军事学 >>> 军事学 >>> 军队指挥学 >>> 作战指挥 军事系统工程 军事通信学 军事情报学 密码学 军队指挥学其他学科
搜索结果: 1-14 共查到军队指挥学 pairing-based cryptography相关记录14条 . 查询时间(0.14 秒)
In the past two years there have been several advances in Number Field Sieve (NFS) algorithms for computing discrete logarithms in finite fields \fpn\fpn where pp is prime and n>1n>1 is a small intege...
The latest implementations of pairings allow efficient schemes for Pairing Based Cryptography. These make the use of pairings suitable for small and constrained devices (smart phones, smart cards. ....
Pairing-based cryptography (PBC) has many elegant properties. It is claimed that PBC can offer a desired security level with smaller parameters as the general elliptic curve cryptography (ECC). In t...
Pairings are typically implemented using ordinary pairingfriendly elliptic curves. The two input groups of the pairing function are groups of elliptic curve points, while the target group lies in th...
Improved Side Channel Attacks on Pairing Based Cryptography     implementation       font style='font-size:12px;'> 2012/6/14
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
Improved Side Channel Attacks on Pairing Based Cryptography     implementation       font style='font-size:12px;'> 2012/3/20
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
Improved Side Channel Attacks on Pairing Based Cryptography     implementation       font style='font-size:12px;'> 2012/8/28
Techniques from pairing based cryptography (PBC) are used in an in- creasing number of cryptographic schemes. With progress regarding efficient implementations, pairings also become interesting for ap...
A cryptographic pairing evaluates as an element in an ex- tension field, and the evaluation itself involves a considerable amount of extension field arithmetic. It is recognised that organising the ...
Elliptic curves suitable for pairing based cryptography     Elliptic curves  pairing  cryptography       font style='font-size:12px;'> 2009/4/9
Elliptic curves suitable for pairing based cryptography.
Although identity based cryptography o ers a number of functional advantages over conventional public key methods, the computational costs are significantly greater. The dominant part of this cost i...
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography.
PAIRING-BASED CRYPTOGRAPHY AT HIGH SECURITY LEVELS     public key cryptography  elliptic curve  Weil pairing  Tate pairing       font style='font-size:12px;'> 2009/1/20
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A no- table success in this area was the elegant solution by Boneh and F...
High Security Pairing-Based Cryptography Revisited     high security  pairing-based  cryptography       font style='font-size:12px;'> 2008/10/29
The security and performance of pairing based cryptography has provoked a large volume of research, in part because of the exciting new cryptographic schemes that it underpins. We re-examine how one...
Arithmetic Operators for Pairing-Based Cryptography     finite field arithmetic  elliptic curve  hardware accelerator  FPGA       font style='font-size:12px;'> 2008/9/10
Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of protocols. Software implementations being ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...