-
1
-
-
84941186988
-
-
http://www.mips.com/content/Products/Architecture/SmartMIPSASE/ ProductCatalog/P_SmartMIPSASE/productBrief.
-
-
-
-
3
-
-
27244454939
-
Efficient pairing computation on supersingular abelian varieties
-
P. S. L. M. Barreto, S. Galbraith, C. O'hEigeartaigh, and M. Scott. Efficient pairing computation on supersingular abelian varieties. Cryptology ePrint Archive, Report 2004/375, 2004. http://eprint.iacr.org/2004/375.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.375
-
-
Barreto, P.S.L.M.1
Galbraith, S.2
O'hEigeartaigh, C.3
Scott, M.4
-
4
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Advances in Cryptology - Crypto'2002. Springer-Verlag
-
P. S. L. M. Barreto, H. Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. In Advances in Cryptology - Crypto'2002, volume 2442 of Lecture Notes in Computer Science, pages 354-368. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
5
-
-
35248835023
-
Constructing elliptic curves with prescribed embedding degrees
-
Security in Communication Networks - SCN'2002. Springer-Verlag
-
P. S. L. M. Barreto, B. Lynn, and M. Scott. Constructing elliptic curves with prescribed embedding degrees. In Security in Communication Networks - SCN'2002, volume 2576 of Lecture Notes in Computer Science, pages 263-273. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2576
, pp. 263-273
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
6
-
-
35048900981
-
On the selection of pairing-friendly groups
-
Selected Areas in Cryptography - SAC'2003, Ottawa, Canada. Springer-Verlag
-
Paulo S. L. M. Barreto, B. Lynn, and M. Scott. On the selection of pairing-friendly groups. In Selected Areas in Cryptography - SAC'2003, volume 3006 of Lecture Notes in Computer Science, pages 17-25, Ottawa, Canada, 2003. Springer-Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.3006
, pp. 17-25
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
7
-
-
27244440989
-
Pairing-friendly elliptic curves of prime order
-
P.S.L.M. Barreto and M. Naehrig. Pairing-friendly elliptic curves of prime order. Cryptology ePrint Archive, Report 2005/133, 2005. http://eprint.iacr.org/ 2005/133.
-
(2005)
Cryptology ePrint Archive, Report
, vol.2005
, Issue.133
-
-
Barreto, P.S.L.M.1
Naehrig, M.2
-
8
-
-
33750742005
-
-
G. M. Bertoni, L. Chen, P. Fragneto, K. A. Harrison, and G. Pelosi. Computing tate pairing on smartcards, 2005. http://www.st.com/stonline/products/ families/smartcard/ches2005_v4.pdf.
-
(2005)
Computing Tate Pairing on Smartcards
-
-
Bertoni, G.M.1
Chen, L.2
Fragneto, P.3
Harrison, K.A.4
Pelosi, G.5
-
9
-
-
23044483770
-
-
I. F. Blake, G. Seroussi, and N. P. Smart, editors. Cambridge University Press
-
I. F. Blake, G. Seroussi, and N. P. Smart, editors. Advances in Elliptic Curve Cryptography, Volume 2. Cambridge University Press, 2005.
-
(2005)
Advances in Elliptic Curve Cryptography, Volume 2
-
-
-
10
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
84946840347
-
Short signatures from the Weil pairing
-
Advances in Cryptology - Asiacrypt'2001. Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. In Advances in Cryptology - Asiacrypt'2001, volume 2248 of Lecture Notes in Computer Science, pages 514-532. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
13
-
-
38149056798
-
-
B. Chevallier-Mames, J-S. Coron, N. McCullagh, D. Naccache, and M. Scott. Secure delegation of elliptic-curve pairing, 2005. http://eprint.iacr.org/2005/ 150.
-
(2005)
Secure Delegation of Elliptic-curve Pairing
-
-
Chevallier-Mames, B.1
Coron, J.-S.2
McCullagh, N.3
Naccache, D.4
Scott, M.5
-
14
-
-
0021468777
-
Fast evaluation of logarithms in fields of characteristics two
-
D. Coppersmith. Fast evaluation of logarithms in fields of characteristics two. In IEEE Transactions on Information Theory, volume 30, pages 587-594, 1984.
-
(1984)
IEEE Transactions on Information Theory
, vol.30
, pp. 587-594
-
-
Coppersmith, D.1
-
15
-
-
0345490614
-
p - x + d
-
Advances in Cryptology - Asiacrypt'2003. Springer-Ver lag
-
p - x + d. In Advances in Cryptology - Asiacrypt'2003, volume 2894 of Lecture Notes in Computer Science, pages 111-123. Springer-Ver lag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 111-123
-
-
Duursma, I.1
Lee, H.-S.2
-
16
-
-
0032649638
-
The Täte pairing and the discrete logarithm applied to elliptic curve cryptosystems
-
G. Frey, M. Müller, and H. Rück. The Täte pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Transactions on Information Theory, 45(5):1717-1719, 1999.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.5
, pp. 1717-1719
-
-
Frey, G.1
Müller, M.2
Rück, H.3
-
18
-
-
84941174362
-
Hardware and software normal basis arithmetic for pairing based cryptography in characteristic three
-
R. Granger, D. Page, and M. Stam. Hardware and software normal basis arithmetic for pairing based cryptography in characteristic three. Cryptology ePrint Archive, Report 2004/157, 2004. http://eprint.iacr.org/2004/157.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.157
-
-
Granger, R.1
Page, D.2
Stam, M.3
-
21
-
-
50049119430
-
The eta pairing revisited
-
F. Hess, N. Smart, and F. Vercauteren. The eta pairing revisited. Cryptology ePrint Archive, Report 2006/110, 2006. http://eprint.iacr.org/2006/ 110.
-
(2006)
Cryptology ePrint Archive, Report
, vol.2006
, Issue.110
-
-
Hess, F.1
Smart, N.2
Vercauteren, F.3
-
23
-
-
84946844750
-
A one-round protocol for tripartite Diffie-Hellman
-
Algorithm Number Theory Symposium - ANTS IV. Springer-Verlag
-
A. Joux. A one-round protocol for tripartite Diffie-Hellman. In Algorithm Number Theory Symposium - ANTS IV, volume 1838 of Lecture Notes in Computer Science, pages 385-394. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1838
, pp. 385-394
-
-
Joux, A.1
-
24
-
-
84946820591
-
Unbelievable security. Matching AES security using public key systems
-
Springer-Verlag
-
A. K. Lenstra. Unbelievable security. Matching AES security using public key systems. In Advances in Cryptology - Asiacrypt 2001, volume 2248, pages 67-86. Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology - Asiacrypt 2001
, vol.2248
, pp. 67-86
-
-
Lenstra, A.K.1
-
26
-
-
33646848363
-
Efficient and forward-secure identity-based signcryption
-
N. McCullagh and P. S.L. M. Barreto. Efficient and forward-secure identity-based signcryption. Cryptology ePrint Archive, Report 2004/117, 2004. http://-eprint.iacr.org/2004/117
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.117
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
28
-
-
84944878354
-
-
CRC Press, Boca Raton, Florida
-
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC Press, Boca Raton, Florida, 1996. URL: http://cacr.math.uwaterloo.ca/hac.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
32
-
-
33645585449
-
ID based cryptosystems with pairing on elliptic curve
-
R. Sakai and M. Kasahara. ID based cryptosystems with pairing on elliptic curve. Cryptography ePrint Archive, Report 2003/054, 2003. http://eprint.iacr. org/2003/054.
-
(2003)
Cryptography ePrint Archive, Report
, vol.2003
, Issue.54
-
-
Sakai, R.1
Kasahara, M.2
-
34
-
-
24144479376
-
Computing the Tate pairing
-
CT-RSA. Springer-Verlag
-
M. Scott. Computing the Tate pairing. In CT-RSA, volume 3376 of Lecture Notes in Computer Science, pages 293-304. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 293-304
-
-
Scott, M.1
-
35
-
-
84941183293
-
-
M. Scott, 2006. http://ftp.computing.dcu.ie/pub/crypto/mirac1.zip.
-
(2006)
-
-
Scott, M.1
-
36
-
-
35048849890
-
Compressed pairings
-
Advances in Cryptology -Crypto' 2004. Springer-Verlag
-
M. Scott and P. Barreto. Compressed pairings. In Advances in Cryptology -Crypto' 2004, volume 3152 of Lecture Notes in Computer Science, pages 140-156. Springer-Verlag, 2004. Also available from http://eprint.iacr.org/2004/032/.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 140-156
-
-
Scott, M.1
Barreto, P.2
-
37
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Proceedings of Crypto 1984. Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of Crypto 1984, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1984.
-
(1984)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
38
-
-
0000074889
-
2607
-
Advances in Cryptology - Asiacrypt'2001. Springer-Verlag
-
2607. In Advances in Cryptology - Asiacrypt'2001, volume 2248 of Lecture Notes in Computer Science, pages 107-124. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 107-124
-
-
Thomé, E.1
|