-
2
-
-
23044435243
-
Efficient implementation of pairing-based cryptosytems
-
September
-
Paulo S. L. M. Barreto, Ben Lynn, and Michael Scott. Efficient Implementation of Pairing-Based Cryptosytems. Journal of Cryptology, 17(4):321-334, September 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 321-334
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
3
-
-
27244435853
-
A note on efficient computation of cube roots in characteristic 3
-
Paulo S.L.M. Berreto. A note on efficient computation of cube roots in characteristic 3. Cryptology ePrint Archive, Report 2004/305. http://eprint.iacr.org/2004/305, 2004.
-
(2004)
Cryptology EPrint Archive, Report 2004/305
-
-
Berreto, P.S.L.M.1
-
4
-
-
4143140890
-
A survey of two signature aggregation techniques
-
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. A Survey of Two Signature Aggregation Techniques. RSA CryptoBytes, 6(2):1-10, 2003.
-
(2003)
RSA CryptoBytes
, vol.6
, Issue.2
, pp. 1-10
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
5
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
number 2656 LNCS, Springer-Verlag
-
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Proceedings of Eurocrypt 2003, number 2656 in LNCS, pages 416-432. Springer-Verlag, 2003.
-
(2003)
Proceedings of Eurocrypt 2003
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
6
-
-
84946840347
-
Short signatures from the weil pairing
-
number 2248 in LNCS, Springer-Verlag
-
Dan Boneh, Ben Lynn, and Hovav Shacham. Short Signatures from the Weil Pairing. In Proceedings of Asiacrypt 2001, number 2248 in LNCS, pages 514-532. Springer-Verlag, 2001.
-
(2001)
Proceedings of Asiacrypt 2001
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
7
-
-
23044435711
-
Short signature from the weil pairing
-
Dan Boneh, Ben Lynn, and Hovav Shacham. Short Signature from the Weil Pairing. Journal of Cryptology, 17(4):297-319, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
11
-
-
84968502759
-
A remark considering m-divisibility in the divisor class group of curves
-
G. Frey and H. Ruck. A remark considering m-divisibility in the divisor class group of curves. Mathematics of Computation, 62:865-874, 1994.
-
(1994)
Mathematics of Computation
, vol.62
, pp. 865-874
-
-
Frey, G.1
Ruck, H.2
-
12
-
-
82955246861
-
Implementing the tate pairing
-
In Algorithm Number Theory Symposium - ANTS V, Springer-Verlag
-
S. Galbraith, K. Harrison, and D. Soldera. Implementing the Tate pairing. In Algorithm Number Theory Symposium - ANTS V, volume 2369 of LNCS, pages 324-337. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2369
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
13
-
-
0035704351
-
On Inferring autonomous system relationships in the internet
-
December
-
Lixin Gao. On Inferring Autonomous System Relationships in the Internet. IEEE/ACM Transactions on Networking (TON), 9(6):733-745, December 2001.
-
(2001)
IEEE/ACM Transactions on Networking (TON)
, vol.9
, Issue.6
, pp. 733-745
-
-
Gao, L.1
-
14
-
-
85180543778
-
Working around BGP: An incremental approach to improving security and accuracy in interdomain routing
-
San Diego, California, February
-
Goeffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick McDaniel, and Aviel Rubin. Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. In The 10th Annual Network and Distributed System Security Symposium, San Diego, California, February 2003.
-
(2003)
The 10th Annual Network and Distributed System Security Symposium
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
McDaniel, P.5
Rubin, A.6
-
15
-
-
0013144099
-
Efficient and secure network routing algorithms
-
January
-
Michael Goodrich. Efficient and Secure Network Routing Algorithms. provisional patent filing, http://www.cs.jhu.edu/~goodrich/cgc/pubs/rout-ing.pdf, January 2001.
-
(2001)
Provisional Patent Filing
-
-
Goodrich, M.1
-
18
-
-
0033204412
-
An analysis of BGP convergence properties
-
August
-
Timothy G. Griffin and Gordon Wilfong. An Analysis of BGP Convergence Properties. In Proceedings of SIGCOMM 1999, pages 277-288, August 1999.
-
(1999)
Proceedings of SIGCOMM 1999
, pp. 277-288
-
-
Griffin, T.G.1
Wilfong, G.2
-
19
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
March
-
Vipul Gupta, Matthew Millard, Stephen Fung, Yu Zhu, Nils Gura, Hans Eberle, and Sheueling Chang Shantz. Sizzle: A Standards-based end-to-end Security Architecture for the Embedded Internet. In Third IEEE International Conference on Pervasive Computing and Communications, March 2005.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
20
-
-
0141813552
-
Internet X.509 public key infrastructure certificate and CRL profile
-
April
-
R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC3280, http://www.ietf.org/rfc3280.txt, April 2002.
-
(2002)
RFC3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
22
-
-
21844463097
-
SPY: Secure path vector routing for securing BGP
-
ACM Press, August
-
Yih-Chun Hu, Adrian Perrig, and Marvin Sirbu. SPY: Secure Path Vector Routing for Securing BGP. In Proceedings of SIGCOMM 2004, pages 179-192. ACM Press, August 2004.
-
(2004)
Proceedings of SIGCOMM 2004
, pp. 179-192
-
-
Hu, Y.-C.1
Perrig, A.2
Sirbu, M.3
-
23
-
-
84867338222
-
Secure border gateway protocol (S-BGP) - Real world performance and deployment issues
-
San Diego, California, February
-
Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo. Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues. In The 7th Annual Network and Distributed System Security Symposium (NDSS'00), San Diego, California, February 2000.
-
(2000)
The 7th Annual Network and Distributed System Security Symposium (NDSS'00)
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
24
-
-
0033743163
-
Secure border gateway protocol
-
April
-
Stephen Kent, Charles Lynn, and Karen Seo. Secure Border Gateway Protocol. IEEE Journal of Selected Areas in Communications, 18(4):582-592, April 2000.
-
(2000)
IEEE Journal of Selected Areas in Communications
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
26
-
-
33144472762
-
Efficient hardware for the Tate pairing calculation in characteristic three
-
Edinburgh, Scotland, August
-
T. Kerins, W. P. Marnane, E. M. Popovici, and P.S.L.M. Barreto. Efficient hardware for the Tate pairing calculation in characteristic three. In Workshop on Cryptographic Hardware and Embedded Systems 2005 (CHES 2005), Edinburgh, Scotland, August 2005.
-
(2005)
Workshop on Cryptographic Hardware and Embedded Systems 2005 (CHES 2005)
-
-
Kerins, T.1
Marnane, W.P.2
Popovici, E.M.3
Barreto, P.S.L.M.4
-
27
-
-
0033652343
-
Delayed internet routing convergence
-
August
-
Craig Labovitz, Abha Ahuja, Abhijit Bose, and Farnam Jahanian. Delayed Internet Routing Convergence. In Proceedings of SIGCOMM 2000, pages 175-187, August 2000.
-
(2000)
Proceedings of SIGCOMM 2000
, pp. 175-187
-
-
Labovitz, C.1
Ahuja, A.2
Bose, A.3
Jahanian, F.4
-
28
-
-
35048877778
-
Sequential aggregate signatures from trapdoor permutations
-
In Eurocrypt 2004, Springer-Verlag
-
Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, and Hovav Shacham. Sequential Aggregate Signatures from Trapdoor Permutations. In Eurocrypt 2004, volume 3027 of LNCS, pages 74-90. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 74-90
-
-
Lysyanskaya, A.1
Micali, S.2
Reyzin, L.3
Shacham, H.4
-
31
-
-
22144445920
-
The weil pairing, and its efficient calculation
-
September
-
Victor S. Miller. The Weil Pairing, and Its Efficient Calculation. Journal of Cryptology, 17(4):235-261, September 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 235-261
-
-
Miller, V.S.1
-
32
-
-
33745791193
-
-
Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL).
-
Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL).
-
-
-
-
35
-
-
3042699520
-
Evaluation of efficient security for BGP route announcements using parallel simulation
-
July
-
David M. Nicol, Sean W. Smith, and Meiyuan Zhao. Evaluation of Efficient Security for BGP Route Announcements using Parallel Simulation. Simulation Practice and Theory Journal, special issue on Modeling and Simulation of Distributed Systems and Networks, 12(3-4):187-216, July 2004.
-
(2004)
Simulation Practice and Theory Journal, Special Issue on Modeling and Simulation of Distributed Systems and Networks
, vol.12
, Issue.3-4
, pp. 187-216
-
-
Nicol, D.M.1
Smith, S.W.2
Zhao, M.3
-
38
-
-
0003247246
-
A border gateway protocol 4 (BGP-4)
-
March
-
Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC1771, http://www.ietf.org/rfc1771.txt, March 1995.
-
(1995)
RFC1771
-
-
Rekhter, Y.1
Li, T.2
-
39
-
-
84858916584
-
-
The Route Views Project. http://www.antc.uoregon.edu/route-views/.
-
-
-
-
40
-
-
35048849890
-
Compressed pairings
-
number 3152 in LNCS, Springer-Verlag, Updated version: Cryptology ePrint Archive, Report 2004/032.
-
M. Scott and Paulo S.L.M. Barreto. Compressed Pairings. In Advances in Cryptology - CRYPTO'2004, number 3152 in LNCS, pages 140-156. Springer-Verlag, 2004. Updated version: Cryptology ePrint Archive, Report 2004/032. http://eprint.iacr.org/2004/032.
-
(2004)
Advances in Cryptology - CRYPTO'2004
, pp. 140-156
-
-
Scott, M.1
Barreto, P.S.L.M.2
-
41
-
-
0032026162
-
Efficient security mechanisms for the border gateway routing protocol
-
B. Smith and J.J. Garcia-Luna-Aceves. Efficient Security Mechanisms for the Border Gateway Routing Protocol. Computer Communications (Elsevier), 21(3):203-210, 1998.
-
(1998)
Computer Communications (Elsevier)
, vol.21
, Issue.3
, pp. 203-210
-
-
Smith, B.1
Garcia-Luna-Aceves, J.J.2
-
42
-
-
83255186150
-
Listen and Whisper: Security Mechanisms for BGP
-
March
-
Lakshminarayanan Subramanian, Volker Roth, Ion Stoica, Scott Shenker, and Randy H. Katz. Listen and Whisper: Security Mechanisms for BGP. In Proceedings of First Symposium on Networked Systems Design and Implementation (NSDl 2004), March 2004.
-
(2004)
Proceedings of First Symposium on Networked Systems Design and Implementation (NSDl 2004)
-
-
Subramanian, L.1
Roth, V.2
Stoica, I.3
Shenker, S.4
Katz, R.H.5
-
43
-
-
85180417570
-
Pretty secure BGP (psBGP)
-
San Diego, California, February
-
Tao Wan, Evangelos Kranakis, and P.C. van Oorschot. Pretty Secure BGP (psBGP). In The 12th Annual Network and Distributed System Security Symposium (NDSS'05), San Diego, California, February 2005.
-
(2005)
The 12th Annual Network and Distributed System Security Symposium (NDSS'05)
-
-
Wan, T.1
Kranakis, E.2
Van Oorschot, P.C.3
-
44
-
-
27544500277
-
Securing BGP through secure origin BGP
-
September
-
Russ White. Securing BGP Through Secure Origin BGP. The Internet Protocol Journal, 6(3): 15-22, September 2003.
-
(2003)
The Internet Protocol Journal
, vol.6
, Issue.3
, pp. 15-22
-
-
White, R.1
|