The Generalized Weil Pairing and the Discrete Logarithm Problem on Elliptic Curves
LATIN '02 Proceedings of the 5th Latin American Symposium on Theoretical Informatics
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Supersingular Abelian Varieties in Cryptology
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Supersingular Curves in Cryptography
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Identity-based confirmer signatures from pairings over elliptic curves
Proceedings of the 4th ACM conference on Electronic commerce
On the complexity of the discrete logarithm and Diffie-Hellman problems
Journal of Complexity - Special issue on coding and cryptography
The generalized Weil pairing and the discrete logarithm problem on elliptic curves
Theoretical Computer Science - Latin American theorotical informatics
The dual receiver cryptosystem and its applications
Proceedings of the 11th ACM conference on Computer and communications security
Adaptive Security for Low Data Rate Networks
Wireless Personal Communications: An International Journal
Elliptic Curves Suitable for Pairing Based Cryptography
Designs, Codes and Cryptography
Self-certified signature scheme from pairings
Journal of Systems and Software
All-in-one group-oriented cryptosystem based on bilinear pairing
Information Sciences: an International Journal
Improved ID-based security framework for ad hoc network
Ad Hoc Networks
A mobile agent protected scheme using pairing-based cryptosystems
International Journal of Mobile Communications
Special polynomial families for generating more suitable pairing-friendly elliptic curves
EHAC'06 Proceedings of the 5th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
A pairing SW implementation for Smart-Cards
Journal of Systems and Software
Trace and revoke systems with short ciphertexts
Proceedings of the 2nd international conference on Security of information and networks
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Energy-efficient and non-interactive self-certification in MANETs
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Efficient computations of the Tate pairing for the large MOV degrees
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Constructing elliptic curves with prescribed embedding degrees
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
ID-based key agreement with anonymity for ad hoc networks
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
Reliable food traceability using RFID tagging
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Identity based encryption: Progress and challenges
Information Security Tech. Report
Enhanced Certificate-Based Encryption from pairings
Computers and Electrical Engineering
Local duality and the discrete logarithm problem
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
Implementing cryptographic pairings on smartcards
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Faster pairings using an elliptic curve with an efficient endomorphism
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
A remark on implementing the weil pairing
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Fast bilinear maps from the tate-lichtenbaum pairing on hyperelliptic curves
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Efficient computation of tate pairing in projective coordinate over general characteristic fields
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Distributed signcryption from pairings
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Pairings on elliptic curves over finite commutative rings
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
On the efficient implementation of pairing-based protocols
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Polynomial approximation of bilinear Diffie--Hellman maps
Finite Fields and Their Applications
Enhanced authentication for commercial video services
Security and Communication Networks
Implementing cryptographic pairings
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
ZigBee security using identity-based cryptography
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Tate pairing computation on jacobi's elliptic curves
Pairing'12 Proceedings of the 5th international conference on Pairing-Based Cryptography
Security weaknesses of a signature scheme and authenticated key agreement protocols
Information Processing Letters
Hi-index | 754.84 |
The Tate pairing is used to reduce the discrete logarithm (DL) problem on certain elliptic curves to the DL in the multiplicative group of finite fields