-
1
-
-
2642549675
-
Cryptosystems based on pairing
-
R. Sakai, K. Ohgishi, and M. Kasahara, "Cryptosystems based on pairing," 2000 Symposium on Cryptography and Information Security, SCIS'00, no. C20, 2000.
-
(2000)
2000 Symposium on Cryptography and Information Security, SCIS'00
, Issue.C20
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
2
-
-
84874324906
-
Identity based encryption from the Weil pairing
-
Advances in Cryptology - CRYPTO'01, Springer-Verlag
-
D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," Advances in Cryptology - CRYPTO'01, LNCS 2139, pp.213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84946840347
-
Short signatures from the Weil pairing
-
Advances in Cryptology - ASIACRYPT'01, Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," Advances in Cryptology - ASIACRYPT'01, LNCS 2248, pp.514-532, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
5
-
-
35248849357
-
Efficient computations of the Tate pairing for the large MOV degrees
-
ICISC'02, Springer-Verlag
-
T. Izu and T. Takagi, "Efficient computations of the Tate pairing for the large MOV degrees," ICISC'02, LNCS 2587, pp.283-297, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2587
, pp. 283-297
-
-
Izu, T.1
Takagi, T.2
-
6
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
Advances in Cryptology -ASIACRYPT'98, ed. K. Ohta and D. Pei, Springer-Verlag, Berlin, Heidelberg, New York
-
H. Cohen, A. Miyaji, and T. Ono, "Efficient elliptic curve exponentiation using mixed coordinates," Advances in Cryptology -ASIACRYPT'98, ed. K. Ohta and D. Pei, LNCS 1514, pp.51-65, Springer-Verlag, Berlin, Heidelberg, New York, 1998.
-
(1998)
LNCS
, vol.1514
, pp. 51-65
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
7
-
-
0035126332
-
Efficient scalar multiplications on elliptic curves with direct computations of several doublings
-
Jan.
-
Y. Sakai and K. Sakurai, "Efficient scalar multiplications on elliptic curves with direct computations of several doublings," IEICE Trans. Fundamentals, vol.E84-A, no.1, pp.120-129, Jan. 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.E84-A
, Issue.1
, pp. 120-129
-
-
Sakai, Y.1
Sakurai, K.2
-
9
-
-
22044456811
-
Analysis of the sliding window powering algorithm
-
H. Cohen, "Analysis of the sliding window powering algorithm," J. Cryptol., vol.18, no.1, pp.63-76, 2005.
-
(2005)
J. Cryptol.
, vol.18
, Issue.1
, pp. 63-76
-
-
Cohen, H.1
-
12
-
-
0000653210
-
Selecting cryptographic key sizes
-
The extended abstract was presented at PKC'00
-
A.K. Lenstra and E.R. Verheul, "Selecting cryptographic key sizes," J. Cryptol., vol.14, no.4, pp.255-293, 2001. (The extended abstract was presented at PKC'00).
-
(2001)
J. Cryptol.
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
13
-
-
0032634944
-
Fast modular inversion algorithm to match any operation unit
-
May
-
T. Kobayashi and H. Morita, "Fast modular inversion algorithm to match any operation unit," IEICE Trans. Fundamentals, vol.E82-A, no.5, pp.733-740, May 1999.
-
(1999)
IEICE Trans. Fundamentals
, vol.E82-A
, Issue.5
, pp. 733-740
-
-
Kobayashi, T.1
Morita, H.2
-
14
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Advances in Cryptology-ASIACRYPT'02, Springer-Verlag
-
C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," Advances in Cryptology-ASIACRYPT'02, LNCS 2501, pp.548-566, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
15
-
-
35048835319
-
Secure identity based encryption without random oracles
-
Advances in Cryptology - CRYPTO'04, Springer-Verlag
-
D. Boneh and X. Boyen, "Secure identity based encryption without random oracles," Advances in Cryptology - CRYPTO'04, LNCS 3152, pp.443-459, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
16
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
May
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reduction," IEICE Trans. Fundamentals, vol.E84-A, no.5, pp.1234-1243, May 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
17
-
-
35248835023
-
Constructing elliptic curves with prescribed embedding degrees
-
Security in Communication Networks-SCN'2002
-
P.S.L.M. Barreto, B. Lynn, and M. Scott, "Constructing elliptic curves with prescribed embedding degrees," Security in Communication Networks-SCN'2002, LNCS 2576, pp.263-273, 2002.
-
(2002)
LNCS
, vol.2576
, pp. 263-273
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
|