scientific article; zbMATH DE number 1942431

From MaRDI portal
Publication:4409129

zbMath1026.94520MaRDI QIDQ4409129

No author found.

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420354.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (90)

Efficient three-party authenticated key agreement protocol in certificateless cryptographyComputing discrete logarithms in cryptographically-interesting characteristic-three finite fieldsFaster Hashing to ${\mathbb G}_2$Identity based group key agreement in multiple PKG environmentSigncryption-based key management for MANETs applications in mobile commerceIdetity based group key agreement from bilinear pairingA strongly secure identity-based authenticated group key exchange protocolOn the distribution of irreducible trinomials over \(\mathbb F_3\)Further refinements of Miller's algorithm on Edwards curvesMultibase scalar multiplications in cryptographic pairingsImproved generalized Atkin algorithm for computing square roots in finite fieldsA certificateless public key encryption based return routability protocol for next-generation IP mobility to enhance signalling security and reduce latencyFurther refinement of pairing computation based on Miller's algorithmPerfect forward secure identity-based authenticated key agreement protocol in the escrow modeA pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumptionAn Efficient and Provably Secure Certificate-Based Encryption SchemeEfficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic CurvesA comparison of MNT curves and supersingular curvesFormulas for cube roots in \(\mathbb F_{3^m}\)The generalized Weil pairing and the discrete logarithm problem on elliptic curvesAn ID-based authenticated dynamic group key agreement with optimal roundComplexity of computation in finite fieldsAn efficient identity-based key exchange protocol with KGS forward secrecy for low-power devicesSelf-pairings on supersingular elliptic curves with embedding degree \textit{three}Scalable zero knowledge via cycles of elliptic curvesImplementing optimized pairings with elliptic netsCertificateless message recovery signatures providing Girault's level-3 securityAn Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured ChannelsConstruction of a Hybrid HIBE Protocol Secure Against Adaptive AttacksEfficient proxy signcryption scheme with provable CCA and CMA securityAn improved two-party identity-based authenticated key agreement protocol using pairingsComputing bilinear pairings on elliptic curves with automorphismsIdentity-based chameleon hashing and signatures without key exposureBackdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networksFaster computation of the Tate pairingOptimal pairing computation over families of pairing-friendly elliptic curvesFormulas for cube roots in \(\mathbb F_{3^m}\) using shifted polynomial basisOn hardware and software implementation of arithmetic in finite fields of characteristic 7 for calculation of pairingsEta pairing computation on general divisors over hyperelliptic curves \(y^2=x^p - x+d\)Private key agreement and secure communication for heterogeneous sensor networksNon-interactive identity-based threshold signature scheme without random oraclesOrdinary Abelian varieties having small embedding degreeA mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsChoosing and generating parameters for pairing implementation on BN curvesEfficient Tate pairing computation using double-base chainsMultiple point compression on elliptic curvesTate and Ate pairings for \(y^2=x^5-\alpha x\) in characteristic fiveAn efficient ring signature scheme from pairingsAlgebraic curves and cryptographyIdentity-based authenticated key agreement protocol based on Weil pairingEfficient Compression of SIDH Public KeysA pairing-based publicly verifiable secret sharing schemeGenerating more MNT elliptic curvesA taxonomy of pairing-friendly elliptic curvesEfficient algorithms for Koblitz curves over fields of characteristic threeAn Efficient ID-Based Proxy Signature Scheme from PairingsConstructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic FieldPairing Computation on Twisted Edwards Form Elliptic CurvesSpeeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable AutomorphismsFaster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-AdditionA Comparison between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$Identity-based trapdoor mercurial commitments and applicationsAn Analysis of Affine Coordinates for Pairing ComputationAn Analysis of the Vector Decomposition ProblemOptimised Versions of the Ate and Twisted Ate PairingsWeakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptographyAn improved identity-based key agreement protocol and its security proofComputing pairings using \(x\)-coordinates onlyA strong provably secure IBE scheme without bilinear mapSecure and Efficient Group Key Agreements for Cluster Based NetworksA Schnorr-Like Lightweight Identity-Based Signature SchemeMultisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key ModelOn the Final Exponentiation for Calculating Pairings on Ordinary Elliptic CurvesFaster Pairings on Special Weierstrass CurvesFast Hashing to G 2 on Pairing-Friendly CurvesEfficient Pairing Computation on Genus 2 Curves in Projective CoordinatesOn Software Parallel Implementation of Cryptographic PairingsCryptographic Pairings Based on Elliptic NetsBeta Weil pairing revisitedOn the relationship between squared pairings and plain pairingsIsomorphism classes of elliptic and hyperelliptic curves over finite fields \(\mathbb F_{(2g+1)^n}\)Efficient and Short Certificateless SignatureEfficient system parameters for Identity-Based Encryption using supersingular elliptic curvesCertificateless signature and proxy signature schemes from bilinear pairingsSeveral security schemes constructed using ECC-based self-certified public key cryptosystemsSigncryption with non-interactive non-repudiationA provably secure proxy signcryption scheme using bilinear pairingsTaking roots over high extensions of finite fieldsA conference key distribution systemOn the arithmetic operations over finite fields of characteristic three with low complexity






This page was built for publication: