Pairing-based cryptography

Results: 49



#Item
1Algebra / Mathematics / Polynomials / Computer algebra / Integer factorization algorithms / Finite fields / Special number field sieve / General number field sieve / Irreducible polynomial / Discrete logarithm / Factorization / Resultant

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-12-27 11:29:50
2Cryptography / Public-key cryptography / Identity-based cryptography / Elliptic curve cryptography / Dan Boneh / ID-based encryption / Association for Computing Machinery / Pairing-based cryptography / Boneh / Infosys / ID-based cryptography / Computer science

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: fellows.acm.org

Language: English - Date: 2015-03-30 17:41:07
3Cryptography / Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Finite fields / Group theory / Hyperelliptic curve cryptography / Tate pairing / DiffieHellman key exchange / BonehLynnShacham / Elliptic curve / Abelian variety

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-03 16:15:38
4Cryptography / Algebra / Elliptic curve cryptography / Mathematics / Pairing-based cryptography / Elliptic curves / Elliptic curve / Tate pairing / Supersingular elliptic curve / Pairing / Curve

The S˜ao Paulo Advanced School of Cryptography — SP-ASCryptoHardware Implementation of Pairings Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN, Mexico City, Mexico

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2011-10-24 22:54:15
5Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-23 04:37:54
6Cryptography / Public-key cryptography / Algebra / Pairing-based cryptography / Elliptic curve cryptography / Elliptic curves / Linear algebra / Identity-based cryptography / Tate pairing / Weil pairing / Pairing / ID-based encryption

A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

Add to Reading List

Source URL: www.anagram.com

Language: English - Date: 2010-11-11 14:43:35
7Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Group theory / Binary operations / Hyperelliptic curve cryptography / Tate pairing / Elliptic curve / Abelian variety / Cryptography / DiffieHellman key exchange / BonehLynnShacham

Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
8Algebraic curves / Elliptic curve cryptography / Elliptic curves / Pairing-based cryptography / Group theory / Abelian variety / Tate pairing / Hyperelliptic curve / Weil restriction / Elliptic curve / Hyperelliptic curve cryptography / Weil pairing

Abelian varieties, theta functions and cryptography Part 2 Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
9Pairing-based cryptography / Swiss-system tournament / Sheepshead / Inequality / Ordered pair / Pairing

Microsoft Word - FIDE_SPP_Meeting_2012_Annex4.rtf

Add to Reading List

Source URL: pairings.fide.com

Language: English - Date: 2014-08-17 23:43:25
10Algebra / Mathematics / Abstract algebra / Pairing-based cryptography / Linear algebra / Module theory / Pairing / Parity of a permutation

Applications of Pairing Inversion The Pairing Zoo Miller Inversion Pairing Inversion Aspects of Pairing Inversion

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-08 07:01:02
UPDATE