default search action
Pairing 2008: Egham, UK
- Steven D. Galbraith, Kenneth G. Paterson:
Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings. Lecture Notes in Computer Science 5209, Springer 2008, ISBN 978-3-540-85503-3
Invited Talks
- Liqun Chen, Paul Morrissey, Nigel P. Smart:
Pairings in Trusted Computing. 1-17 - Florian Hess:
Pairing Lattices. 18-38 - Xavier Boyen:
The Uber-Assumption Family. 39-56
Cryptography I
- Tatsuaki Okamoto, Katsuyuki Takashima:
Homomorphic Encryption and Signatures from Vector Decomposition. 57-74 - Vincenzo Iovino, Giuseppe Persiano:
Hidden-Vector Encryption with Groups of Prime Order. 75-88
Mathematics
- Frederik Vercauteren:
The Hidden Root Problem. 89-99 - Reinier Bröker, Denis Xavier Charles, Kristin E. Lauter:
Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography. 100-112 - Kirsten Eisenträger, Dimitar Jetchev, Kristin E. Lauter:
Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group. 113-125
Constructing Pairing Friendly Curves
- Ezekiel J. Kachisa, Edward F. Schaefer, Michael Scott:
Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field. 126-135 - Satoru Tanaka, Ken Nakamula:
Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials. 136-145 - David Freeman:
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties. 146-163 - Mitsuru Kawazoe, Tetsuya Takahashi:
Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y2=x5ax. 164-177
Implementation of Pairings
- Yasuyuki Nogami, Masataka Akane, Yumi Sakemi, Hidehiro Katou, Yoshitaka Morikawa:
Integer Variable chi-Based Ate Pairing. 178-191 - M. Prem Laxman Das, Palash Sarkar:
Pairing Computation on Twisted Edwards Form Elliptic Curves. 192-210 - Steven D. Galbraith, Michael Scott:
Exponentiation in Pairing-Friendly Groups Using Homomorphisms. 211-224 - Christian Robenhagen Ravnshøj:
Generators for the l-Torsion Subgroup of Jacobians of Genus Two Curves. 225-242 - Xinxin Fan, Guang Gong, David Jao:
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. 243-264 - Steven D. Galbraith, Xibin Lin, David J. Mireles Morales:
Pairings on Hyperelliptic Curves with a Real Model. 265-281
Hardware Implementation
- Yuto Kawahara, Kazumaro Aoki, Tsuyoshi Takagi:
Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. 282-296 - Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez:
A Comparison between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m. 297-315
Cryptography II
- Wei Gao, Guilin Wang, Xueli Wang, Fei Li:
One-Round ID-Based Blind Signature Scheme without ROS Assumption. 316-331 - Benoît Libert, Damien Vergnaud:
Tracing Malicious Proxies in Proxy Re-encryption. 332-353 - Kenneth G. Paterson, Sriramkrishnan Srinivasan:
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. 354-375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.