Pairing-based cryptography and its security analysis
From MaRDI portal
Publication:3408092
zbMATH Open1197.94206MaRDI QIDQ3408092FDOQ3408092
Authors: Tsuyoshi Takagi
Publication date: 24 February 2010
Recommendations
Cited In (13)
- Pairings in Trusted Computing
- On Pairing Inversion Problems
- Simplified pairing computation and security implications
- Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography
- On pairing-based cryptosystems
- Pairing-based cryptography -- Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13--15, 2010. Proceedings
- There is no safe pairing function over an arbitrary structure
- The brave new world of bodacious assumptions in cryptography
- Guide to pairing-based cryptography
- Pairing-based cryptography and its security analysis
- A survey of pairing-based cryptography
- Security analysis of SM9 key agreement and encryption
- Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing
This page was built for publication: Pairing-based cryptography and its security analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3408092)