|
Conferences in DBLP
(pairing) 2008 (conf/pairing/2008)
Pairings in Trusted Computing. [Citation Graph (, )][DBLP]
Pairing Lattices. [Citation Graph (, )][DBLP]
The Uber-Assumption Family. [Citation Graph (, )][DBLP]
Homomorphic Encryption and Signatures from Vector Decomposition. [Citation Graph (, )][DBLP]
Hidden-Vector Encryption with Groups of Prime Order. [Citation Graph (, )][DBLP]
The Hidden Root Problem. [Citation Graph (, )][DBLP]
Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography. [Citation Graph (, )][DBLP]
Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group. [Citation Graph (, )][DBLP]
Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field. [Citation Graph (, )][DBLP]
Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials. [Citation Graph (, )][DBLP]
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties. [Citation Graph (, )][DBLP]
Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y2=x5ax. [Citation Graph (, )][DBLP]
Integer Variable chi-Based Ate Pairing. [Citation Graph (, )][DBLP]
Pairing Computation on Twisted Edwards Form Elliptic Curves. [Citation Graph (, )][DBLP]
Exponentiation in Pairing-Friendly Groups Using Homomorphisms. [Citation Graph (, )][DBLP]
Generators for the l-Torsion Subgroup of Jacobians of Genus Two Curves. [Citation Graph (, )][DBLP]
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. [Citation Graph (, )][DBLP]
Pairings on Hyperelliptic Curves with a Real Model. [Citation Graph (, )][DBLP]
Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. [Citation Graph (, )][DBLP]
A Comparison between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m. [Citation Graph (, )][DBLP]
One-Round ID-Based Blind Signature Scheme without ROS Assumption. [Citation Graph (, )][DBLP]
Tracing Malicious Proxies in Proxy Re-encryption. [Citation Graph (, )][DBLP]
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. [Citation Graph (, )][DBLP]
|