Results 1 to 10 of about 12,967 (325)
Report on Pairing-based Cryptography. [PDF]
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings.
Moody D +5 more
europepmc +4 more sources
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of
Helena Rifà-Pous +1 more
doaj +6 more sources
I2PA: An Efficient ABC for IoT [PDF]
The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography.
Ibou Sene +2 more
doaj +5 more sources
Arithmetic Operators for Pairing-Based Cryptography [PDF]
Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of protocols. Software implementations being rather slow, the study of hardware architectures became an active research area. In this paper, we first study an accelerator for the i¾?
Jean-Luc Beuchat +3 more
openalex +4 more sources
A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems.
Sheng Ding, Chen Li, Hui Li
doaj +2 more sources
Security Analysis of Pairing-based Cryptography [PDF]
8 figures, 8 tables, 5121 ...
Xiaofeng Wang, Peng Zheng, Qianqian Xing
openalex +3 more sources
Using Abelian Varieties to Improve Pairing-Based Cryptography [PDF]
In this long and quite technical paper the authors study several aspects of Pairing-Based Cryptography. Bilinear pairings (Weil and Tate pairings) on elliptic curves or higher dimensional abelian varieties are used in Cryptography both in a constructive and destructive way, see [Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, FL:
Karl Rubin, Alice Silverberg
openalex +3 more sources
Improving side-channel attacks against pairing-based cryptography [PDF]
Although the vulnerability of pairing-based algorithms to side-channel attacks has been demonstrated—pairing implementations were targeted on three different devices in a recent paper [41]—it nevertheless remains difficult to choose an adapted leakage model and detect points of interest.
Damien Jauvart +3 more
openalex +6 more sources
On finite fields for pairing based cryptography
Here, we improve our previous bound on the number of finite fields over which elliptic curves of cryptographic interest with a given embedding degree and small complex multiplication discriminant may exist. We also give some heuristic arguments which lead to a lower bound which in some cases is close to our upper bound.
Igor E. Shparlinski, Florian Luca
openalex +3 more sources
High Security Pairing-Based Cryptography Revisited
The security and performance of pairing based cryptography has provoked a large volume of research, in part because of the exciting new cryptographic schemes that it underpins. We re-examine how one should implement pairings over ordinary elliptic curves for various practical levels of security.
Robert Granger +2 more
openalex +3 more sources

