Pages that link to "Item:Q3600489"
From MaRDI portal
The following pages link to Pairing-Based Cryptography – Pairing 2008 (Q3600489):
Displayed 23 items.
- Pairings in Trusted Computing (Q3600490) (← links)
- Pairing Lattices (Q3600491) (← links)
- The Uber-Assumption Family (Q3600492) (← links)
- Homomorphic Encryption and Signatures from Vector Decomposition (Q3600493) (← links)
- Hidden-Vector Encryption with Groups of Prime Order (Q3600494) (← links)
- The Hidden Root Problem (Q3600495) (← links)
- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography (Q3600496) (← links)
- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group (Q3600497) (← links)
- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field (Q3600498) (← links)
- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials (Q3600499) (← links)
- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties (Q3600500) (← links)
- Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2 = x 5 + ax (Q3600501) (← links)
- Integer Variable χ–Based Ate Pairing (Q3600504) (← links)
- Pairing Computation on Twisted Edwards Form Elliptic Curves (Q3600505) (← links)
- Exponentiation in Pairing-Friendly Groups Using Homomorphisms (Q3600506) (← links)
- Generators for the ℓ-Torsion Subgroup of Jacobians of Genus Two Curves (Q3600508) (← links)
- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms (Q3600509) (← links)
- Pairings on Hyperelliptic Curves with a Real Model (Q3600510) (← links)
- Faster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition (Q3600511) (← links)
- A Comparison between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$ (Q3600512) (← links)
- One-Round ID-Based Blind Signature Scheme without ROS Assumption (Q3600513) (← links)
- Tracing Malicious Proxies in Proxy Re-encryption (Q3600514) (← links)
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities (Q3600515) (← links)