搜索结果: 1-6 共查到“军事学 pairing-based cryptosystems”相关记录6条 . 查询时间(0.09 秒)
Implementing Pairing-Based Cryptosystems in USB Tokens
pairing identity-based cryptography
2016/1/26
In the last decade, pairing-based cryptography has been one
of the most intensively studied subjects in cryptography. Various optimization
techniques have been developed to speed up the pairing comp...
Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
pairing-based cryptography composite-order groups cryptographic hardness assumptions
2009/11/18
We develop an abstract framework that encompasses the key properties of bilinear groups
of composite order that are required to construct secure pairing-based cryptosystems, and we show how
to use p...
Efficient Algorithms for Pairing-Based Cryptosystems
Efficient Algorithms Pairing-Based Cryptosystems
2009/4/13
We describe fast new algorithms to implement recent cryptosystems
based on the Tate pairing. In particular, our techniques improve
pairing evaluation speed by a factor of about 55 compared to previo...
Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems
pairing-friendly elliptic curves special polynomial families cyclotomic polynomials
2009/3/9
Constructing non-supersingular elliptic curves for pairing-based cryptosystems have
attracted much attention in recent years. The best previous technique builds curves
with ρ = lg(q)/lg(r) ≈ 1 (k = ...
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairing based cryptosystems Side channel attacks Randomized projective coordinate systems
2008/12/8
Pairings on elliptic curves have been used as cryptographic
primitives for the development of new applications such as identity based
schemes. For the practical applications, it is crucial to provi...
FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields
Tate pairing elliptic curve FPGA
2008/11/24
Though the implementation of the Tate pairing is commonly believed to be computationally more
intensive than other cryptographic operations, such as ECC point multiplication, there has been
a substa...