• Publications
  • Influence
Efficient Algorithms for Pairing-Based Cryptosystems
TLDR
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. Expand
  • 1,084
  • 79
  • PDF
Pairing-Friendly Elliptic Curves of Prime Order
TLDR
A method to construct pairing-friendly elliptic curves of prime order and embedding degree k = 12 using large CM discriminants. Expand
  • 865
  • 63
  • PDF
Efficient pairing computation on supersingular Abelian varieties
TLDR
We present a general technique for the efficient computation of pairings on Jacobians of supersingular curves. Expand
  • 495
  • 48
  • PDF
MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes
TLDR
In this work, we propose two McEliece variants: one from Moderate Density Parity-Check (MDPC) codes and another from quasi-cyclic MDPC codes. Expand
  • 271
  • 38
  • PDF
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps
TLDR
We propose a new identity-based signcryption (IBSC) scheme built upon bilinear maps. Expand
  • 511
  • 33
  • PDF
A New Two-Party Identity-Based Authenticated Key Agreement
TLDR
We present a new two-party identity-based key agreement from bilinear maps that is more efficient than previously proposed schemes. Expand
  • 216
  • 20
  • PDF
Constructing Elliptic Curves with Prescribed Embedding Degrees
TLDR
Pairing-based cryptosystems depend on the existence of elliptic curve groups whose embedding degree is large enough to maintain a good security level, but small enough for arithmetic operations to be feasible. Expand
  • 208
  • 20
  • PDF
Compact McEliece Keys from Goppa Codes
TLDR
The classical McEliece cryptosystem is built upon the class of Goppa codes, which remains secure to this date in contrast to many other families of codes but leads to very large public keys. Expand
  • 183
  • 20
  • PDF
Demonstrating data possession and uncheatable data transfer
TLDR
We observe that a certain RSA-based secure hash function is homomorphic. Expand
  • 250
  • 16
  • PDF
A survey on key management mechanisms for distributed Wireless Sensor Networks
TLDR
Wireless Sensor Networks (WSNs) have a vast field of applications, including deployment in hostile environments. Expand
  • 205
  • 15
  • PDF