Results 281 to 290 of about 12,967 (325)
Some of the next articles are maybe not open access.
2021
Following the patterns of the modern world, it is justifiable to say that Data is one of the most valuable assets today. This change in perspective has resulted in a usefulness and popularity boost to previously neglected fields like Information security and cryptography. Cryptography, i.e.
Ansh Riyal +2 more
openaire +1 more source
Following the patterns of the modern world, it is justifiable to say that Data is one of the most valuable assets today. This change in perspective has resulted in a usefulness and popularity boost to previously neglected fields like Information security and cryptography. Cryptography, i.e.
Ansh Riyal +2 more
openaire +1 more source
Pairing-Based Cryptography on Elliptic Curves
Mathematics in Computer Science, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Miret, Josep M. +2 more
openaire +2 more sources
jPBC: Java pairing based cryptography
2011 IEEE Symposium on Computers and Communications (ISCC), 2011It has been recently discovered that some cyclic groups that could be used in Cryptography admit a special bilinear pairing map that introduces extra structure to the group. Bilinear pairing maps were first used to break cryptosystems (see, for example, [1], [2], [3]) and later it was realized that the extra structure could be exploited to build ...
DE CARO, ANGELO, IOVINO, Vincenzo
openaire +2 more sources
2005
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced DL systems with bilinear structure. In this chapter we first give more applications of this construction, namely the extension of the tripartite protocol given before to multiparty key exchange, identity-based cryptography, and short signatures. In recent
Duquesne, S., Lange, T.
openaire +1 more source
Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced DL systems with bilinear structure. In this chapter we first give more applications of this construction, namely the extension of the tripartite protocol given before to multiparty key exchange, identity-based cryptography, and short signatures. In recent
Duquesne, S., Lange, T.
openaire +1 more source
Pairing-Based Cryptography – Pairing 2012
2013This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers
Abdalla, Michel, Lange, Tanja
openaire +3 more sources
Elliptic Curves Suitable for Pairing Based Cryptography
Designs, Codes and Cryptography, 2005zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Brezing, Friederike, Weng, Annegret
openaire +2 more sources
Tampering Attacks in Pairing-Based Cryptography
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014In the last decade pairings have become an important, and often indispensable, ingredient in the construction of identity-based and attribute-based cryptosystems, as well as group signatures and credential systems. Consequently, the applicability of timing, power, or fault attacks to implementations of pairings is an important research topic.
Johannes Blomer +2 more
openaire +1 more source
Automated Proofs of Pairing-Based Cryptography
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015Analyzing cryptographic constructions in the computational model, or simply verifying the correctness of security proofs, are complex and error-prone tasks. Although computer tools have significant potential to increase confidence in security proofs and to reduce the time for building these proofs, existing tools are either limited in scope, or can ...
Barthe, Gilles +2 more
openaire +1 more source
Securing pairing-based cryptography on smartcards
International Journal of Information and Computer Security, 2012Research efforts have produced many algorithms for fast pairing computation and several efficient hardware implementations. However, side channel attacks (SCAs) are a serious threat on hardware implementations. Previous works in this area have provided some costly countermeasures against side channel attacks.
openaire +1 more source
Guide to Pairing-Based Cryptography
2017This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based ...
openaire +1 more source

