Results 1 to 10 of about 671,694 (290)

Report on Pairing-based Cryptography. [PDF]

open access: yesJ Res Natl Inst Stand Technol, 2015
This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standardized in other standard bodies. The report reviews the mathematical background of pairings.
Moody D   +5 more
europepmc   +4 more sources

Security Analysis of Pairing-based Cryptography [PDF]

open access: yesarXiv.org, 2023
8 figures, 8 tables, 5121 ...
Wang, Xiaofeng   +2 more
openaire   +3 more sources

Improving side-channel attacks against pairing-based cryptography [PDF]

open access: yesJournal of Cryptographic Engineering, 2017
Although the vulnerability of pairing-based algorithms to side-channel attacks has been demonstrated—pairing implementations were targeted on three different devices in a recent paper [41]—it nevertheless remains difficult to choose an adapted leakage model and detect points of interest.
Jauvart, Damien   +3 more
openaire   +5 more sources

Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X

open access: yesSensors, 2021
5G-Vehicle-to-Everything (5G-V2X) supports high-reliability and low latency autonomous services and applications. Proposing an efficient security solution that supports multi-zone broadcast authentication and satisfies the 5G requirement is a critical ...
Shimaa A. Abdel Hakeem, HyungWon Kim
doaj   +2 more sources

Subgroup Security in Pairing-Based Cryptography [PDF]

open access: yesInternational Conference on Cryptology and Information Security in Latin America, 2015
Pairings are typically implemented using ordinary pairing-friendly elliptic curves. The two input groups of the pairing function are groups of elliptic curve points, while the target group lies in the multiplicative group of a large finite field. At moderate levels of security, at least two of the three pairing groups are necessarily proper subgroups ...
Barreto, Paulo S.L.M.   +5 more
openaire   +3 more sources

Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Home-based multi-sensor Internet of Things, as a typical application of Internet of Things, interconnects a variety of intelligent sensor devices and appliances to provide intelligent services to individuals in a ubiquitous way.
Binbin Yu, Hongtu Li
doaj   +2 more sources

A Fault Attack on Pairing-Based Cryptography [PDF]

open access: yesIEEE Transactions on Computers, 2006
Current fault attacks against public key cryptography focus on traditional schemes, such as RSA and ECC, and, to a lesser extent, on primitives such as XTR. However, bilinear maps, or pairings, have presented theorists with a new and increasingly popular way of constructing cryptographic protocols.
Page, DS, Vercauteren, Frederik R G
openaire   +2 more sources

Pairing-Based Cryptography: Past, Present, and Future [PDF]

open access: yesInternational Conference on the Theory and Application of Cryptology and Information Security, 2012
While pairings were first introduced in cryptography as a tool to attack the discrete-log problem on certain elliptic curves, they have since found numerous applications in the construction of cryptographic systems. To this day many problems can only be solved using pairings.
D. Boneh
openaire   +2 more sources

Pairing-Based Cryptography at High Security Levels [PDF]

open access: yesIMA Conference on Cryptography and Coding, 2005
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solution by Boneh and Franklin [8] of the problem of efficient identity-based encryption.
Neal Koblitz, Alfred Menezes
openaire   +2 more sources

The review on elliptic curves as cryptographic pairing groups [PDF]

open access: yesMathematics and Computational Sciences, 2021
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj   +1 more source

Home - About - Disclaimer - Privacy