-
1
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
2
-
-
23044435711
-
Short signatures from the weil pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptology 17(4), 297-319 (2004)
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
3
-
-
84958760024
-
-
Boyd, C., Montague, P., Nguyen, K.Q.: Elliptic curve based password authenticated key exchange protocols. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, 2119, pp. 487-501. Springer, Heidelberg (2001)
-
Boyd, C., Montague, P., Nguyen, K.Q.: Elliptic curve based password authenticated key exchange protocols. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 487-501. Springer, Heidelberg (2001)
-
-
-
-
4
-
-
84937550984
-
Provably secure password-authenticated key exchange using diffie-hellman
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Boyko, V., MacKenzie, P.D., Patel, S.: Provably secure password-authenticated key exchange using diffie-hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
5
-
-
33745812321
-
-
Chevassut, O., Fouque, P.-A., Gaudry, P., Pointcheval, D.: The twist-augmented technique for key exchange. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, 3958, pp. 410-426. Springer, Heidelberg (2006)
-
Chevassut, O., Fouque, P.-A., Gaudry, P., Pointcheval, D.: The twist-augmented technique for key exchange. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 410-426. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Jablon, D.P.: Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev. 26(5), 5-26 (1996)
-
(1996)
SIGCOMM Comput. Commun. Rev
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.P.1
-
8
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes, A., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Transactions on Information Theory 39(5), 1639-1646 (1993)
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.A.3
-
10
-
-
33746757646
-
-
Shallue, A., van de Woestijne, C.: Construction of rational points on elliptic curves over finite fields. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, 4076, pp. 510-524. Springer, Heidelberg (2006)
-
Shallue, A., van de Woestijne, C.: Construction of rational points on elliptic curves over finite fields. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 510-524. Springer, Heidelberg (2006)
-
-
-
-
12
-
-
0001465210
-
A new polynomial factorization algorithm and its implementation
-
Shoup, V.: A new polynomial factorization algorithm and its implementation. J. Symb. Comput. 20(4), 363-397 (1995)
-
(1995)
J. Symb. Comput
, vol.20
, Issue.4
, pp. 363-397
-
-
Shoup, V.1
-
13
-
-
17744378980
-
Points on elliptic curves over finite fields
-
Skalba, M.: Points on elliptic curves over finite fields. Acta Arith. 117, 293-301 (2005)
-
(2005)
Acta Arith
, vol.117
, pp. 293-301
-
-
Skalba, M.1
|