Pairing-based cryptography

Results: 49



#Item
21Mathematics / Elliptic curve cryptography / Elliptic curve / Boneh/Franklin scheme / ID-based encryption / Pairing / Homomorphic signatures for network coding / BLS / Cryptography / Abstract algebra / Algebra

Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
22Year of birth missing / ID-based encryption / Association for Computing Machinery / Computer science / Infosys / Pairing-based cryptography / RSA / IEEE P1363 / Cryptography / Public-key cryptography / Dan Boneh

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2015-03-30 18:10:52
23Year of birth missing / ID-based encryption / Association for Computing Machinery / Computer science / Infosys / Pairing-based cryptography / RSA / IEEE P1363 / Cryptography / Public-key cryptography / Dan Boneh

The Tennessee Open Meetings Act passed by the General Assembly in 1974 requires that meetings of state, city and county government bodies be open to the public and that any such governmental body give adequate public not

Add to Reading List

Source URL: health.state.tn.us

Language: English - Date: 2015-03-27 14:41:02
24Year of birth missing / ID-based encryption / Association for Computing Machinery / Computer science / Infosys / Pairing-based cryptography / RSA / IEEE P1363 / Cryptography / Public-key cryptography / Dan Boneh

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2015-03-30 17:41:07
25Pairing / Weil pairing / Elliptic curve cryptography / Tate pairing / BLS / Elliptic curve / ID-based encryption / Power analysis / Side channel attack / Cryptography / Abstract algebra / Algebra

Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-24 04:01:18
26Key distribution / Wireless sensor network / ID-based encryption / Public-key cryptography / Key-agreement protocol / Pairing-based cryptography / Sensor node / Key / Elliptic curve cryptography / Cryptography / Key management / Cryptographic protocols

TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira UNICAMP, Brazil

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-07 17:26:25
27Computational hardness assumptions / Diffie–Hellman key exchange / Diffie–Hellman problem / Weil pairing / ID-based encryption / Password authentication protocol / Public-key cryptography / Boneh/Franklin scheme / Cryptography / Cryptographic protocols / Finite fields

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
28XTR / ID-based encryption / Diffie–Hellman key exchange / Weil pairing / RSA / Cyberwarfare / Mathematics / Applied mathematics / Cryptographic protocols / Cryptography / Public-key cryptography

Microsoft Word - Weakness of shim’s New ID-based tripartite multiple-key agreement protocol最終版.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-13 03:19:10
29Finite fields / Cryptographic protocols / Diffie–Hellman problem / Pairing-based cryptography / Hellman / Diffie–Hellman key exchange / Discrete logarithm / Whitfield Diffie / BLS / Cryptography / Abstract algebra / Computational hardness assumptions

Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 11:38:03
30

An abridged version of this paper appears in The 4th International Conference on Pairing Based Cryptography (Pairing 2010), M. Joyce, A. Miyaji and A. Otsuka (Eds.), LNCS 6487, pp, This is the full ve

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-28 17:44:29
    UPDATE