搜索结果: 1-14 共查到“Pairing Based Cryptography”相关记录14条 . 查询时间(0.156 秒)
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography
finite fields discrete logarithm problem tower number field sieve
2016/12/7
In the past two years there have been several advances in Number Field Sieve (NFS) algorithms for computing discrete logarithms in finite fields \fpn\fpn where pp is prime and n>1n>1 is a small intege...
A survey of Fault Attacks in Pairing Based Cryptography
Pairing based cryptography Miller’s algorithm fault attacks
2016/1/7
The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography.
These make the use of pairings suitable for small and constrained devices (smart phones, smart
cards. ....
On the Disadvantages of Pairing-based Cryptography
elliptic curve cryptography bilinear-pairing based cryptography inputting parameters
2016/1/4
Pairing-based cryptography (PBC) has many elegant properties. It is
claimed that PBC can offer a desired security level with smaller parameters as the
general elliptic curve cryptography (ECC). In t...
Subgroup security in pairing-based cryptography
Pairing-based cryptography elliptic-curve cryptography pairing-friendly curves
2016/1/3
Pairings are typically implemented using ordinary pairingfriendly
elliptic curves. The two input groups of the pairing function are
groups of elliptic curve points, while the target group lies in th...
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
Constructing Tower Extensions for the implementation of Pairing-Based Cryptography
Pairing implementation pairing-based cryptosystems
2009/12/29
A cryptographic pairing evaluates as an element in an ex-
tension field, and the evaluation itself involves a considerable amount of
extension field arithmetic. It is recognised that organising the ...
Elliptic curves suitable for pairing based cryptography
Elliptic curves pairing cryptography
2009/4/9
Elliptic curves suitable for pairing based cryptography.
Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three
Hardware and Software Normal Basis Arithmetic Pairing Based Cryptography Characteristic Three
2009/3/27
Although identity based cryptography oers a number of
functional advantages over conventional public key methods, the computational
costs are significantly greater. The dominant part of this cost i...
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography
Small Characteristic Algebraic Tori Pairing-Based Cryptography
2009/3/27
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography.
PAIRING-BASED CRYPTOGRAPHY AT HIGH SECURITY LEVELS
public key cryptography elliptic curve Weil pairing Tate pairing
2009/1/20
In recent years cryptographic protocols based on the Weil
and Tate pairings on elliptic curves have attracted much attention. A no-
table success in this area was the elegant solution by Boneh and F...
High Security Pairing-Based Cryptography Revisited
high security pairing-based cryptography
2008/10/29
The security and performance of pairing based cryptography
has provoked a large volume of research, in part because of the exciting
new cryptographic schemes that it underpins. We re-examine how one...
Arithmetic Operators for Pairing-Based Cryptography
finite field arithmetic elliptic curve hardware accelerator FPGA
2008/9/10
Since their introduction in constructive cryptographic applications,
pairings over (hyper)elliptic curves are at the heart of an
ever increasing number of protocols. Software implementations being
...