-
1
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Advances in Cryptology - CRYPTO 2001, LNCS 2139, pp. 213-229, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
84946840347
-
Short signatures from the Weil pairing
-
D. Boneh, H. Shacham, and B. Lynn, "Short signatures from the Weil pairing," in Advances in Cryptology - ASIACRYPT 2001, pp. 514-532, 2001.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001
, pp. 514-532
-
-
Boneh, D.1
Shacham, H.2
Lynn, B.3
-
3
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Advances in Cryptology - CRYPTO 2005, LNCS 3621, pp. 258-275, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
4
-
-
34547668935
-
Identity-based encryption for sensor networks
-
L. B. Oliveira, R. Dahab, J. Lpez, F. Daguano, and A. A. F. Loureiro, "Identity-based encryption for sensor networks," in Proceedings of 5th IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 290-294, 2007.
-
(2007)
Proceedings of 5th IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 290-294
-
-
Oliveira, L.B.1
Dahab, R.2
Lpez, J.3
Daguano, F.4
Loureiro, A.A.F.5
-
5
-
-
56749105661
-
Identity and pairing-based secure key management scheme for heterogeneous sensor networks
-
S. Rahman, N. Nasser, and K. Saleh, "Identity and pairing-based secure key management scheme for heterogeneous sensor networks," in Proceedings of the 4th IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, pp. 423-428, 2008.
-
(2008)
Proceedings of the 4th IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
, pp. 423-428
-
-
Rahman, S.1
Nasser, N.2
Saleh, K.3
-
6
-
-
58449131864
-
A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks
-
D. Galindo, R. Roman, and J. Lopez, "A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks," in Proc. of the 7th International Conference on Cryptology and Network Security (CANS 2008), pp. 120-132, 2008.
-
(2008)
Proc. of the 7th International Conference on Cryptology and Network Security (CANS 2008)
, pp. 120-132
-
-
Galindo, D.1
Roman, R.2
Lopez, J.3
-
7
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. S. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proceedings of the 27th IEEE International Conference on Computer Communications, pp. 246-250, 2008.
-
(2008)
Proceedings of the 27th IEEE International Conference on Computer Communications
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.S.5
-
8
-
-
46749097974
-
TinyTate: Computing the tate pairing in resource-constrained sensor nodes
-
L. B. Oliveira, D. F. Aranha, E. Morais, F. Daguano, J. Lpez, and R. Dahab, "TinyTate: Computing the tate pairing in resource-constrained sensor nodes," in 6th IEEE International Symposium on Network Computing and Applications, pp. 318-323, 2007.
-
(2007)
6th IEEE International Symposium on Network Computing and Applications
, pp. 318-323
-
-
Oliveira, L.B.1
Aranha, D.F.2
Morais, E.3
Daguano, F.4
Lpez, J.5
Dahab, R.6
-
9
-
-
53149126145
-
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
L. B. Oliveira, M. Scott, J. Lpez, and R. Dahab, "TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks," in 5th International Conference on Networked Sensing Systems, pp. 173-180, 2008.
-
(2008)
5th International Conference on Networked Sensing Systems
, pp. 173-180
-
-
Oliveira, L.B.1
Scott, M.2
Lpez, J.3
Dahab, R.4
-
10
-
-
70449389956
-
TinyPairing: Computing Tate pairing on sensor nodes with higher speed and less memory
-
X. Xiong, D. S. Wong, and X. Deng, "TinyPairing: Computing Tate pairing on sensor nodes with higher speed and less memory," in 8th IEEE International Symposium on Network Computing and Applications, pp. 187-194, 2009.
-
(2009)
8th IEEE International Symposium on Network Computing and Applications
, pp. 187-194
-
-
Xiong, X.1
Wong, D.S.2
Deng, X.3
-
11
-
-
77950309511
-
Efficient implementation of pairing based cryptography on a sensor node
-
M. Shirase, Y. Miyazaki, T. Takagi, D.-G. Han, and D. Choi, "Efficient implementation of pairing based cryptography on a sensor node," IEICE Transaction, vol. E92-D, No.5, pp. 909-917, 2009.
-
(2009)
IEICE Transaction
, vol.E92-D
, Issue.5
, pp. 909-917
-
-
Shirase, M.1
Miyazaki, Y.2
Takagi, T.3
Han, D.-G.4
Choi, D.5
-
13
-
-
32244445656
-
Radix-r non-adjacent form and its application to pairing-based cryptosystem
-
T. Takagi, D. Reis, Jr., S.-M. Yen, and B.-C. Wu, "Radix-r non-adjacent form and its application to pairing-based cryptosystem," IEICE Transactions, vol. E89-A, No.1, pp. 115-123, 2006.
-
(2006)
IEICE Transactions
, vol.E89-A
, Issue.1
, pp. 115-123
-
-
Takagi, T.1
Reis Jr., D.2
Yen, S.-M.3
Wu, B.-C.4
-
14
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
D. Boneh and X. Boyen, "Short signatures without random oracles and the SDH assumption in bilinear groups," J. Cryptology, vol. 21(2), pp. 149-177, 2008.
-
(2008)
J. Cryptology
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
16
-
-
33847698965
-
Efficient pairing computation on supersingular abelian varieties
-
P. Barreto, S. Galbraith, C. O. hEigeartaigh, and M. Scott, "Efficient pairing computation on supersingular abelian varieties," Designs, Codes and Cryptography, vol. 42, pp. 239-271, 2007.
-
(2007)
Designs, Codes and Cryptography
, vol.42
, pp. 239-271
-
-
Barreto, P.1
Galbraith, S.2
HEigeartaigh, C.O.3
Scott, M.4
-
19
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano, "New explicit conditions of elliptic curve traces for FR-reduction," IEICE Trans. Fundamentals, vol. E84 A, 2001.
-
(2001)
IEICE Trans. Fundamentals
, vol.E84 A
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
20
-
-
84966238549
-
Monte Carlo methods for index computation (mod) p
-
J. Pollard, "Monte Carlo methods for index computation (mod) p," Mathematics of Computation, vol. 32, pp. 918-924, 1978.
-
(1978)
Mathematics of Computation
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
21
-
-
0021468777
-
Fast Evaluation of Logarithms in Fields of Characteristic Two
-
D. Coppersmith, "Fast Evaluation of Logarithms in Fields of Characteristic Two," IEEE Transactions on Information Theory, vol. 30, pp. 587-594, 1984.
-
(1984)
IEEE Transactions on Information Theory
, vol.30
, pp. 587-594
-
-
Coppersmith, D.1
-
22
-
-
84946820591
-
Unbelievable security matching AES security using public key systems
-
ASIACRYPT 2001
-
A. K. Lenstra, "Unbelievable security matching AES security using public key systems," in ASIACRYPT 2001, LNCS 2248, pp. 67-86, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 67-86
-
-
Lenstra, A.K.1
-
23
-
-
71549116397
-
Multi-core implementation of the tate pairing over supersingular elliptic curves
-
J.-L. Beuchat, E. Lpez-Trejo, L. Martnez-Ramos, S. Mitsunari, and F. Rodrguez-Henrquez, "Multi-core implementation of the tate pairing over supersingular elliptic curves," in Proc. of the 8th International Conference on Cryptology and Network Security (CANS 2009), pp. 413-432, 2009.
-
(2009)
Proc. of the 8th International Conference on Cryptology and Network Security (CANS 2009)
, pp. 413-432
-
-
Beuchat, J.-L.1
Lpez-Trejo, E.2
Martnez-Ramos, L.3
Mitsunari, S.4
Rodrguez-Henrquez, F.5
-
25
-
-
20344381294
-
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
-
D. Malan, M. Welsh, and M. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," in Proceedings of IEEE Conference on Sensor and Ad Hoc Communications and Networks, pp. 71-80, 2004.
-
(2004)
Proceedings of IEEE Conference on Sensor and Ad Hoc Communications and Networks
, pp. 71-80
-
-
Malan, D.1
Welsh, M.2
Smith, M.3
-
26
-
-
0015682806
-
On arithmetic weight for a general radix representation of integers
-
W. Clark and J. Liang, "On arithmetic weight for a general radix representation of integers," IEEE Trans. Infomation Theory, vol. 19, pp. 823-826, 1973.
-
(1973)
IEEE Trans. Infomation Theory
, vol.19
, pp. 823-826
-
-
Clark, W.1
Liang, J.2
|