
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 44 matches
- 2020
- Kai Kinoshita, Koutarou Suzuki:
Accelerating Beta Weil Pairing with Precomputation and Multi-pairing Techniques. IWSEC 2020: 261-281 - 2019
- N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, V. Ch. Venkaiah:
Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks. Int. J. Netw. Secur. 21(6): 930-936 (2019) - Yunqi Feng
, Weile Zhang
, Yinghao Ge
, Hai Lin
:
Frequency Synchronization in Distributed Antenna Systems: Pairing-Based Multi-CFO Estimation, Theoretical Analysis, and Optimal Pairing Scheme. IEEE Trans. Commun. 67(4): 2924-2938 (2019) - 2017
- Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa:
A Weil Pairing on a Family of Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 62-72 (2017) - 2014
- Ren-Junn Hwang, Yu-Kai Hsiao:
Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks. Comput. J. 57(10): 1557-1569 (2014) - 2013
- Bing-Chang Chen, Her-Tyan Yeh
:
Secure proxy signature schemes from the Weil pairing. J. Supercomput. 65(2): 496-506 (2013) - Jian Shen, Jin Wang, Yuhui Zheng, Jianwei Zhang, Shunfeng Wang:
A Novel Verifiably Encrypted Signature from Weil Pairing. EMC/HumanCom 2013: 603-607 - Sutirtha Sanyal:
A Novel Proof on Weil Pairing. IACR Cryptol. ePrint Arch. 2013: 285 (2013) - Takakazu Satoh:
On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves. IACR Cryptol. ePrint Arch. 2013: 532 (2013) - 2012
- Debiao He, Jianhua Chen:
Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing. Int. J. Electron. Secur. Digit. Forensics 4(4): 244-251 (2012) - Ya-Fen Chang, Wei-Liang Tai, Chung-Yi Lin:
A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-Based Cryptographic Approaches. Inf. Technol. Control. 41(1): 60-68 (2012) - Rkia Aouinatou, Mostafa Belkasmi:
Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil. IACR Cryptol. ePrint Arch. 2012: 277 (2012) - 2011
- Gang Yu, Hongzhi Yang, Shuqin Fan, Yong Shen, Wenbao Han:
Efficient Certificateless Signcryption Scheme from Weil Pairing. J. Networks 6(9): 1280-1287 (2011) - Diego F. Aranha
, Edward Knapp, Alfred Menezes, Francisco Rodríguez-Henríquez:
Parallelizing the Weil and Tate Pairings. IMACC 2011: 275-295 - 2010
- Yong Zeng, Jianfeng Ma, Sang-Jae Moon:
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing. Int. J. Netw. Secur. 10(3): 188-193 (2010) - Yong Zeng, Jianfeng Ma, Sang-Jae Moon:
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing. Int. J. Netw. Secur. 11(1): 17-22 (2010) - 2009
- Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. UIC 2009: 310-324 - David Mandell Freeman, Takakazu Satoh:
Constructing pairing-friendly hyperelliptic curves using Weil restriction. IACR Cryptol. ePrint Arch. 2009: 103 (2009) - 2008
- Takakazu Satoh:
Closed formulae for the Weil pairing inversion. Finite Fields Their Appl. 14(3): 743-765 (2008) - Changan Zhao, Fangguo Zhang, Dongqing Xie:
Reducing the Complexity of the Weil Pairing Computation. IACR Cryptol. ePrint Arch. 2008: 212 (2008) - 2006
- Ian F. Blake, V. Kumar Murty, Guangwu Xu:
Refinements of Miller's algorithm for computing the Weil/Tate pairing. J. Algorithms 58(2): 134-149 (2006) - Hung-Yu Chien:
Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings. IACR Cryptol. ePrint Arch. 2006: 13 (2006) - 2005
- Chu-Hsing Lin, Hsiu-Hsia Lin:
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. AINA 2005: 135-138 - Sheng-Hua Shiau, Ren-Junn Hwang, Ming-Fuu Lin:
Key Agreement Protocol Based on Weil Pairing. AINA 2005: 597-602 - Cheol-Min Park, Myung-Hwan Kim, Moti Yung:
A Remark on Implementing the Weil Pairing. CISC 2005: 313-323 - Steven D. Galbraith:
The Weil pairing on elliptic curves over C. IACR Cryptol. ePrint Arch. 2005: 323 (2005) - Junghyun Nam, Seungjoo Kim, Dongho Won:
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing. IACR Cryptol. ePrint Arch. 2005: 269 (2005) - 2004
- Dan Boneh, Ben Lynn, Hovav Shacham:
Short Signatures from the Weil Pairing. J. Cryptol. 17(4): 297-319 (2004) - Victor S. Miller:
The Weil Pairing, and Its Efficient Calculation. J. Cryptol. 17(4): 235-261 (2004) - Theodoulos Garefalakis:
The generalized Weil pairing and the discrete logarithm problem on elliptic curves. Theor. Comput. Sci. 321(1): 59-72 (2004)
skipping 14 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-01-17 08:21 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint