Pairing-based cryptography

Results: 49



#Item
1Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1  Department of Combinatorics & Optimization, University of Water

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-12-27 11:29:50
2EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: fellows.acm.org

Language: English - Date: 2015-03-30 17:41:07
3Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-03 16:15:38
4The S˜ao Paulo Advanced School of Cryptography — SP-ASCryptoHardware Implementation of Pairings Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN, Mexico City, Mexico

The S˜ao Paulo Advanced School of Cryptography — SP-ASCryptoHardware Implementation of Pairings Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN, Mexico City, Mexico

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2011-10-24 22:54:15
5Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-23 04:37:54
6A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

Add to Reading List

Source URL: www.anagram.com

Language: English - Date: 2010-11-11 14:43:35
7Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
8Abelian varieties, theta functions and cryptography Part 2 Damien Robert1 1

Abelian varieties, theta functions and cryptography Part 2 Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
9Microsoft Word - FIDE_SPP_Meeting_2012_Annex4.rtf

Microsoft Word - FIDE_SPP_Meeting_2012_Annex4.rtf

Add to Reading List

Source URL: pairings.fide.com

Language: English - Date: 2014-08-17 23:43:25
10Applications of Pairing Inversion The Pairing Zoo Miller Inversion Pairing Inversion  Aspects of Pairing Inversion

Applications of Pairing Inversion The Pairing Zoo Miller Inversion Pairing Inversion Aspects of Pairing Inversion

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-08 07:01:02