Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Pairing-based cryptography

Pairing-based cryptography is the use of a pairing between elements of two cryptographic groups to a third group with a mapping to construct or… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Nowadays, telemedicine is an emerging healthcare service where the healthcare professionals can diagnose, evaluate, and treat a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2016
Review
2016
In the past two years there have been several advances in Number Field Sieve (NFS) algorithms for computing discrete logarithms… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Key distribution in wireless sensor networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptography (PKC) is indeed feasible on… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Current fault attacks against public key cryptography focus on traditional schemes, such as RSA and ECC, and, to a lesser extent… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Many research papers in pairing-based cryptography treat pairings as a ''black box''. These papers build cryptographic schemes… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In recent years, a large number of identity- based key agreement protocols from pairings have been proposed. Some of them are… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Preface Introduction to Public-Key Cryptography Mathematical Background Algebraic Background Background on p-adic Numbers… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?