Pairings in Trusted Computing

Abstract

Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly… (More)
DOI: 10.1007/978-3-540-85538-5_1

5 Figures and Tables

Topics

Statistics

0510152009201020112012201320142015201620172018
Citations per Year

60 Citations

Semantic Scholar estimates that this publication has 60 citations based on the available data.

See our FAQ for additional information.

  • Presentations referencing similar topics