Pages that link to "Item:Q1772226"
From MaRDI portal
The following pages link to Evidence that XTR is more secure than supersingular elliptic curve cryptosystems (Q1772226):
Displaying 26 items.
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- An improved two-party identity-based authenticated key agreement protocol using pairings (Q414861) (← links)
- On the elliptic curves \(y^{2}=x^{3} - c\) with embedding degree one (Q555157) (← links)
- The Diffie-Hellman problem and generalization of Verheul's theorem (Q735041) (← links)
- Trapdoor DDH groups from pairings and isogenies (Q832364) (← links)
- Pairing-based cryptography on elliptic curves (Q1616164) (← links)
- A taxonomy of pairing-friendly elliptic curves (Q2267367) (← links)
- Elliptic curve cryptography: the serpentine course of a paradigm shift (Q2430981) (← links)
- Heuristics of the Cocks-Pinch method (Q2437964) (← links)
- Design of improved password authentication and update scheme based on elliptic curve cryptography (Q2450508) (← links)
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman (Q2835601) (← links)
- Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves (Q2889998) (← links)
- Elliptic curves with<i>j</i>= 0,1728 and low embedding degree (Q2958273) (← links)
- Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2 (Q3104703) (← links)
- Cryptanalysis of Pairing-Based Cryptosystems Over Small Characteristic Fields (Q3455007) (← links)
- Efficiently Computable Distortion Maps for Supersingular Curves (Q3502729) (← links)
- The Hidden Root Problem (Q3600495) (← links)
- Pairing Computation on Twisted Edwards Form Elliptic Curves (Q3600505) (← links)
- Revisiting Pairing Based Group Key Exchange (Q3603004) (← links)
- XTR Algorithm: Efficient and Compact Subgroup Trace Representation (Q5050169) (← links)
- Compact hierarchical identity-based encryption based on a harder decisional problem (Q5259051) (← links)
- An Analysis of the Vector Decomposition Problem (Q5445460) (← links)
- A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks (Q5502757) (← links)
- Efficient Compression of SIDH Public Keys (Q5738894) (← links)
- Algebraic curves and cryptography (Q5921638) (← links)
- On cycles of pairing-friendly abelian varieties (Q6653047) (← links)