


default search action
Pairing 2008: Egham, UK
- Steven D. Galbraith, Kenneth G. Paterson:

Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings. Lecture Notes in Computer Science 5209, Springer 2008, ISBN 978-3-540-85503-3
Invited Talks
- Liqun Chen

, Paul Morrissey, Nigel P. Smart:
Pairings in Trusted Computing. 1-17 - Florian Hess:

Pairing Lattices. 18-38 - Xavier Boyen:

The Uber-Assumption Family. 39-56
Cryptography I
- Tatsuaki Okamoto, Katsuyuki Takashima:

Homomorphic Encryption and Signatures from Vector Decomposition. 57-74 - Vincenzo Iovino

, Giuseppe Persiano:
Hidden-Vector Encryption with Groups of Prime Order. 75-88
Mathematics
- Frederik Vercauteren

:
The Hidden Root Problem. 89-99 - Reinier Bröker, Denis Xavier Charles, Kristin E. Lauter:

Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography. 100-112 - Kirsten Eisenträger, Dimitar Jetchev, Kristin E. Lauter:

Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group. 113-125
Constructing Pairing Friendly Curves
- Ezekiel J. Kachisa, Edward F. Schaefer, Michael Scott:

Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field. 126-135 - Satoru Tanaka, Ken Nakamula:

Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials. 136-145 - David Freeman

:
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties. 146-163 - Mitsuru Kawazoe, Tetsuya Takahashi:

Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y2=x5ax. 164-177
Implementation of Pairings
- Yasuyuki Nogami, Masataka Akane, Yumi Sakemi, Hidehiro Katou, Yoshitaka Morikawa:

Integer Variable chi-Based Ate Pairing. 178-191 - M. Prem Laxman Das

, Palash Sarkar:
Pairing Computation on Twisted Edwards Form Elliptic Curves. 192-210 - Steven D. Galbraith

, Michael Scott:
Exponentiation in Pairing-Friendly Groups Using Homomorphisms. 211-224 - Christian Robenhagen Ravnshøj:

Generators for the l-Torsion Subgroup of Jacobians of Genus Two Curves. 225-242 - Xinxin Fan, Guang Gong, David Jao

:
Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. 243-264 - Steven D. Galbraith

, Xibin Lin, David J. Mireles Morales:
Pairings on Hyperelliptic Curves with a Real Model. 265-281
Hardware Implementation
- Yuto Kawahara, Kazumaro Aoki, Tsuyoshi Takagi:

Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. 282-296 - Jean-Luc Beuchat

, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez:
A Comparison between Hardware Accelerators for the Modified Tate Pairing over F2m and F3m. 297-315
Cryptography II
- Wei Gao, Guilin Wang, Xueli Wang, Fei Li:

One-Round ID-Based Blind Signature Scheme without ROS Assumption. 316-331 - Benoît Libert, Damien Vergnaud

:
Tracing Malicious Proxies in Proxy Re-encryption. 332-353 - Kenneth G. Paterson, Sriramkrishnan Srinivasan:

Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. 354-375

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














