Pairing-based cryptography

Results: 49



#Item
41Pairing / Institute of Biological Engineering / Cryptography / Mathematics / Pairing-based cryptography

Déjà Q: Using Dual Systems to Revisit q-Type Assumptions Melissa Chase (MSR Redmond) Sarah Meiklejohn (UC San Diego → University College London)

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:42
42Post-quantum cryptography / Standards organizations / Public-key cryptography / NTRU / ID-based encryption / Institute of Electrical and Electronics Engineers / Pairing / Cryptography / IEEE standards / IEEE P1363

IEEE P1363.3: Standard for Identity-Based Cryptographic Techniques using Pairings CALL FOR SUBMISSIONS Contributions are requested for the IEEE P1363.3 project, "Standard for Identity-Based Cryptographic Techniques usin

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:33
43Mathematics / Boneh/Franklin scheme / Pairing / XTR / Supersingular elliptic curve / Elliptic curve / ID-based encryption / RSA / Weil pairing / Abstract algebra / Cryptography / Algebra

FAULT ATTACKS ON PAIRING-BASED PROTOCOLS REVISITED SANJIT CHATTERJEE, KORAY KARABINA, AND ALFRED MENEZES Abstract. Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-06-20 19:35:34
44Elliptic curves / Cryptography / Group theory / Finite fields / Linear algebra / Elliptic curve cryptography / Pairing / Elliptic curve / Supersingular elliptic curve / Algebra / Abstract algebra / Mathematics

SUBMITTED TO JOURNAL OF 1 Software implementation of an Attribute-Based Encryption scheme

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-05-30 22:32:03
45Public-key cryptography / Signcryption / Digital signature / Cipher / Pairing-based cryptography / Key / Proxy re-encryption / Boneh/Franklin scheme / Cryptography / ID-based encryption / ID-based cryptography

Pairing-based Cryptography: Identity Based Encryption and Beyond

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:22:20
46Diffie–Hellman problem / Group signature / Digital signature / ID-based encryption / Weil pairing / Pairing / RSA / Diffie–Hellman key exchange / Public-key cryptography / Cryptography / BLS / Pairing-based cryptography

Short Signature Scheme From Bilinear Pairings Sedat Akleylek , Barı¸s B¨ ulent Kırlar

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2009-06-09 04:23:16
47Logarithms / Computational hardness assumptions / Modular arithmetic / Key size / Cryptanalysis / Pairing-based cryptography / Discrete logarithm / Public-key cryptography / Encryption / Cryptography / Abstract algebra / Mathematics

PDF Document

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-09-12 01:05:36
48Finite fields / Elliptic curves / Cryptographic protocols / Elliptic curve cryptography / Supersingular elliptic curve / Elliptic curve / SPEKE / ID-based encryption / Weil pairing / Abstract algebra / Cryptography / Algebra

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-10 06:55:07
49Public-key cryptography / IEEE P1363 / ID-based encryption / IEEE Standards Association / Pairing / Proxy re-encryption / Institute of Electrical and Electronics Engineers / Cryptographic primitive / Signcryption / Cryptography / IEEE standards / Standards organizations

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-05-13 13:20:44
UPDATE