[PDF] Top 20 Efficient Computation of Miller's Algorithm in Pairing-Based Cryptography
Has 10000 "Efficient Computation of Miller's Algorithm in Pairing-Based Cryptography" found on our website. Below are the top 20 most common "Efficient Computation of Miller's Algorithm in Pairing-Based Cryptography".
Efficient Computation of Miller's Algorithm in Pairing-Based Cryptography
... proposed algorithm introduces a right-to-left version algorithm compared to the fact that the original Miller’s algorithm works only in the fashion of ...new algorithm introduces parallelable ... See full document
86
Pairing computation on Edwards curves with high-degree twists
... Pairing-based cryptography has been one of the most active areas in elliptic curve cryptography since ...implementing pairing- based cryptography. The most ... See full document
14
Efficient Implementations of Pairing-Based Cryptography on Embedded Systems
... Pairing based cryptosystems are being implemented on different platforms such as low- power and mobile ...support efficient and faster implementations of ...scheme based on reduction of one ... See full document
92
An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
... In general, a denial-of-service (DoS) attack can disrupt the availability of the authentication between the clients and the server. If the server undertakes too many computationally expensive cryptographic opera- tions, ... See full document
12
A survey of Fault Attacks in Pairing Based Cryptography
... the cryptography community to find a protocol based on the user identity ...scheme based on pairings [10]. The general scheme of an identity based encryption is described in [10] and several ... See full document
21
Efficient Pairings Computation on Jacobi Quartic Elliptic Curves
... the computation of the Tate pairing, Ate pairing and its variations on the special Jacobi quartic elliptic curve Y 2 = dX 4 + Z 4 ...Miller’s algorithm to compute the Tate ...Miller’s ... See full document
23
Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction
... of Pairing Computation. Delegation of pairing computation to more powerful and possibly untrusted servers is therefore a cost-effective way of realizing pairing-based ...unique ... See full document
37
Swarm Intelligence and Evolutionary Computation based Cryptography and Cryptanalysis of 4 round DES algorithm
... EC algorithm, namely PSO method is applied for the ...Evolutionary computation (EC) is a branch of the computational intelligence; EC algorithms have got significant importance in determining ... See full document
10
Accelerating the Final Exponentiation in the Computation of the Tate Pairings
... Miller algorithm computes Miller function in log r operations, called Miller ...24], Miller length can be further reduced by defining new pairings based on the Tate ...Tate ... See full document
13
Prominent Privacy Mechanism using Tickets Granting Service for Wireless Networks
... an efficient handover authentication protocol for practical wireless ...uses pairing based cryptography to secure handover process and achieves a fast handover authentication based on ... See full document
6
Modified RSA Cryptosystem
... is based on only two prime numbers which is an efficient algorithm for preventing an unauthorized access over the ...cryptosystem algorithm by using three prime numbers which provides better ... See full document
5
An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing
... Certificate-based cryptography (CBC) is a novel public-key cryptographic primitive that has many attractive ...public-key cryptography and the key-escrow problem in identity-based ...a ... See full document
15
Efficient Computation For Hyper Elliptic Curve Based Cryptography
... In this thesis, a brief introduction is provided in the first chapter. Then, in chapter 2 the mathematical background of groups, rings, finite field and basic introduction of Hyper Elliptic Curve with examples. Chapter ... See full document
134
Subgroup security in pairing-based cryptography
... a pairing library written in C to obtain the performance numbers in Table 2, benchmarked on an Intel Xeon E5-2620 clocked at ...other pairing libraries as it was written entirely in C without using any ... See full document
25
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography
... The remainder of this paper is organized as follows. In §2 we give some examples of the difficulties and limitations of interpreting asymptotic results in practice. Concise overviews of the NFS and the Tower Number Field ... See full document
22
Highly Secure Method based on Ciphertext Policy Attribute based Encryption in Hadoop System
... CP-ABE based broadcast encryption scheme that supports direct user ...not efficient to apply to cloud storage systems as mapping each user’s identity to an attribute can make the ciphertext growing ... See full document
5
An Efficient Algorithm for the Numerical Computation of the Complex Eigenpair of a Matrix
... In this section, we proof the main result in this paper which states the condition under which the Jacobian matrix (8) (for P = I ) is non-singular at the root, that is x ∗ = ( x ∗ , λ ∗ ) . This is then followed by a ... See full document
13
Securing Healthcare Information in Cloud
... K. J. Modi and N. Kapadia [4] have proposed a framework that gives a solution to secure the healthcare information in cloud. This method supports hybrid approach with the combination of linear network coding and ... See full document
5
Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups
... proofs based on the simulation, the rewinding techniques have been commonly ...computers. Based on the definition, Zhandry proposed a construction of secure identity-based encryption in the quantum ... See full document
36
Secure Multiparty Computation between Distrusted Networks Terminals
... local computation can be done without invocations of ...this algorithm only requires O(log n) cross- party secure comparison and this results in a communi- cation cost of O(log n log N), a significant ... See full document
10
Related subjects