Results 1 to 10 of about 12,967 (325)

Report on Pairing-based Cryptography. [PDF]

open access: diamondJ Res Natl Inst Stand Technol, 2015
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings.
Moody D   +5 more
europepmc   +4 more sources

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yesFuture Internet, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations of
Helena Rifà-Pous   +1 more
doaj   +6 more sources

I2PA: An Efficient ABC for IoT [PDF]

open access: yesCryptography, 2019
The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography.
Ibou Sene   +2 more
doaj   +5 more sources

Arithmetic Operators for Pairing-Based Cryptography [PDF]

open access: green, 2007
Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of protocols. Software implementations being rather slow, the study of hardware architectures became an active research area. In this paper, we first study an accelerator for the i¾?
Jean-Luc Beuchat   +3 more
openalex   +4 more sources

A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT

open access: goldIEEE Access, 2018
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems.
Sheng Ding, Chen Li, Hui Li
doaj   +2 more sources

Security Analysis of Pairing-based Cryptography [PDF]

open access: green, 2023
8 figures, 8 tables, 5121 ...
Xiaofeng Wang, Peng Zheng, Qianqian Xing
openalex   +3 more sources

Using Abelian Varieties to Improve Pairing-Based Cryptography [PDF]

open access: bronzeJournal of Cryptology, 2008
In this long and quite technical paper the authors study several aspects of Pairing-Based Cryptography. Bilinear pairings (Weil and Tate pairings) on elliptic curves or higher dimensional abelian varieties are used in Cryptography both in a constructive and destructive way, see [Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton, FL:
Karl Rubin, Alice Silverberg
openalex   +3 more sources

Improving side-channel attacks against pairing-based cryptography [PDF]

open access: greenJournal of Cryptographic Engineering, 2019
Although the vulnerability of pairing-based algorithms to side-channel attacks has been demonstrated—pairing implementations were targeted on three different devices in a recent paper [41]—it nevertheless remains difficult to choose an adapted leakage model and detect points of interest.
Damien Jauvart   +3 more
openalex   +6 more sources

On finite fields for pairing based cryptography

open access: hybridAdvances in Mathematics of Communications, 2007
Here, we improve our previous bound on the number of finite fields over which elliptic curves of cryptographic interest with a given embedding degree and small complex multiplication discriminant may exist. We also give some heuristic arguments which lead to a lower bound which in some cases is close to our upper bound.
Igor E. Shparlinski, Florian Luca
openalex   +3 more sources

High Security Pairing-Based Cryptography Revisited

open access: gold, 2006
The security and performance of pairing based cryptography has provoked a large volume of research, in part because of the exciting new cryptographic schemes that it underpins. We re-examine how one should implement pairings over ordinary elliptic curves for various practical levels of security.
Robert Granger   +2 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy