Results 241 to 250 of about 12,868 (287)
Bitwise XOR linear space creation through permutation and the ease to enable XOR-free processes. [PDF]
Shetty S +3 more
europepmc +1 more source
Lightweight signcryption scheme for Securing wearable sensor observed health data sharing in internet of medical things paradigm. [PDF]
Ghazal TM +7 more
europepmc +1 more source
Lightweight ECC-Based Self-Healing Federated Learning Framework for Secure IIoT Networks. [PDF]
Salim MM, Naaz F, Choi K.
europepmc +1 more source
An Improved SM2 Digital Signature Algorithm with High-Precision Timestamps for Trusted Metrological Data. [PDF]
Cao Z, Gao B, Xiong X, Liu Z.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Pairing-Based Cryptography on Elliptic Curves
Mathematics in Computer Science, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Miret, Josep M. +2 more
openaire +4 more sources
2021
Following the patterns of the modern world, it is justifiable to say that Data is one of the most valuable assets today. This change in perspective has resulted in a usefulness and popularity boost to previously neglected fields like Information security and cryptography. Cryptography, i.e.
Ansh Riyal +2 more
openaire +1 more source
Following the patterns of the modern world, it is justifiable to say that Data is one of the most valuable assets today. This change in perspective has resulted in a usefulness and popularity boost to previously neglected fields like Information security and cryptography. Cryptography, i.e.
Ansh Riyal +2 more
openaire +1 more source
jPBC: Java pairing based cryptography
2011 IEEE Symposium on Computers and Communications (ISCC), 2011It has been recently discovered that some cyclic groups that could be used in Cryptography admit a special bilinear pairing map that introduces extra structure to the group. Bilinear pairing maps were first used to break cryptosystems (see, for example, [1], [2], [3]) and later it was realized that the extra structure could be exploited to build ...
DE CARO, ANGELO, IOVINO, Vincenzo
openaire +2 more sources
2005
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced DL systems with bilinear structure. In this chapter we first give more applications of this construction, namely the extension of the tripartite protocol given before to multiparty key exchange, identity-based cryptography, and short signatures. In recent
Duquesne, S., Lange, T.
openaire +1 more source
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced DL systems with bilinear structure. In this chapter we first give more applications of this construction, namely the extension of the tripartite protocol given before to multiparty key exchange, identity-based cryptography, and short signatures. In recent
Duquesne, S., Lange, T.
openaire +1 more source
Pairing-Based Cryptography – Pairing 2012
2013This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers
Abdalla, Michel, Lange, Tanja
openaire +3 more sources

