scientific article; zbMATH DE number 1942431
From MaRDI portal
Publication:4409129
zbMATH Open1026.94520MaRDI QIDQ4409129FDOQ4409129
Authors:
Publication date: 30 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420354.htm
Title of this publication is not available (Why is that?)
Recommendations
Cryptography (94A60) Number-theoretic algorithms; complexity (11Y16) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cited In (only showing first 100 items - show all)
- Efficient Tate pairing computation using double-base chains
- A Schnorr-Like Lightweight Identity-Based Signature Scheme
- Tate and Ate pairings for \(y^2=x^5-\alpha x\) in characteristic five
- Computing pairings using \(x\)-coordinates only
- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field
- Self-pairings on supersingular elliptic curves with embedding degree \textit{three}
- Pairing Computation on Twisted Edwards Form Elliptic Curves
- Taking roots over high extensions of finite fields
- Computing bilinear pairings on elliptic curves with automorphisms
- Certificateless message recovery signatures providing Girault's level-3 security
- Title not available (Why is that?)
- On the distribution of irreducible trinomials over \(\mathbb F_3\)
- A pairing-based publicly verifiable secret sharing scheme
- Secure and Efficient Group Key Agreements for Cluster Based Networks
- An improved two-party identity-based authenticated key agreement protocol using pairings
- Improved generalized Atkin algorithm for computing square roots in finite fields
- Algebraic curves and cryptography
- Optimal pairing computation over families of pairing-friendly elliptic curves
- Optimised Versions of the Ate and Twisted Ate Pairings
- A strong provably secure IBE scheme without bilinear map
- Algorithmic Number Theory
- Efficient algorithms for Koblitz curves over fields of characteristic three
- A comparison of MNT curves and supersingular curves
- Identity-based trapdoor mercurial commitments and applications
- Faster and lower memory scalar multiplication on supersingular curves in characteristic three
- Fast symmetric pairing revisited
- An improved identity-based key agreement protocol and its security proof
- Formulas for cube roots in \(\mathbb F_{3^m}\)
- Further refinements of Miller's algorithm on Edwards curves
- Multibase scalar multiplications in cryptographic pairings
- The generalized Weil pairing and the discrete logarithm problem on elliptic curves
- An Analysis of the Vector Decomposition Problem
- Efficient and Short Certificateless Signature
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
- A taxonomy of pairing-friendly elliptic curves
- Faster hashing to \({\mathbb G}_2\)
- Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography
- The realm of the pairings
- Efficient proxy signcryption scheme with provable CCA and CMA security
- Implementing optimized pairings with elliptic nets
- Selected Areas in Cryptography
- Topics in Cryptology – CT-RSA 2005
- Identity-based chameleon hashing and signatures without key exposure
- Faster computation of the Tate pairing
- Generating more MNT elliptic curves
- A provably secure proxy signcryption scheme using bilinear pairings
- On Software Parallel Implementation of Cryptographic Pairings
- Isomorphism classes of elliptic and hyperelliptic curves over finite fields \(\mathbb F_{(2g+1)^n}\)
- Faster Pairings on Special Weierstrass Curves
- On the relationship between squared pairings and plain pairings
- Formulas for cube roots in \(\mathbb F_{3^m}\) using shifted polynomial basis
- On Small Characteristic Algebraic Tori in Pairing-Based Cryptography
- Implementing cryptographic pairings
- An ID-based authenticated dynamic group key agreement with optimal round
- Efficient three-party authenticated key agreement protocol in certificateless cryptography
- Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
- Further refinement of pairing computation based on Miller's algorithm
- Eta pairing computation on general divisors over hyperelliptic curves \(y^2=x^p - x+d\)
- A conference key distribution system
- Identity-based authenticated key agreement protocol based on Weil pairing
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves
- Complexity of computation in finite fields
- Certificateless signature and proxy signature schemes from bilinear pairings
- Private key agreement and secure communication for heterogeneous sensor networks
- Multiple point compression on elliptic curves
- Non-interactive identity-based threshold signature scheme without random oracles
- Several security schemes constructed using ECC-based self-certified public key cryptosystems
- An efficient ring signature scheme from pairings
- Identity based group key agreement in multiple PKG environment
- Signcryption-based key management for MANETs applications in mobile commerce
- Idetity based group key agreement from bilinear pairing
- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels
- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms
- Efficient compression of SIDH public keys
- Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates
- Efficient system parameters for identity-based encryption using supersingular elliptic curves
- Signcryption with non-interactive non-repudiation
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields
- Choosing and generating parameters for pairing implementation on BN curves
- On hardware and software implementation of arithmetic in finite fields of characteristic 7 for calculation of pairings
- A Comparison between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$
- On the arithmetic operations over finite fields of characteristic three with low complexity
- A certificateless public key encryption based return routability protocol for next-generation IP mobility to enhance signalling security and reduce latency
- A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption
- EFFICIENT PAIRING FUNCTIONS — AND WHY YOU SHOULD CARE
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
- Fast Hashing to G 2 on Pairing-Friendly Curves
- A strongly secure identity-based authenticated group key exchange protocol
- Beta Weil pairing revisited
- An analysis of affine coordinates for pairing computation
- Ordinary Abelian varieties having small embedding degree
- Efficient implementation of pairing-based cryptosystems
- Scalable zero knowledge via cycles of elliptic curves
- Constructing tower extensions of finite fields for implementation of pairing-based cryptography
- Cryptanalysis of pairing-based cryptosystems over small characteristic fields
- An Efficient ID-Based Proxy Signature Scheme from Pairings
- Designing efficient dyadic operations for cryptographic applications
- Pairings in rank-1 constraint systems
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4409129)