Pairing-based cryptography

Results: 49



#Item
21Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2

Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
22EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2015-03-30 18:10:52
23The Tennessee Open Meetings Act passed by the General Assembly in 1974 requires that meetings of state, city and county government bodies be open to the public and that any such governmental body give adequate public not

The Tennessee Open Meetings Act passed by the General Assembly in 1974 requires that meetings of state, city and county government bodies be open to the public and that any such governmental body give adequate public not

Add to Reading List

Source URL: health.state.tn.us

Language: English - Date: 2015-03-27 14:41:02
24EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2015-03-30 17:41:07
25Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†

Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-24 04:01:18
26TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira UNICAMP, Brazil

TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira UNICAMP, Brazil

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-07 17:26:25
27Improvement of Ma ni ke ta l .

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
28Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc

Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-13 03:19:10
29Two novel applications of bilinear groups to ABE encryption Riccardo Longo  Department of Mathematics, University of Trento, Italy Chiara Marcolla  Department of Mathema

Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 11:38:03
30An abridged version of this paper appears in The 4th International Conference on Pairing Based Cryptography (Pairing 2010), M. Joyce, A. Miyaji and A. Otsuka (Eds.), LNCS 6487, pp, This is the full ve

An abridged version of this paper appears in The 4th International Conference on Pairing Based Cryptography (Pairing 2010), M. Joyce, A. Miyaji and A. Otsuka (Eds.), LNCS 6487, pp, This is the full ve

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-28 17:44:29