Group-based cryptography

Results: 52



#Item
1Cryptography / Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Finite fields / Group theory / Hyperelliptic curve cryptography / Tate pairing / DiffieHellman key exchange / BonehLynnShacham / Elliptic curve / Abelian variety

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-03 16:15:38
2Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Group theory / Binary operations / Hyperelliptic curve cryptography / Tate pairing / Elliptic curve / Abelian variety / Cryptography / DiffieHellman key exchange / BonehLynnShacham

Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
3Algebraic curves / Elliptic curve cryptography / Elliptic curves / Pairing-based cryptography / Group theory / Abelian variety / Tate pairing / Hyperelliptic curve / Weil restriction / Elliptic curve / Hyperelliptic curve cryptography / Weil pairing

Abelian varieties, theta functions and cryptography Part 2 Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
4Cryptography / Algebra / Public-key cryptography / Pairing-based cryptography / Elliptic curves / Group theory / Analytic number theory / Weil pairing / Divisor / Pairing / Homomorphic signatures for network coding

Exercises on pairings on elliptic curves Andreas Enge Leuven, Friday, 13 September 2013 Exercise 1 (Weil reciprocity). Let E : Y 2 = X 3 + X over F7 , f = Y , g = X−1 X−3 . Compute div f and div g, and verify that f

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-23 05:41:31
5Cryptography / Prevention / Computer access control / Security / Access control / Authentication / Notary / Packaging / Password / Questionnaire / Job interview / Cognitive password

Where Have You Been? Using Location-Based Security Questions for Fallback Authentication Alina Hang Media Informatics Group University of Munich (LMU)

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:55
6Elliptic curve cryptography / Pairing-based cryptography / Public-key cryptography / Group theory / Finite fields / Tate pairing / Hyperelliptic curve / Weil pairing / BonehLynnShacham / BonehFranklin scheme / Pairing / ID-based encryption

Bilinear Pairings in Cryptography Master thesis #603 by

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2009-07-13 10:25:27
7Microsoft Windows / Trusted computing / Trusted Platform Module / Cryptographic software / Trusted Computing Group / Hardware-based full disk encryption / Data security / Encryption / FIPS 140-2 / Cryptography / Computer security / Disk encryption

Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-05-19 15:06:35
8Cryptographic protocols / Electronic commerce / X.509 / Transport Layer Security / ID-based cryptography / ID-based encryption / Public key infrastructure / Grid Security Infrastructure / Digital signature / Cryptography / Key management / Public-key cryptography

Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {h.lim, kenny.paterson}@rhul.ac.uk

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-09-30 07:23:50
9Cryptographic protocols / Internet protocols / Authorization certificate / Revocation list / Public key certificate / X.509 / Privilege Management Infrastructure / Online Certificate Status Protocol / NP / Cryptography / Public-key cryptography / Key management

PAMINA: A Certificate Based Privilege Management System Zoltán Nochta, Peter Ebinger and Sebastian Abeck University of Karlsruhe, Institute for Telematics, Cooperation and Management IT-Research Group Zirkel 2, 76128 Ka

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:36:07
UPDATE