial for tower
building
3) Construct the twisted isomorphic rational point
4) Determine the cost of multiplication, squaring, and in-
version in the corresponding field.
TWIST OF AN ELLIPTIC CURVE
Definition 1: (Twist of an elliptic curve) [6]
Let E and E’ be two elliptic curves defined over Fq, for q, a
power of a prime number p. Then, the curve E’ is a twist of
degree d of E if we can define an isomorphism Ψdover Fqd
from E’ into E and such that d is minimal:
Ψd:E0(Fq)E(Fqd).
Theorem 1: [6] Let E be an elliptic curve defined by the
short Weiestrass equation y2=x3+ax +bover an extension
Fqof a finite field Fp, for p a prime number, k a positive
integer such that q=pk. According to the value of k, the
potential degrees for a twist are d =2, 3, 4 or 6 (in this paper,
we are intersted with the case of d=2 and 3).
d= 2, Let vFpk/2such that the polynomial X2vis
irreducible in Fpk/2. The equation of the curve E0defined on
Fpk/2is E0:vy2=x3+ax +b. The morphism Ψ2is defined
by:
Ψ2:E0(Fpk/2) E(Fpk)
(x, y) (x, yv1/2)
d= 3, the curve Eadmits a twist of degree 3 if and only
a= 0. Let vFpk/d be such that the polynomial X3vis
irreducible in Fpk/d . The equation of E0is then y2=x3+b
v.
The morphism is:
Ψ3:E0(Fpk/3) E(Fpk)
(x, y) (xv1/3;yv1/2)
Cost calculation:
We use the cost of operation in Quadratic and cubic twisted
curve to calculate the cost of operation in the field with
embedding degree 2i.3with the tower building technique for
every path.
Cost of operation in Quadratic twisted curve:
We already know that the cost of multiplication, squaring and
inversion in the quadratic field Fp2are:
M2= 3m, S2= 2m, I2= 4m+irespectively ( [17]).
Cost of operation in Cubic twisted curve:
We already know that the cost of multiplication, squaring and
inversion in in the cubic twisted field Fp3are:
M3= 6m, S3= 5s, I3= 9m+ 2s+irespectively ( [17]).
Vector representation point:
In order to construct a vector representation point in Fpk,
we generally need the following set forms a basis of Fpk
over Fp,Bk={1, u, u2, ..., uk1}, which is known as
polynomial basis. An arbitrary element A in Fpkis written
as A=a0+a1u+a2u2+... +ak1uk1. The vector
representation of A is vA= (a0, a1, a2, ..., ak1).
We use the vector representation point of Quadratic and cubic
twisted curve to know the vector representation point of
operation in the field with embedding degree 2i.3with the
tower building technique for every path.
Vector representation point in Quadratic twisted curve:
We have Eis y2=x3+ax +b.
Let uFpsuch that the polynomial x2uis irreducible over
Fp.
The equation of E0is uy2=x3+ax +b.
So to map E(Fp)to E0(Fp),we have:
E(Fp)E0(Fp)
(x, y)(x1, y1)=(x, yu1/2)
Using ψ2(x, y)=(x, yu1/2)to map E0(Fp)to E(Fp2)
E0(Fp)E(Fp2)
(x, y)(x, yu1/2)
Hence, to map E(Fp)to E(Fp2), we have:
E(Fp)E(Fp2)
(x, y)(x1, y1)=(x, yu)
Let map P to P1:
Let P= (x, y) = (a, b)and P1= (x1, y1) = (a1, b1)B2,
where x1, y1, a1, b1Fp2.
P1has a special vector representation with 2 Fpelements
for each x1and y1coordinates. We have B2= (1, u),ψ2:
E0(Fp)E(Fp2),
ψ2(x, y)=(x1, y1)=(x, yu),(see [9]) we have:
PP1
E(Fp)E(Fp2)
(x, y)(x1, y1)=(x, yu)=(a, bu)B2
P1= (x1, y1)=(x, yu)=(a, bu)B2= ((a, 0),(0, b))
Let remap P1to P: obtained easily by just placing a and
b in the correct basis position.
P1P
E(Fp2)E(Fp)
(x1, y1)(x, y) = (a, b)
P= (x, y)=(a, b)
So we can easly map and remap between P and P1.
Vector representation point in Cubic twisted curve:
PROOF
DOI: 10.37394/232020.2024.4.8
Assoujaa Ismail, Ezzouak Siham
E-ISSN: 2732-9941
92
Volume 4, 2024
The curve Eadmits a twist of degree 3 if and only if a= 0
i,e y2=x3+b.
Let uFpsuch that the polynomial x3uis irreducible over
Fp.
The equation of E0is y2=x3+b/u.
So to map E(Fp)to E0(Fp),we have:
E(Fp)E0(Fp)
(x, y)(x1, y1)=(xu1/3, yu1/2)
Using ψ3(x, y)=(xu2/3, yu1/2)to map E0(Fp)to E(Fp3)
E0(Fp)E(Fp3)
(x, y)(xu2/3, yu1/2)
Hence, to map E(Fp)to E(Fp3), we have:
E(Fp)E(Fp3)
(x, y)(x1, y1) = (xu, yu)
Let map P to P1:
Let P= (x, y) = (a, b)and P1= (x1, y1) = (a1, b1)B3,
where x1, y1, a1, b1Fp3.
P1has a special vector representation with 3 Fpelements for
each x1and y1coordinates.
We have B3= (1, u, u2),ψ3:E0(Fp)E(Fp3),
ψ3(x, y)=(x1, y1)=(xu, yu),(see [9]) we have:
PP1
E(Fp)E(Fp3)
(x, y)(x1, y1)=(xu, yu)=(au, bu)B3
P1= (x1, y1)=(xu, yu)=(au, bu)B3= ((0, a, 0),(0, b, 0))
Let remap P1to P: obtained easily by just placing a and b
in the correct basis position
P1P
E(Fp3)E(Fp)
(x1, y1)(x, y) = (a, b)
P= (x, y)=(a, b)
So we can easly map and remap between P and P1.
Corollary 1: :
We can do an extension for the above vector representation,
we have:
E(Fpk/2)E(Fpk)
(x, y)(x, yu)
and,
E(Fpk/3)E(Fpk)
(x, y)(xu, yu)
The figure below show all path possible for building an
elliptic curve with embedding degree 54
There is four path possible to building this curve
Fp Fp2 Fp6 Fp18 Fp54
Fp Fp3 Fp6 Fp18 Fp54
Fp Fp3 Fp9 Fp18 Fp54
Fp Fp3 Fp9 Fp27 Fp54
Exploring the first path
Fp Fp2 Fp6 Fp18 Fp54
The appropriate choices of irreducible polynomial defined
by:
Fp2=Fp[u]/(u2β),with βa non-square and u2= 2
Fp6=Fp2[v]/(v3u),with va non-cube and v3= 21/2
Fp18 =Fp6[t]/(t3v),with ta non-cube and t3= 21/6
Fp54 =Fp18 [w]/(w3t),with wa non-cube and w3= 21/18
P4(x4, y4) = ((a, 0, ..., 0),(0, ..., 0, b)) with x4, y4Fp54
P000 (x000 , y000 ) = ((a, 0, ..., 0),(0, ..., 0, b)) with x000 , y000 Fp18
P00 (x00 , y00 ) = ((a, 0,0,0,0,0),(0,0,0,0,0, b)) with x00 , y00 Fp6
P0(x0, y0) = ((a, 0),(0, b)) with x0, y0Fp2
P(x, y) = (a, b)with x, y Fp
3. Tower Building Technique for Elliptic
Curve with Embedding Degree 54
PROOF
DOI: 10.37394/232020.2024.4.8
Assoujaa Ismail, Ezzouak Siham
E-ISSN: 2732-9941
93
Volume 4, 2024
The cost of multiplication, squaring and inversion in in the
54th twisted field Fp54 are:
M54 = (M18)Fp3= (M6)Fp3)Fp3= ((M2)Fp3)Fp3)Fp3
= ((3m)Fp3)Fp3)Fp3= ((3M3)Fp3)Fp3= ((18m)Fp3)Fp3
= (18M3)Fp3= (108m)Fp3= 108M3= 648m,
S54 = (S18)Fp3= (S6)Fp3)Fp3= ((S2)Fp3)Fp3)Fp3
= ((2m)Fp3)Fp3)Fp3= ((2M3)Fp3)Fp3= ((12m)Fp3)Fp3
= (12M3)Fp3= (72m)Fp3= 72M3= 432m,
I54 = (I18)Fp3= (I6)Fp3)Fp3= ((I2)Fp3)Fp3)Fp3
= ((4m+i)Fp3)Fp3)Fp3= ((4M3+I3)Fp3)Fp3
= ((33m+ 2s+i)Fp3)Fp3= (33M3+ 2S3+I3)Fp3
= (207m+ 12s+i)Fp3= 207M3+ 12S3+I3
= 1251m+ 62s+i,
Exploring the second path
Fp Fp3 Fp6 Fp18 Fp54
The appropriate choices of irreducible polynomial defined
by:
Fp3=Fp[u]/(u3β),with βa non-cube and u3= 2
Fp6=Fp3[v]/(v2u),with va non-square and v2= 21/3
Fp18 =Fp6[t]/(t3v),with ta non-cube and t3= 21/6
Fp54 =Fp18 [w]/(w3t),with wa non-cube and w3= 21/18
P4(x4, y4) = ((a, 0, ..., 0),(0, ..., 0, b)) with x4, y4Fp54
P000 (x000 , y000 ) = ((a, 0, ...0),(0, ..., 0, b)) with x000 , y000 Fp18
P00 (x00 , y00 ) = ((a, 0,0,0,0,0),(0,0,0,0,0, b)) x00 , y00 Fp6
P0(x0, y0) = ((a, 0,0),(0,0, b)) with x0, y0Fp3
P(x, y)=(a, b)with x, y Fp
The cost of multiplication, squaring and inversion in in the
54th twisted field Fp54 are:
M54 = (M18)Fp3= (M6)Fp3)Fp3= ((M3)Fp2)Fp3)Fp3
= ((6m)Fp2)Fp3)Fp3= ((6M2)Fp3)Fp3= ((18m)Fp3)Fp3
= (18M3)Fp3= (108m)Fp3= 108M3= 648m,
S54 = (S18)Fp3= (S6)Fp3)Fp3= ((S3)Fp2)Fp3)Fp3= ((5s)Fp2)Fp3)Fp3
= ((5S2)Fp3)Fp3= ((10m)Fp3)Fp3= (10M3)Fp3= (60m)Fp3
= 60M3= 360m,
I54 = (I18)Fp3= (I6)Fp3)Fp3= ((I3)Fp2)Fp3)Fp3
= ((9m+ 2s+i)Fp2)Fp3)Fp3= ((9M2+ 2S2+I2)Fp3)Fp3
= ((35m+i)Fp3)Fp3= (35M3+I3)Fp3= (219m+ 2s+i)Fp3
= 219M3+ 2S3+I3= 1323m+ 12s+i,
Exploring the third path
Fp Fp3 Fp9 Fp18 Fp54
The appropriate choices of irreducible polynomial defined
by:
Fp3=Fp[u]/(u3β),with βa non-cube and u3= 2
Fp9=Fp3[v]/(v3u),with va non-cube and v3= 21/3
Fp18 =Fp9[t]/(t2v),with ta non-square and t2= 21/9
Fp54 =Fp18 [w]/(w3t),with wa non-square and w3= 21/18
P4(x4, y4) = ((a, 0, ..., 0),(0, ..., 0, b)) with x4, y4Fp54
P000 (x000 , y000 ) = ((a, 0, ..., 0),(0, ..., 0, b)) with x000 , y000 Fp18
P00 (x00 , y00 ) = ((a, 0, ..., 0),(0, , ..., 0, b)) with x00 , y00 Fp9
P0(x0, y0) = ((a, 0,0),(0,0, b)) with x0, y0Fp3
P(x, y) = (a, b)with x, y Fp
The cost of multiplication, squaring and inversion in in the
36th twisted field Fp36 are:
M54 = (M18)Fp3= (M9)Fp2)Fp3= ((M3)Fp3)Fp2)Fp3
= ((6m)Fp3)Fp2)Fp3= ((6M3)Fp2)Fp3= ((36m)Fp2)Fp3
= (36M2)Fp3= (108m)Fp3= 108M3= 648m,
S54 = (S18)Fp3= (S9)Fp2)Fp3= ((S3)Fp3)Fp2)Fp3= ((5s)Fp3)Fp2)Fp3
= ((5S3)Fp2)Fp3= ((25s)Fp2)Fp3
= (25S2)Fp3= (50m)Fp3= 50M3= 300m,
PROOF
DOI: 10.37394/232020.2024.4.8
Assoujaa Ismail, Ezzouak Siham
E-ISSN: 2732-9941
94
Volume 4, 2024
I54 = (I18)Fp3= (I9)Fp2)Fp3= ((I3)Fp3)Fp2)Fp3
= ((9m+ 2s+i)Fp3)Fp2)Fp3= ((9M3+ 2S3+I3)Fp2)Fp3
= ((63m+ 12s+i)Fp2)Fp3= (63M2+ 12S2+I2)Fp3
= (227m+i)Fp3= 227M3+I3= 1371m+ 2s+i,
Exploring the forth path
Fp Fp3 Fp9 Fp27 Fp54
The appropriate choices of irreducible polynomial defined
by:
Fp3=Fp[u]/(u3β),with βa non-cube and u3= 2
Fp9=Fp3[v]/(v3u),with va non-cube and v3= 21/3
Fp27 =Fp9[t]/(t3v),with ta non-cube and t3= 21/9
Fp54 =Fp27 [w]/(w2t),with wa non-square and w2= 21/27
P4(x4, y4) = ((a, 0, ..., 0),(0, ..., 0, b)) with x4, y4Fp54
P000 (x000 , y000 ) = ((a, 0, ..., 0),(0, ..., 0, b)) with x000 , y000 Fp27
P00 (x00 , y00 ) = ((a, 0, ..., 0),(0, ..., 0, b)) with x00 , y00 Fp9
P0(x0, y0) = ((a, 0,0),(0,0, b)) with x0, y0Fp3
P(x, y) = (a, b)with x, y Fp
The cost of multiplication, squaring and inversion in in the
54th twisted field Fp54 are:
M54 = (M27)Fp2= (M9)Fp3)Fp2= ((M3)Fp3)Fp3)Fp2
= ((6m)Fp3)Fp3)Fp2= ((6M3)Fp3)Fp2= ((36m)Fp3)Fp2
= (36M3)Fp2= (216m)Fp2= 216M2= 648m,
S54 = (S27)Fp2= (S9)Fp3)Fp2= ((S3)Fp3)Fp3)Fp2
= ((5s)Fp3)Fp3)Fp2= ((5S3)Fp3)Fp2= ((25s)Fp3)Fp2
= (25S3)Fp2= (125s)Fp2= 125S2= 250m,
I54 = (I27)Fp2= (I9)Fp3)Fp2= ((I3)Fp3)Fp3)Fp2
= ((9m+ 2s+ +i)Fp3)Fp3)Fp2= ((9M3+ 2S3+I3)Fp3)Fp2
= ((63m+ 12s+i)Fp3)Fp2= (63M3+ 12S3+I3)Fp2
= (387m+ 62s+i)Fp2= 387M2+ 62S2+I2
= 1289m+i,
TABLE I
COST OF OPERATIONS IN EACH THE TOWER FIELDS
Path O Cost
1M54 648m
S54 432m
I54 1251m+62s+i
2M54 648m
S54 360m
I54 1323m+12s+i
3M54 648m
S54 300m
I54 1371m+2s+i
4M54 648m
S54 250m
I54 1289m+i
The table above give the overall cost of operations in each
the tower fields.
We found that the cost of multiplication and squaring is the
same for any path chosen, however the cost of inversion
change on the path, so we can see that the minimal cost for
inversion is 1289m+i.
In this paper, we give some methods for tower building of
extension of finite field of embedding degree 54. We show
that there are four efficients paths for constructions of these
extensions of degree 54. We show that by using a degree 2 or 3
twist we handle to perform most of the operations in F6
p,Fp9,
Fp18 ,Fp27 and Fp54 . By using this tower building technique,
we also improve the arithmetic of Fp54 , in order to get better
results of calculate the cost of their multiplication, squaring
and inversion.
[1] Victor S. Miller. Use of elliptic curves in cryptography. Crypto 1985,
LNCS 218, pp. 417-426, 1985.
[2] Neal Koblitz. Elliptic curve cryptosystems. Mathematics of Computa-
tion, Vol. 48, No. 177, pp. 203-209, 1987.
[3] R.L. Rivest, A. Shamir, and L.M. Adleman. A method for obtaining
digital signatures and publickey cryptosystems. Commun. ACM, Vol.
21, No. 2, pp. 120-126, 1978.
[4] Whelan, C., Scott, M.: The Importance of the Final Exponentiation in
Pairings When Considering Fault Attacks. In: Takagi, T., Okamoto, T.,
Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp.
225-246. Springer, Heidelberg (2007).
[5] Nadia El Mrabet, Nicolas Guillermin, and Sorina Ionica. A study
of pairing computation for curves with embedding degree 15. DBLP
volume 2009.
[6] Nadia El Mrabet and Marc Joye. GUIDE TO PAIRING-BASED CRYP-
TOGRAPHY. Chapman and Hall/CRC CRYPTOGRAPHY AND NET-
WORK SECURITY, 2018.
[7] Emmanuel Fouotsa, Nadia El Mrabet and Aminatou Pecha. Optimal Ate
Pairing on Elliptic Curves with Embedding Degree 9; 15 and 27. journal
of Groups, Complexity, Cryptology, Volume 12, issue 1 (April 17, 2020)
[8] Narcisse Bang Mbiang, Diego De Freitas Aranha, Emmanuel Fouotsa.
Computing the optimal ate pairing over elliptic curves with embedding
degrees 54 and 48 at the 256-bit security level. Int. J. Applied Cryptog-
raphy, Vol. 4, No. 1, 2020.
[9] Md. Al-Amin Khandaker, Taehwan Park, Yasuyuki Nogami, and Howon
Kim, Member, KIICE. A Comparative Study of Twist Property in KSS
Curves of Embedding Degree 16 and 18 from the Implementation
Perspective. J. lnf. Commun. Converg. Eng. 15(2): 97-103, Jun. 2017.
4. Comparison
5. Conclusion
References
PROOF
DOI: 10.37394/232020.2024.4.8
Assoujaa Ismail, Ezzouak Siham
E-ISSN: 2732-9941
95
Volume 4, 2024
[10] Md. Al-Amin Khandaker, Yasuyuki NOGAMI. Isomorphic Mapping
for Ate-based Pairing over KSS Curve of Embedding Degree 18.
10.1109/CANDAR.2016.0113 November 2016.
[11] Rahat Afreen, S.C. Mehrotra. A REVIEW ON ELLIPTIC CURVE
CRYPTOGRAPHY FOR EMBEDDED SYSTEMS. International Jour-
nal of Computer Science &Information Technology (IJCSIT), Vol 3.
[12] Md. Al-Amin Khandaker, Yasuyuki NOGAMI. A Consideration of Tow-
ering Scheme for Efficient Arithmetic Operation over Extension Field of
Degree 18. 19th International Conference on Computer and Information
Technology, December 18-20, 2016, North South University, Dhaka,
Bangladesh.
[13] Nadia El Mrabet, Aurore Guillevic, and Sorina Ionica. Efficient Multi-
plication in Finite Field Extensions of Degree 5. DBLP 10.1007/978-3-
642-21969-6-12 June 2011.
[14] Michael Scott, Aurore Guillevic. A New Family of Pairing-Friendly
elliptic curves. May 21, 2018.
[15] Michael Scott, On the Efficient Implementation of Pairing-Based Pro-
tocols, in cryptography and coding, pp. 296-308, Springer, 2011.
[16] Joseph H. Silverman, The Arithmetic of Elliptic Curves, Second Edition,
2000.
[17] Augusto Jun Devegili1, Colm Eigeartaigh, Michael Scott, and Ricardo
Dahab, Multiplication and Squaring on Pairing-Friendly Fields, 2006.
[18] ISMAIL ASSOUJAA, SIHAM EZZOUAK, HAKIMA MOUANIS.
Compression Point in Field of Characteristic 3. Springer, I4CS 2022,
CCIS 1747, pp. 104111, 2022 https://doi.org/10.1007/978-3-031-23201-
5 7.
[19] ISMAIL ASSOUJAA, SIHAM EZZOUAK, HAKIMA MOUANIS.
Tower Building Technique on Elliptic Curve with Embedding
Degree 36. WSEAS TRANSACTIONS ON COMPUTERS. DOI:
10.37394/23205.2022.21.39.
[20] ISMAIL ASSOUJAA, SIHAM EZZOUAK, HAKIMA MOUANIS.
Tower Building Technique on Elliptic Curve with Embedding Degree
72. WSEAS Transactions on Computer Research 10:126-138 DOI:
10.37394/232018.2022.10.17
[21] ISMAIL ASSOUJAA, SIHAM EZZOUAK, HAKIMA MOUANIS.
TOWER BUILDING TECHNIQUEON ELLIPTIC CURVEWITH EM-
BEDDING DEGREE 18. Tatra mountains mathematical publica-
tions, DOI: 10.2478/tmmp-2023-0008Tatra Mt. Math. Publ. 83 (2023),
103118.
[22] ISMAIL ASSOUJAA, SIHAM EZZOUAK, HAKIMA MOUANIS.
Pairing based cryptography New random point exchange key pro-
tocol. Conference: 2022 7th International Conference on Mathe-
matics and Computers in Sciences and Industry (MCSI), DOI:
10.1109/MCSI55933.2022.00017.
[23] ISMAIL ASSOUJAA, SIHAM EZZOUAK. New Compression Point
Reducing Memory Size in Field of Characteristic Different From 2 And
3.International Journal of Scientific Research and Innovative Studies.
https://doi.org/10.5281/zenodo.11244720.
[24] ISMAIL ASSOUJAA, SIHAM EZZOUAK. Improving arithmetic calcu-
lations on elliptic curves with embedding degree 2i.3. Journal of Xidian
University. https://doi.org/10.5281/Zenodo.11505701. ISSN No:1001-
2400.
Contribution of Individual Authors to the
Creation of a Scientific Article (Ghostwriting
Policy)
The authors equally contributed in the present
research, at all stages from the formulation of the
problem to the final findings and solution.
Sources of Funding for Research Presented in a
Scientific Article or Scientific Article Itself
No funding was received for conducting this study.
Conflict of Interest
The authors have no conflicts of interest to declare
that are relevant to the content of this article.
Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the
Creative Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/deed.en
_US
PROOF
DOI: 10.37394/232020.2024.4.8
Assoujaa Ismail, Ezzouak Siham
E-ISSN: 2732-9941
96
Volume 4, 2024