Pairings in Trusted Computing


Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly… (More)
DOI: 10.1007/978-3-540-85538-5_1

5 Figures and Tables



Citations per Year

60 Citations

Semantic Scholar estimates that this publication has 60 citations based on the available data.

See our FAQ for additional information.

  • Presentations referencing similar topics