On the efficient implementation of pairing-based protocols
From MaRDI portal
Publication:3104702
Recommendations
Cites work
- scientific article; zbMATH DE number 1689862 (Why is no real title available?)
- scientific article; zbMATH DE number 1952905 (Why is no real title available?)
- scientific article; zbMATH DE number 2081084 (Why is no real title available?)
- A taxonomy of pairing-friendly elliptic curves
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Elliptic Curve Cryptography
- Affine pairings on ARM
- An analysis of affine coordinates for pairing computation
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field
- Constructing tower extensions of finite fields for implementation of pairing-based cryptography
- Discrete logarithms: The past and the future
- Efficient and Generalized Pairing Computation on Abelian Varieties
- Efficient implementation of pairing-based cryptosystems
- Efficient pairing computation on supersingular abelian varieties
- Elliptic curves suitable for pairing based cryptography
- Faster explicit formulas for computing pairings over ordinary curves
- Fixed argument pairings
- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves
- Inner-product encryption under standard assumptions
- Optimal Pairings
- Pairing-Friendly Elliptic Curves of Prime Order
- Pairings for cryptographers
- Reducing elliptic curve logarithms to logarithms in a finite field
- The Eta Pairing Revisited
- The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
- Topics in Cryptology – CT-RSA 2005
Cited in
(15)- An efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control system
- Efficient Implementations of MQPKS on Constrained Devices
- Secure and Efficient Pairing at 256-Bit Security Level
- Efficient optimal ate pairing at 128-bit security level
- Subgroup security in pairing-based cryptography
- Improving the computation of the optimal ate pairing for a high security level
- EFFICIENT PAIRING FUNCTIONS — AND WHY YOU SHOULD CARE
- A survey of fault attacks in pairing based cryptography
- Beta Weil pairing revisited
- Compact structure-preserving signatures with almost tight security
- Designing a code generator for pairing based cryptographic functions
- Efficient implementation of bilinear pairings on ARM processors
- Tower building technique on elliptic curve with embedding degree 18
- On the implementation of a pairing-based cryptographic protocol in a constrained device
- Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority
This page was built for publication: On the efficient implementation of pairing-based protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3104702)