Results 231 to 240 of about 671,694 (290)
Some of the next articles are maybe not open access.

Automated Proofs of Pairing-Based Cryptography

Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Analyzing cryptographic constructions in the computational model, or simply verifying the correctness of security proofs, are complex and error-prone tasks. Although computer tools have significant potential to increase confidence in security proofs and to reduce the time for building these proofs, existing tools are either limited in scope, or can ...
Barthe, Gilles   +2 more
openaire   +2 more sources

Pairing-Based Cryptography

Handbook of Elliptic and Hyperelliptic Curve Cryptography, 2005
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced DL systems with bilinear structure. In this chapter we first give more applications of this construction, namely the extension of the tripartite protocol given before to multiparty key exchange, identity-based cryptography, and short signatures. In recent
Duquesne, S., Lange, T.
semanticscholar   +3 more sources

Pairing-Based Cryptography – Pairing 2012

Lecture Notes in Computer Science, 2013
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers
Abdalla, Michel, Lange, Tanja
semanticscholar   +4 more sources

Tampering Attacks in Pairing-Based Cryptography

2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
In the last decade pairings have become an important, and often indispensable, ingredient in the construction of identity-based and attribute-based cryptosystems, as well as group signatures and credential systems. Consequently, the applicability of timing, power, or fault attacks to implementations of pairings is an important research topic.
Johannes Blomer   +2 more
openaire   +2 more sources

Elliptic Curves Suitable for Pairing Based Cryptography

Designs, Codes and Cryptography, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Brezing, Friederike, Weng, Annegret
openaire   +3 more sources

Usability of pairing-based cryptography on smartphones

2015 38th International Conference on Telecommunications and Signal Processing (TSP), 2015
This paper deals with the usability of pairing-based cryptography on smartphones. Pairing-based cryptographic schemes can offer many advanced cryptographic primitives such as privacy protection, identity-based encryption and so on. These schemes are used to secure services and applications that may run on hand-held devices.
Lukas Malina, Jan Hajny, Vaclav Zeman
openaire   +2 more sources

Pairing based cryptography New random point exchange key protocol

International Conference on Mathematics and Computers in Sciences and in Industry, 2022
Piaring based cryptography (PBC) is one of the latest cryptographic protocols, PBC is based on pairing functions that are mapping two points on an elliptic curve into a finite field, pairing is a non-degenerate bilinear map.
Ismail Assoujaa   +2 more
semanticscholar   +1 more source

Efficient Pairing-Based Cryptography on Raspberry Pi

Journal of Communications, 2018
Yuki Nanjo   +3 more
openaire   +2 more sources

Pairing-Based Cryptography – Pairing 2013

Lecture Notes in Computer Science, 2014
Z. Cao, Fangguo Zhang
openaire   +2 more sources

Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications

International Conference on Cryptography, Security and Privacy, 2019
Technology development has led to rapid increase in demands for multimedia applications. Due to this demand, digital archives are increasingly used to store these multimedia contents.
V. Reshma   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy