-
1
-
-
34547668935
-
Identity-based encryption for sensor networks
-
L. B. Oliveira, R. Dahab, J. Lopez, F. Daguano, and A. A. F. Loureiro, "Identity-based encryption for sensor networks," in Proc. of the Fifth Annual IEEE Intl. Conf. on Pervasive Computing and Communications Workshops, 2007.
-
(2007)
Proc. of the Fifth Annual IEEE Intl. Conf. on Pervasive Computing and Communications Workshops
-
-
Oliveira, L.B.1
Dahab, R.2
Lopez, J.3
Daguano, F.4
Loureiro, A.A.F.5
-
2
-
-
33646569085
-
Sizzle: A standards-based end-to-end security architecture for the embedded internet
-
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, H. Eberle, and S. C. Shantz, "Sizzle: A standards-based end-to-end security architecture for the embedded internet," in IEEE Intl. Conf. on Pervasive Computing and Communications, 2005.
-
(2005)
IEEE Intl. Conf. on Pervasive Computing and Communications
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
3
-
-
0012970453
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Crypto 01, 2001.
-
(2001)
Crypto 01
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. Crypto 84, 1985.
-
(1985)
Proc. Crypto 84
-
-
Shamir, A.1
-
6
-
-
21144441197
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," in EUROCRYPT 03, 2003.
-
(2003)
EUROCRYPT 03
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
7
-
-
14844309671
-
Group signatures with verifierlocal revocation, ACM Press, vol
-
D. Boneh and H. Shacham, "Group signatures with verifierlocal revocation," ACM Press, vol. ACM CCS 2004, pp. 168- 177, 2004.
-
(2004)
ACM CCS 2004
, pp. 168-177
-
-
Boneh, D.1
Shacham, H.2
-
9
-
-
56749105661
-
Identity and pairingbased secure key management scheme for heterogeneous sensor networks
-
S. Rahman, N. Nasser, and K. Saleh, "Identity and pairingbased secure key management scheme for heterogeneous sensor networks," in IEEE Intl. Conf. on Wireless & Mobile Computing, Networking & Communication, 2008.
-
(2008)
IEEE Intl. Conf. on Wireless & Mobile Computing, Networking & Communication
-
-
Rahman, S.1
Nasser, N.2
Saleh, K.3
-
10
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. S. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. of IEEE INFOCOM, 2008.
-
(2008)
Proc. of IEEE INFOCOM
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.S.5
-
11
-
-
70449419524
-
A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks
-
D. Galindo, R. Roman, and J. Lopez, "A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks," in CANS 08, 2008.
-
(2008)
CANS 08
-
-
Galindo, D.1
Roman, R.2
Lopez, J.3
-
12
-
-
46749097974
-
TinyTate: Computing the Tate pairing in resource-constrained sensor nodes
-
L. B. Oliveira, D. F. Aranha, E. Morais, F. Daguano, J. Lopez, and R. Dahab, "TinyTate: Computing the Tate pairing in resource-constrained sensor nodes," in IEEE Intl. Symposium on Network Computing and Applications, 2007.
-
(2007)
IEEE Intl. Symposium on Network Computing and Applications
-
-
Oliveira, L.B.1
Aranha, D.F.2
Morais, E.3
Daguano, F.4
Lopez, J.5
Dahab, R.6
-
13
-
-
0842304788
-
Efficient algorithms for pairing-based cryptosystems
-
P. Barreto, H. Y. Kim, B. Lynn, and M. Scott, "Efficient algorithms for pairing-based cryptosystems," in Advances in Cryptology-CRYPTO 02, 2002.
-
(2002)
Advances in Cryptology-CRYPTO 02
-
-
Barreto, P.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
14
-
-
33847698965
-
Efficient pairing computation on supersingular Abelian varieties
-
P. Barreto, S. Galbraith, C. Eigeartaigh, and M. Scott, "Efficient pairing computation on supersingular Abelian varieties," Designs, Codes and Cryptography, vol. 42, pp. 239-271, 2007.
-
(2007)
Designs, Codes and Cryptography
, vol.42
, pp. 239-271
-
-
Barreto, P.1
Galbraith, S.2
Eigeartaigh, C.3
Scott, M.4
-
15
-
-
36048945144
-
An algorithm for the ntpairing calculation in characteristic three and its hardware implementation
-
J. Beuchat, M. Shirase, T. Takagi, and E. Okamoto, "An algorithm for the ntpairing calculation in characteristic three and its hardware implementation," in 18th IEEE Intl. Symposium on Computer Arithmetic, 2007.
-
(2007)
18th IEEE Intl. Symposium on Computer Arithmetic
-
-
Beuchat, J.1
Shirase, M.2
Takagi, T.3
Okamoto, E.4
-
16
-
-
77951266530
-
-
M. Shirase, T. Takagi, and E. Okamoto, Some efficient algorithms for the final exponentiation of etat pairing, IEICE Transactions, E91-A, No.1, pp. pp.221-228, 2008.
-
M. Shirase, T. Takagi, and E. Okamoto, "Some efficient algorithms for the final exponentiation of etat pairing," IEICE Transactions, vol. Vol.E91-A, No.1, pp. pp.221-228, 2008.
-
-
-
-
17
-
-
53149149860
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks," in European Conf. on Wireless Sensor Networks, 2008.
-
(2008)
European Conf. on Wireless Sensor Networks
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
18
-
-
53149126145
-
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
L. B. Oliveira, M. Scott, J. Lopez, and R. Dahab, "TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks," in Intl. Conf.on Networked Sensing Systems, 2008.
-
(2008)
Intl. Conf.on Networked Sensing Systems
-
-
Oliveira, L.B.1
Scott, M.2
Lopez, J.3
Dahab, R.4
-
19
-
-
70449403092
-
-
T. Ishiguro, M. Shirase, and T. Takagi, Efficient implementation of ntpairing on ATmega128L, IPSJ Journal (in Japanese), 49, No.11., pp. pp.3743-3753, 2008.
-
T. Ishiguro, M. Shirase, and T. Takagi, "Efficient implementation of ntpairing on ATmega128L," IPSJ Journal (in Japanese), vol. Vol.49, No.11., pp. pp.3743-3753, 2008.
-
-
-
-
20
-
-
84870968584
-
Efficient implementation of pairing on sensor nodes
-
Online, Available
-
T. Ishiguro, M. Shirase, and T.Takagi, "Efficient implementation of pairing on sensor nodes," in Identity Based Encryption Workshop, NIST, 2008. [Online]. Available: http://csrc.nist.gov/groups/ST/IBE/ documents/June08/Takagi.pdf
-
(2008)
Identity Based Encryption Workshop, NIST
-
-
Ishiguro, T.1
Shirase, M.2
Takagi, T.3
-
22
-
-
0038763879
-
Short programs for functions on curves
-
unpublished manuscript
-
V. S. Miller, "Short programs for functions on curves," unpublished manuscript.
-
-
-
Miller, V.S.1
-
23
-
-
84869677452
-
-
p-x + d, in ASIACRYPT 03, 2003.
-
p-x + d," in ASIACRYPT 03, 2003.
-
-
-
-
24
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. J. Menezes, T. Okamoto, and S. A. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Trans. on Information Theory, vol. 39, pp. 1639-1646, 1993.
-
(1993)
IEEE Trans. on Information Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.A.3
-
25
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reduction," IEICE Trans. Fundamentals, vol. E84 A, p. 5, 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.E84
, Issue.A
, pp. 5
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
|