• No results found

[PDF] Top 20 Efficient Computation of Miller's Algorithm in Pairing-Based Cryptography

Has 10000 "Efficient Computation of Miller's Algorithm in Pairing-Based Cryptography" found on our website. Below are the top 20 most common "Efficient Computation of Miller's Algorithm in Pairing-Based Cryptography".

Efficient Computation of Miller's Algorithm in Pairing-Based Cryptography

Efficient Computation of Miller's Algorithm in Pairing-Based Cryptography

... proposed algorithm introduces a right-to-left version algorithm compared to the fact that the original Miller’s algorithm works only in the fashion of ...new algorithm introduces parallelable ... See full document

86

Pairing  computation  on  Edwards  curves  with  high-degree  twists

Pairing computation on Edwards curves with high-degree twists

... Pairing-based cryptography has been one of the most active areas in elliptic curve cryptography since ...implementing pairing- based cryptography. The most ... See full document

14

Efficient Implementations of Pairing-Based Cryptography on Embedded Systems

Efficient Implementations of Pairing-Based Cryptography on Embedded Systems

... Pairing based cryptosystems are being implemented on different platforms such as low- power and mobile ...support efficient and faster implementations of ...scheme based on reduction of one ... See full document

92

An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

... In general, a denial-of-service (DoS) attack can disrupt the availability of the authentication between the clients and the server. If the server undertakes too many computationally expensive cryptographic opera- tions, ... See full document

12

A  survey  of  Fault  Attacks  in  Pairing  Based  Cryptography

A survey of Fault Attacks in Pairing Based Cryptography

... the cryptography community to find a protocol based on the user identity ...scheme based on pairings [10]. The general scheme of an identity based encryption is described in [10] and several ... See full document

21

Efficient  Pairings  Computation  on  Jacobi  Quartic  Elliptic  Curves

Efficient Pairings Computation on Jacobi Quartic Elliptic Curves

... the computation of the Tate pairing, Ate pairing and its variations on the special Jacobi quartic elliptic curve Y 2 = dX 4 + Z 4 ...Miller’s algorithm to compute the Tate ...Miller’s ... See full document

23

Fully  Verifiable  Secure  Delegation  of  Pairing  Computation:  Cryptanalysis   and  An  Efficient  Construction

Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction

... of Pairing Computation. Delegation of pairing computation to more powerful and possibly untrusted servers is therefore a cost-effective way of realizing pairing-based ...unique ... See full document

37

Swarm Intelligence and Evolutionary Computation based Cryptography and Cryptanalysis of 4 round DES algorithm

Swarm Intelligence and Evolutionary Computation based Cryptography and Cryptanalysis of 4 round DES algorithm

... EC algorithm, namely PSO method is applied for the ...Evolutionary computation (EC) is a branch of the computational intelligence; EC algorithms have got significant importance in determining ... See full document

10

Accelerating  the  Final  Exponentiation  in  the  Computation  of  the  Tate  Pairings

Accelerating the Final Exponentiation in the Computation of the Tate Pairings

... Miller algorithm computes Miller function in log r operations, called Miller ...24], Miller length can be further reduced by defining new pairings based on the Tate ...Tate ... See full document

13

Prominent Privacy Mechanism using Tickets Granting Service for Wireless Networks

Prominent Privacy Mechanism using Tickets Granting Service for Wireless Networks

... an efficient handover authentication protocol for practical wireless ...uses pairing based cryptography to secure handover process and achieves a fast handover authentication based on ... See full document

6

Modified RSA Cryptosystem

Modified RSA Cryptosystem

... is based on only two prime numbers which is an efficient algorithm for preventing an unauthorized access over the ...cryptosystem algorithm by using three prime numbers which provides better ... See full document

5

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing

... Certificate-based cryptography (CBC) is a novel public-key cryptographic primitive that has many attractive ...public-key cryptography and the key-escrow problem in identity-based ...a ... See full document

15

Efficient Computation For Hyper Elliptic Curve Based Cryptography

Efficient Computation For Hyper Elliptic Curve Based Cryptography

... In this thesis, a brief introduction is provided in the first chapter. Then, in chapter 2 the mathematical background of groups, rings, finite field and basic introduction of Hyper Elliptic Curve with examples. Chapter ... See full document

134

Subgroup  security  in  pairing-based  cryptography

Subgroup security in pairing-based cryptography

... a pairing library written in C to obtain the performance numbers in Table 2, benchmarked on an Intel Xeon E5-2620 clocked at ...other pairing libraries as it was written entirely in C without using any ... See full document

25

Challenges  with  Assessing  the  Impact  of  NFS  Advances  on  the  Security  of  Pairing-based  Cryptography

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography

... The remainder of this paper is organized as follows. In §2 we give some examples of the difficulties and limitations of interpreting asymptotic results in practice. Concise overviews of the NFS and the Tower Number Field ... See full document

22

Highly Secure Method based on Ciphertext Policy Attribute based Encryption in Hadoop System

Highly Secure Method based on Ciphertext Policy Attribute based Encryption in Hadoop System

... CP-ABE based broadcast encryption scheme that supports direct user ...not efficient to apply to cloud storage systems as mapping each user’s identity to an attribute can make the ciphertext growing ... See full document

5

An Efficient Algorithm for the Numerical Computation of the Complex Eigenpair of a Matrix

An Efficient Algorithm for the Numerical Computation of the Complex Eigenpair of a Matrix

... In this section, we proof the main result in this paper which states the condition under which the Jacobian matrix (8) (for P = I ) is non-singular at the root, that is x ∗ = ( x ∗ , λ ∗ ) . This is then followed by a ... See full document

13

Securing Healthcare Information in Cloud

Securing Healthcare Information in Cloud

... K. J. Modi and N. Kapadia [4] have proposed a framework that gives a solution to secure the healthcare information in cloud. This method supports hybrid approach with the combination of linear network coding and ... See full document

5

Pairing  Cryptography  Meets  Isogeny:  A  New  Framework  of  Isogenous  Pairing  Groups

Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups

... proofs based on the simulation, the rewinding techniques have been commonly ...computers. Based on the definition, Zhandry proposed a construction of secure identity-based encryption in the quantum ... See full document

36

Secure Multiparty Computation between Distrusted Networks Terminals

Secure Multiparty Computation between Distrusted Networks Terminals

... local computation can be done without invocations of ...this algorithm only requires O(log n) cross- party secure comparison and this results in a communi- cation cost of O(log n log N), a significant ... See full document

10

Show all 10000 documents...