-
1
-
-
33745604534
-
Pairing-friendly elliptic curves of prime order
-
Preneel, B., Tavares, S. (eds.) SAC 2005. Springer, Heidelberg
-
Barreto, P., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 319-331. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3897
, pp. 319-331
-
-
Barreto, P.1
Naehrig, M.2
-
2
-
-
34547358080
-
Advances in Elliptic Curve Cryptography
-
Cambridge Univ. Press, Cambridge
-
Blake, I., Seroussi, G., Smart, N.P.: Advances in Elliptic Curve Cryptography. In: LMS, vol. 317. Cambridge Univ. Press, Cambridge (2005)
-
(2005)
LMS
, vol.317
-
-
Blake, I.1
Seroussi, G.2
Smart, N.P.3
-
3
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
23044435711
-
Short signatures from the Weil pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Journal of Cryptology 17(4), 297-319 (2004)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
6
-
-
14844295011
-
Direct anonymous attestation
-
Pfitzmann, B., Liu, P. (eds.) ACM Press, New York
-
Brickell, E.F., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Pfitzmann, B., Liu, P. (eds.) Computer and Communications Security - CCS 2004, pp. 132-145. ACM Press, New York (2004)
-
(2004)
Computer and Communications Security - CCS 2004
, pp. 132-145
-
-
Brickell, E.F.1
Camenisch, J.2
Chen, L.3
-
9
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56-72. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
0020915882
-
Blind signatures for untraceable payments
-
Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Plenum Press, New York
-
Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology - CRYPTO 1982, pp. 199-203. Plenum Press, New York (1983)
-
(1983)
Advances in Cryptology - CRYPTO 1982
, pp. 199-203
-
-
Chaum, D.1
-
13
-
-
78650723303
-
-
ECRYPTII: Tech. Rep. D.SPA.7, European Network of Excellence in Cryptology II (ECRYPTII)
-
ECRYPTII: Yearly report on algorithms and keysizes (2008-2009). Tech. Rep. D.SPA.7, European Network of Excellence in Cryptology II (ECRYPTII) (2009)
-
(2009)
Yearly Report on Algorithms and Keysizes (2008-2009)
-
-
-
14
-
-
81055135955
-
Architecture is politics: Security and privacy issues in transport and beyond
-
Gutwirth, S., Poullet, Y., Hert, P. (eds.) Springer, Heidelberg
-
Jacobs, B.: Architecture is politics: Security and privacy issues in transport and beyond. In: Gutwirth, S., Poullet, Y., Hert, P. (eds.) Data Protection in a Profiled World - CPDP 2008. Springer, Heidelberg (2010)
-
(2010)
Data Protection in a Profiled World - CPDP 2008
-
-
Jacobs, B.1
-
15
-
-
0003735739
-
-
Tech. Rep. CORR 99-34, Department of Combinatorics & Optimization, University of Waterloo, Canada
-
Johnson, D., Menezes, A.: The elliptic curve digital signature algorithm (ECDSA). Tech. Rep. CORR 99-34, Department of Combinatorics & Optimization, University of Waterloo, Canada (2000)
-
(2000)
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
-
Johnson, D.1
Menezes, A.2
-
16
-
-
23944461491
-
A one round protocol for tripartite Diffie-Hellman
-
Joux, A.: A one round protocol for tripartite Diffie-Hellman. Journal of Cryptology 17(4), 263-276 (2004)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 263-276
-
-
Joux, A.1
-
17
-
-
51849083794
-
Anonymous attribute authentication scheme using self-blindable certificates
-
IEEE, Los Alamitos
-
Kiyomoto, S., Tanaka, T.: Anonymous attribute authentication scheme using self-blindable certificates. In: Intelligence and Security Informatics - ISI 2008, pp. 215-217. IEEE, Los Alamitos (2008)
-
(2008)
Intelligence and Security Informatics - ISI 2008
, pp. 215-217
-
-
Kiyomoto, S.1
Tanaka, T.2
-
19
-
-
37149003149
-
Performance evaluation of Java Card bytecodes
-
Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. Springer, Heidelberg
-
Paradinas, P., Cordry, J., Bouzefrane, S.: Performance evaluation of Java Card bytecodes. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 127-137. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4462
, pp. 127-137
-
-
Paradinas, P.1
Cordry, J.2
Bouzefrane, S.3
-
20
-
-
78650723818
-
Elliptic curve based protocols
-
Blake, I., Seroussi, G., Smart, N. (eds.) Advances in Elliptic Curve Cryptography. Cambridge Univ. Press, Cambridge
-
Smart, N.: Elliptic curve based protocols. In: Blake, I., Seroussi, G., Smart, N. (eds.) Advances in Elliptic Curve Cryptography. LMS, vol. 317, pp. 3-19. Cambridge Univ. Press, Cambridge (2005)
-
(2005)
LMS
, vol.317
, pp. 3-19
-
-
Smart, N.1
-
21
-
-
77949839785
-
Efficient implementation of anonymous credentials on Java Card smart cards
-
IEEE, Los Alamitos
-
Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient implementation of anonymous credentials on Java Card smart cards. In: Information Forensics and Security - WIFS 2009, pp. 106-110. IEEE, Los Alamitos (2009)
-
(2009)
Information Forensics and Security - WIFS 2009
, pp. 106-110
-
-
Sterckx, M.1
Gierlichs, B.2
Preneel, B.3
Verbauwhede, I.4
-
23
-
-
70350605716
-
Performance issues of selective disclosure and blinded issuing protocols on java card
-
Markowitch, O., Bilas, A., Hoepman, J.H., Mitchell, C., Quisquater, J.J. (eds.) WISTP 2009. Springer, Heidelberg
-
Tews, H., Jacobs, B.: Performance issues of selective disclosure and blinded issuing protocols on java card. In: Markowitch, O., Bilas, A., Hoepman, J.H., Mitchell, C., Quisquater, J.J. (eds.) WISTP 2009. LNCS, vol. 5746, pp. 95-111. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5746
, pp. 95-111
-
-
Tews, H.1
Jacobs, B.2
-
24
-
-
78650751600
-
Pairings on elliptic curves
-
Joye, M., Neven, G. (eds.) Identity-Based Cryptography. IOS Press, Amsterdam
-
Vercauteren, F.: Pairings on elliptic curves. In: Joye, M., Neven, G. (eds.) Identity-Based Cryptography. CIS, vol. 2, pp. 13-30. IOS Press, Amsterdam (2009)
-
(2009)
CIS
, vol.2
, pp. 13-30
-
-
Vercauteren, F.1
-
25
-
-
84946849368
-
Self-blindable credential certificates from the Weil pairing
-
Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
-
Verheul, E.: Self-blindable credential certificates from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 533-550. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 533-550
-
-
Verheul, E.1
|