搜索结果: 1-14 共查到“军事学 Pairing based cryptography”相关记录14条 . 查询时间(0.093 秒)
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography
finite fields discrete logarithm problem tower number field sieve
font style='font-size:12px;'>
2016/12/7
In the past two years there have been several advances in Number Field Sieve (NFS) algorithms for computing discrete logarithms in finite fields \fpn\fpn where pp is prime and n>1n>1 is a small intege...
A survey of Fault Attacks in Pairing Based Cryptography
Pairing based cryptography Miller’s algorithm fault attacks
font style='font-size:12px;'>
2016/1/7
The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography.
These make the use of pairings suitable for small and constrained devices (smart phones, smart
cards. ....
On the Disadvantages of Pairing-based Cryptography
elliptic curve cryptography bilinear-pairing based cryptography inputting parameters
font style='font-size:12px;'>
2016/1/4
Pairing-based cryptography (PBC) has many elegant properties. It is
claimed that PBC can offer a desired security level with smaller parameters as the
general elliptic curve cryptography (ECC). In t...
Subgroup security in pairing-based cryptography
Pairing-based cryptography elliptic-curve cryptography pairing-friendly curves
font style='font-size:12px;'>
2016/1/3
Pairings are typically implemented using ordinary pairingfriendly
elliptic curves. The two input groups of the pairing function are
groups of elliptic curve points, while the target group lies in th...
Improved Side Channel Attacks on Pairing Based Cryptography
implementation
font style='font-size:12px;'>
2012/6/14
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
Improved Side Channel Attacks on Pairing Based Cryptography
implementation
font style='font-size:12px;'>
2012/3/20
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
Improved Side Channel Attacks on Pairing Based Cryptography
implementation
font style='font-size:12px;'>
2012/8/28
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
Constructing Tower Extensions for the implementation of Pairing-Based Cryptography
Pairing implementation pairing-based cryptosystems
font style='font-size:12px;'>
2009/12/29
A cryptographic pairing evaluates as an element in an ex-
tension field, and the evaluation itself involves a considerable amount of
extension field arithmetic. It is recognised that organising the ...
Elliptic curves suitable for pairing based cryptography
Elliptic curves pairing cryptography
font style='font-size:12px;'>
2009/4/9
Elliptic curves suitable for pairing based cryptography.
Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three
Hardware and Software Normal Basis Arithmetic Pairing Based Cryptography Characteristic Three
font style='font-size:12px;'>
2009/3/27
Although identity based cryptography oers a number of
functional advantages over conventional public key methods, the computational
costs are significantly greater. The dominant part of this cost i...
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography
Small Characteristic Algebraic Tori Pairing-Based Cryptography
font style='font-size:12px;'>
2009/3/27
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography.
PAIRING-BASED CRYPTOGRAPHY AT HIGH SECURITY LEVELS
public key cryptography elliptic curve Weil pairing Tate pairing
font style='font-size:12px;'>
2009/1/20
In recent years cryptographic protocols based on the Weil
and Tate pairings on elliptic curves have attracted much attention. A no-
table success in this area was the elegant solution by Boneh and F...
High Security Pairing-Based Cryptography Revisited
high security pairing-based cryptography
font style='font-size:12px;'>
2008/10/29
The security and performance of pairing based cryptography
has provoked a large volume of research, in part because of the exciting
new cryptographic schemes that it underpins. We re-examine how one...
Arithmetic Operators for Pairing-Based Cryptography
finite field arithmetic elliptic curve hardware accelerator FPGA
font style='font-size:12px;'>
2008/9/10
Since their introduction in constructive cryptographic applications,
pairings over (hyper)elliptic curves are at the heart of an
ever increasing number of protocols. Software implementations being
...