Results 1 to 10 of about 671,694 (290)
Report on Pairing-based Cryptography. [PDF]
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings.
Moody D +5 more
europepmc +4 more sources
Security Analysis of Pairing-based Cryptography [PDF]
8 figures, 8 tables, 5121 ...
Wang, Xiaofeng +2 more
openaire +3 more sources
Improving side-channel attacks against pairing-based cryptography [PDF]
Although the vulnerability of pairing-based algorithms to side-channel attacks has been demonstrated—pairing implementations were targeted on three different devices in a recent paper [41]—it nevertheless remains difficult to choose an adapted leakage model and detect points of interest.
Jauvart, Damien +3 more
openaire +5 more sources
5G-Vehicle-to-Everything (5G-V2X) supports high-reliability and low latency autonomous services and applications. Proposing an efficient security solution that supports multi-zone broadcast authentication and satisfies the 5G requirement is a critical ...
Shimaa A. Abdel Hakeem, HyungWon Kim
doaj +2 more sources
Subgroup Security in Pairing-Based Cryptography [PDF]
Pairings are typically implemented using ordinary pairing-friendly elliptic curves. The two input groups of the pairing function are groups of elliptic curve points, while the target group lies in the multiplicative group of a large finite field. At moderate levels of security, at least two of the three pairing groups are necessarily proper subgroups ...
Barreto, Paulo S.L.M. +5 more
openaire +3 more sources
Home-based multi-sensor Internet of Things, as a typical application of Internet of Things, interconnects a variety of intelligent sensor devices and appliances to provide intelligent services to individuals in a ubiquitous way.
Binbin Yu, Hongtu Li
doaj +2 more sources
A Fault Attack on Pairing-Based Cryptography [PDF]
Current fault attacks against public key cryptography focus on traditional schemes, such as RSA and ECC, and, to a lesser extent, on primitives such as XTR. However, bilinear maps, or pairings, have presented theorists with a new and increasingly popular way of constructing cryptographic protocols.
Page, DS, Vercauteren, Frederik R G
openaire +2 more sources
Pairing-Based Cryptography: Past, Present, and Future [PDF]
While pairings were first introduced in cryptography as a tool to attack the discrete-log problem on certain elliptic curves, they have since found numerous applications in the construction of cryptographic systems. To this day many problems can only be solved using pairings.
D. Boneh
openaire +2 more sources
Pairing-Based Cryptography at High Security Levels [PDF]
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solution by Boneh and Franklin [8] of the problem of efficient identity-based encryption.
Neal Koblitz, Alfred Menezes
openaire +2 more sources
The review on elliptic curves as cryptographic pairing groups [PDF]
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj +1 more source

