-
1
-
-
0345490607
-
Certificateless public key cryptography
-
volume 2894 of LNCS, Springer-Verlag
-
S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. In Advances in Cryptology ASIACRYPT 2003, volume 2894 of LNCS, pages 452-473. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology ASIACRYPT 2003
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
4
-
-
23044435243
-
Efficient implementation of pairing-based cryptosystems
-
P. S. L. M. Barreto, B. Lynn, and M. Scott. Efficient implementation of pairing-based cryptosystems. Journal of Cryptology, 17(4):321-334, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 321-334
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
5
-
-
33646820668
-
Efficient and provably-secure identitybased signatures and signcryption from bilinear maps
-
volume 3788 of LNCS, Springer-Verlag
-
P. S. L. M. Barreto, B. Libert, N. McCullagh, and J. Quisquater. Efficient and provably-secure identitybased signatures and signcryption from bilinear maps. In Advances in Cryptology-ASIA CRYPT 2005, volume 3788 of LNCS, pages 515-532. Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology-ASIA CRYPT 2005
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.4
-
6
-
-
33847698965
-
Efficient pairing computation on supersingular abelian varieties
-
P. S. L. M. Barreto, S. D. Galbraith, C. Ó'hEigeartaigh, and M. Scott. Efficient pairing computation on supersingular abelian varieties. Designs, Codes and Cryptography, 42(3):239-271, 2007.
-
(2007)
Designs, Codes and Cryptography
, vol.42
, Issue.3
, pp. 239-271
-
-
Barreto, P.S.L.M.1
Galbraith, S.D.2
Ó'hEigeartaigh, C.3
Scott, M.4
-
8
-
-
29144477624
-
Refinements of miller's algorithm for computing the weil/tate pairing
-
I. F. Blake, V. Kumar Murty, and G. Xu. Refinements of miller's algorithm for computing the weil/tate pairing. Journal of Algorithms, 58(2):134-149, 2006.
-
(2006)
Journal of Algorithms
, vol.58
, Issue.2
, pp. 134-149
-
-
Blake, I.F.1
Murty, V.K.2
Xu, G.3
-
9
-
-
35048841300
-
Efficient selective-id secure identity-based encryption without random oracles
-
volume 3027 of LNCS, Springer-Verlag
-
D. Boneh and X. Boyen. Efficient selective-id secure identity-based encryption without random oracles. In Advances in Cryptology-EUROCRYPT 2004, volume 3027 of LNCS, pages 223-238. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
10
-
-
35048848152
-
Short signatures without random oracles
-
volume 3027 of LNCS, Springer-Verlag
-
D. Boneh and X. Boyen. Short signatures without random oracles. In Advances in Cryptology-EUROCRYPT 2004, volume 3027 of LNCS, pages 56-73. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
11
-
-
35248874429
-
Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
-
volume 2729 of LNCS, Springer-Verlag
-
X. Boyen. Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography. In Advances in Cryptology-CRYPTO 2003, volume 2729 of LNCS, pages 383-399. Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology-CRYPTO 2003
, pp. 383-399
-
-
Boyen, X.1
-
13
-
-
0037749592
-
Implementing the tate pairing
-
volume 2369 of LNCS, Springer-Verlag
-
S. D. Galbraith, K. Harrison, and D. Soldera. Implementing the tate pairing. In Algorithmic Number Theory, volume 2369 of LNCS, pages 69-86. Springer-Verlag, 2002.
-
(2002)
Algorithmic Number Theory
, pp. 69-86
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
14
-
-
70449102675
-
Certificateless signcryption scheme in the standard model
-
Z. Liu, Y. Hu, X. Zhang, and H. Ma. Certificateless signcryption scheme in the standard model. Information Sciences, 180(3):452-464, 2010.
-
(2010)
Information Sciences
, vol.180
, Issue.3
, pp. 452-464
-
-
Liu, Z.1
Hu, Y.2
Zhang, X.3
Ma, H.4
-
15
-
-
0035336179
-
New explicit conditions of elliptic curve traces for FR-reduction
-
A. Miyaji, M. Nakabayashi, and S. Takano. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals, E84-A(5):1234-1243, 2001. (Pubitemid 32486851)
-
(2001)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
17
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
volume 196 of LNCS, Springer-Verlag
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology, volume 196 of LNCS, pages 47-53. Springer-Verlag, 1985.
-
(1985)
Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
18
-
-
77957668870
-
On computable isomorphisms in efficient asymmetric pairing based systems
-
Available from
-
N. P. Smart and F. Vercauteren. On computable isomorphisms in efficient asymmetric pairing based systems. Cryptology ePrint Archive: Report 20051116, Available from: http://eprint.iacr.org/2005/116.
-
Cryptology EPrint Archive: Report 20051116
-
-
Smart, N.P.1
Vercauteren, F.2
-
20
-
-
84905115649
-
Efficient and provably secure certificateless signcryption from bilinear maps
-
Available from
-
W. Xie and Z. Zhang. Efficient and provably secure certificateless signcryption from bilinear maps. Cryptology ePrint Archive: Report 2009/578, Available from: http://eprint.iacr.org/2009/578.
-
Cryptology ePrint Archive: Report 2009/578
-
-
Xie, W.1
Zhang, Z.2
|