-
1
-
-
35248835023
-
Constructing elliptic curves with prescribed embedding degrees
-
S. Cimato, C. Galdi, G. Persiano (Eds.), Security in Communication Networks - Third International Conference, SCN 2002, Amalfi, Italy, September 2002 Springer, Berlin
-
P. Barreto, B. Lynn, M. Scott, Constructing elliptic curves with prescribed embedding degrees, in: S. Cimato, C. Galdi, G. Persiano (Eds.), Security in Communication Networks - Third International Conference, SCN 2002, Amalfi, Italy, September 2002, Lecture Notes in Computer Science, vol. 2576, Springer, Berlin, 2003, pp. 257-267.
-
(2003)
Lecture Notes in Computer Science
, vol.2576
, pp. 257-267
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
-
2
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, SIAM J. Comput. 32 (3) (2003) 586-615
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
29244446683
-
Advances in cryptology - Crypto 2001
-
extended abstract Springer, Berlin
-
extended abstract in: J. Kilian (Ed.), Advances in Cryptology - Crypto 2001, Lecture Notes in Computer Science, vol. 2139, Springer, Berlin, pp. 514-532.
-
Lecture Notes in Computer Science
, vol.2139
, pp. 514-532
-
-
Kilian, J.1
-
4
-
-
84946840347
-
Short signatures from the Weil pairing
-
C. Boyd (Ed.), Advances in Cryptology - ASIACRYPT 2001 Springer, Berlin
-
D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, in: C. Boyd (Ed.), Advances in Cryptology - ASIACRYPT 2001, Lecture Notes in Computer Science, vol. 2248, Springer, Berlin, 2001, pp. 514-532.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
35248874429
-
Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
-
D. Boneh (Ed.), Advances in Cryptology - CRYPTO 2003 Springer, Berlin
-
X. Boyen, Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography, in: D. Boneh (Ed.), Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, vol. 2729, Springer, Berlin, 2003, pp. 383-399.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
6
-
-
29244432071
-
Elliptic curves suitable for pairing based cryptography
-
to appear in
-
F. Brezing, A. Weng, Elliptic curves suitable for pairing based cryptography, to appear in Designs, Codes and Cryptography (2003).
-
(2003)
Designs, Codes and Cryptography
-
-
Brezing, F.1
Weng, A.2
-
7
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
Y. Desmedt (Ed.)
-
J. Cha, J. Cheon, An identity-based signature from gap Diffie-Hellman groups, in: Y. Desmedt (Ed.), Public Key Cryptography - PKC 2003, 2002, pp. 18-30.
-
(2002)
Public Key Cryptography - PKC 2003
, pp. 18-30
-
-
Cha, J.1
Cheon, J.2
-
8
-
-
17444391606
-
Building curves with arbitrary small MOV degree over finite prime fields
-
R. Dupont, A. Enge, and F. Morain Building curves with arbitrary small MOV degree over finite prime fields J. Cryptology 18 2 2005 79 89
-
(2005)
J. Cryptology
, vol.18
, Issue.2
, pp. 79-89
-
-
Dupont, R.1
Enge, A.2
Morain, F.3
-
9
-
-
84968502759
-
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
-
G. Frey, and H.-G. Rück A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves Math. Comp. 62 206 1994 865 874
-
(1994)
Math. Comp.
, vol.62
, Issue.206
, pp. 865-874
-
-
Frey, G.1
Rück, H.-G.2
-
10
-
-
35248867510
-
Efficient identity-based signature schemes based on pairings
-
K. Nyberg, H. Heys (Eds.), Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. Johns, Canada, August 2002 Springer, Berlin
-
F. Hess, Efficient identity-based signature schemes based on pairings, in: K. Nyberg, H. Heys (Eds.), Selected Areas in Cryptography - 9th Annual International Workshop, SAC 2002, St. Johns, Canada, August 2002, Lecture Notes in Computer Science, vol. 2595, Springer, Berlin, 2003, pp. 310-324.
-
(2003)
Lecture Notes in Computer Science
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
11
-
-
84949219772
-
Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders
-
D.R. Stinson, S. Tavares (Eds.), Selected Areas in Cryptography 2000 Springer, Berlin
-
D. Hühnlein, M.J. Jacobson Jr., D. Weber, Towards practical non-interactive public-key cryptosystems using non-maximal imaginary quadratic orders, in: D.R. Stinson, S. Tavares (Eds.), Selected Areas in Cryptography 2000, Lecture Notes in Computer Science, vol. 2012, Springer, Berlin, 2000, pp. 275-287.
-
(2000)
Lecture Notes in Computer Science
, vol.2012
, pp. 275-287
-
-
Hühnlein, D.1
Jacobson Jr., M.J.2
Weber, D.3
-
12
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellman
-
W. Bosma (Ed.), Algorithmic Number Theory - ANTS-IV Springer, Berlin
-
A. Joux, A one round protocol for tripartite Diffie-Hellman, in: W. Bosma (Ed.), Algorithmic Number Theory - ANTS-IV, Lecture Notes in Computer Science, vol. 1838, Springer, Berlin, 2000, pp. 358-394.
-
(2000)
Lecture Notes in Computer Science
, vol.1838
, pp. 358-394
-
-
Joux, A.1
-
13
-
-
29244490811
-
-
Diplomarbeit, Technische Universität Darmstadt, Deutschland
-
D. Kügler, Eine Aufwandsanalyse für identitätsbasierte Kryptosysteme, Diplomarbeit, Technische Universität Darmstadt, Deutschland, available at ftp://ftp.informatik.tu-darmstadt.de/pub/TI/reports/kuegler.IDCS. diplom.ps.gz, 1998.
-
(1998)
Eine Aufwandsanalyse für Identitätsbasierte Kryptosysteme
-
-
Kügler, D.1
-
14
-
-
0242292905
-
A note on the weakness of the Maurer-Yacobi squaring method
-
Fachbereich Informatik, Technische Universität Darmstadt
-
D. Kügler, M. Maurer, A note on the weakness of the Maurer-Yacobi squaring method, Technical Report TI-15/99, Fachbereich Informatik, Technische Universität Darmstadt, available at ftp://ftp.informatik.tu-darmstadt.de/ pub/TI/TR/TI-99-15.weaksquaring.ps.gz, 1999.
-
(1999)
Technical Report
, vol.TI-15-99
-
-
Kügler, D.1
Maurer, M.2
-
15
-
-
35748952969
-
Modified Maurer-Yacobi's scheme and its applications
-
J. Seberry, Y. Zheng (Eds.), Advances in Cryptology - AUSCRYPT'92
-
P. J. Lee, C. H. Lim, Modified Maurer-Yacobi's scheme and its applications, in: J. Seberry, Y. Zheng (Eds.), Advances in Cryptology - AUSCRYPT'92, Lecture Notes in Computer Science, vol. 718, 1992, pp. 308-323.
-
(1992)
Lecture Notes in Computer Science
, vol.718
, pp. 308-323
-
-
Lee, P.J.1
Lim, C.H.2
-
16
-
-
35048859269
-
Efficient signcryption with key privacy from gap Diffie-Hellman groups
-
F. Bao, R. Deng, J. Zhou (Eds.), Public Key Cryptography - PKC 2004 Springer, Berlin
-
B. Libert, J.-J. Quisquater, Efficient signcryption with key privacy from gap Diffie-Hellman groups, in: F. Bao, R. Deng, J. Zhou (Eds.), Public Key Cryptography - PKC 2004, Lecture Notes in Computer Science, vol. 2947, Springer, Berlin, 2004, pp. 187-200.
-
(2004)
Lecture Notes in Computer Science
, vol.2947
, pp. 187-200
-
-
Libert, B.1
Quisquater, J.-J.2
-
17
-
-
3042553102
-
Non-interactive public-key cryptography
-
D. Davies (Ed.), Advances in Cryptology - EUROCRYPT '91 Springer, Berlin
-
U. Maurer, Y. Yacobi, Non-interactive public-key cryptography, in: D. Davies (Ed.), Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, Springer, Berlin, 1992, pp. 498-507.
-
(1992)
Lecture Notes in Computer Science
, vol.547
, pp. 498-507
-
-
Maurer, U.1
Yacobi, Y.2
-
18
-
-
0012132506
-
A non-interactive public-key distribution system
-
U. Maurer, and Y. Yacobi A non-interactive public-key distribution system Des. Codes Cryptogr. 9 3 1996 305 316
-
(1996)
Des. Codes Cryptogr.
, vol.9
, Issue.3
, pp. 305-316
-
-
Maurer, U.1
Yacobi, Y.2
-
19
-
-
0027662341
-
Reducing elliptic curves logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto, and S.A. Vanstone Reducing elliptic curves logarithms to logarithms in a finite field IEEE Trans. Inform. Theory IT-39 5 1993 1639 1646
-
(1993)
IEEE Trans. Inform. Theory
, vol.IT-39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.A.3
-
20
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano New explicit conditions of elliptic curve traces for FR-reduction IEICE Trans. Fundamentals E84-A 5 2001 1234 1243
-
(2001)
IEICE Trans. Fundamentals
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
21
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
K. Paterson ID-based signatures from pairings on elliptic curves Electron. Lett. 38 18 2002 1025 1026
-
(2002)
Electron. Lett.
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.1
-
22
-
-
2642549675
-
Cryptosystems based on pairing
-
Okinawa, Japan, January 26-28
-
R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing, sCIS 2000, The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan, January 26-28 (2000).
-
(2000)
SCIS 2000, the 2000 Symposium on Cryptography and Information Security
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
23
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
G. Goos, J. Hartmanis (Eds.), Advances in Cryptology - CRYPTO'84 Springer, Berlin
-
A. Shamir, Identity-based cryptosystems and signature schemes, in: G. Goos, J. Hartmanis (Eds.), Advances in Cryptology - CRYPTO'84, Lecture Notes in Computer Science, vol. 196, Springer, Berlin, 1985, pp. 47-53.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
24
-
-
0037142442
-
An identity-based authenticated key agreement protocol based on the Weil pairing
-
N. Smart An identity-based authenticated key agreement protocol based on the Weil pairing Electron. Lett. 38 2002 630 632
-
(2002)
Electron. Lett.
, vol.38
, pp. 630-632
-
-
Smart, N.1
-
25
-
-
84945129491
-
Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
-
B. Pfitzmann (Ed.), Advances in Cryptology - EUROCRYPT 2001 Springer, Berlin
-
E. Verheul, Evidence that XTR is more secure than supersingular elliptic curve cryptosystems, in: B. Pfitzmann (Ed.), Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science, vol. 2045, Springer, Berlin, 2001, pp. 195-210.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 195-210
-
-
Verheul, E.1
|