Pairing-based cryptography

Results: 49



#Item
11Software implementation of pairings Diego de Freitas Aranha September 21, 2011 Department of Computer Science University of Bras´ılia

Software implementation of pairings Diego de Freitas Aranha September 21, 2011 Department of Computer Science University of Bras´ılia

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:03
12Elliptic Nets in Cryptography Katherine Stange Elliptic Divisibility Sequences

Elliptic Nets in Cryptography Katherine Stange Elliptic Divisibility Sequences

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-14 09:56:21
13Endorsed Tournament Managers Definitions FPC Free Pairings Checker

Endorsed Tournament Managers Definitions FPC Free Pairings Checker

Add to Reading List

Source URL: www.fide.com

Language: English - Date: 2016-04-07 06:52:53
14Pinocchio Coin: Building Zerocoin from a Succinct Pairing-based Proof System George Danezis Cédric Fournet

Pinocchio Coin: Building Zerocoin from a Succinct Pairing-based Proof System George Danezis Cédric Fournet

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English
15Exercises on pairings on elliptic curves Andreas Enge Leuven, Friday, 13 September 2013 Exercise 1 (Weil reciprocity). Let E : Y 2 = X 3 + X over F7 , f = Y , g = X−1 X−3 . Compute div f and div g, and verify that f

Exercises on pairings on elliptic curves Andreas Enge Leuven, Friday, 13 September 2013 Exercise 1 (Weil reciprocity). Let E : Y 2 = X 3 + X over F7 , f = Y , g = X−1 X−3 . Compute div f and div g, and verify that f

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-23 05:41:31
16Bilinear Pairings in Cryptography Master thesis #603 by

Bilinear Pairings in Cryptography Master thesis #603 by

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2009-07-13 10:25:27
17ECCEfficient and Generalized Pairing Computation on Abelian Varieties Hyang-Sook Lee Ewha Womans University

ECCEfficient and Generalized Pairing Computation on Abelian Varieties Hyang-Sook Lee Ewha Womans University

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-10-03 22:36:38
18Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:37
19Tampering attacks in pairing-based cryptography

Tampering attacks in pairing-based cryptography

Add to Reading List

Source URL: conferenze.dei.polimi.it

Language: English - Date: 2014-10-24 13:14:33
    20Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo  This article presents new protocols for onion routing anonymity networks. We define a pro

    Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2010-12-30 09:39:44