|
|
|
|
LEADER |
06876cam a22010212 4500 |
001 |
0-1650596758 |
003 |
DE-627 |
005 |
20240122105237.0 |
007 |
cr uuu---uuuuu |
008 |
101203s2010 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642174551
|9 978-3-642-17455-1
|
024 |
7 |
|
|a 10.1007/978-3-642-17455-1
|2 doi
|
035 |
|
|
|a (DE-627)1650596758
|
035 |
|
|
|a (DE-576)334438942
|
035 |
|
|
|a (DE-599)BSZ334438942
|
035 |
|
|
|a (OCoLC)698517528
|
035 |
|
|
|a (ZBM)1200.94008
|
035 |
|
|
|a (DE-He213)978-3-642-17455-1
|
035 |
|
|
|a (EBP)040531279
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
084 |
|
|
|a SS 4800
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *94-06
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.62
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Joye, Marc
|4 aut
|
245 |
1 |
0 |
|a Pairing-Based Cryptography - Pairing 2010
|b 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
|c edited by Marc Joye, Atsuko Miyaji, Akira Otsuka
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2010
|
300 |
|
|
|a Online-Ressource (XIII, 467p. 37 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 6487
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
520 |
|
|
|a Efficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation -- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves -- Invited Talk 1 -- Some Security Topics with Possible Applications for Pairing-Based Cryptography -- Digital Signatures -- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange -- Anonymizable Signature and Its Construction from Pairings -- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication -- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares -- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability -- Key Agreement -- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange -- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement -- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys -- Invited Talk 2 -- Pairing-Based Non-interactive Zero-Knowledge Proofs -- Applications: Code Generation, Time-Released Encryption, Cloud Computing -- Designing a Code Generator for Pairing Based Cryptographic Functions -- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability -- Optimal Authenticated Data Structures with Multilinear Forms -- Point Encoding and Pairing-Friendly Curves -- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves -- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time -- A New Method for Constructing Pairing-Friendly Abelian Surfaces -- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves -- ID-Based Encryption Schemes -- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks -- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts -- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman -- Invited Talk 3 -- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties -- Efficient Hardware, FPGAs, and Algorithms -- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves -- A Variant of Miller’s Formula and Algorithm -- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree -- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform.
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Computational complexity
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Cryptography.
|
655 |
|
7 |
|a Konferenzschrift
|y 2010
|z Kawamura-Yamanaka
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)7581976-4
|0 (DE-627)543941655
|0 (DE-576)271769076
|a Paarungsbasierte Kryptografie
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
700 |
1 |
|
|a Miyaji, Atsuko
|4 oth
|
700 |
1 |
|
|a Otsuka, Akira
|4 oth
|
776 |
1 |
|
|z 9783642174544
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Pairing-based cryptography - Pairing 2010
|d Berlin : Springer, 2010
|h XIII, 466 S.
|w (DE-627)63842593X
|w (DE-576)334755379
|z 364217454X
|z 9783642174544
|
830 |
|
0 |
|a Lecture notes in computer science
|v 6487
|9 6487
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-17455-1
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1200.94008
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SCS
|b 2010
|
912 |
|
|
|a ZDB-2-SXCS
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|b 2010
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.62
|j Datenstrukturen
|q SEPA
|0 (DE-627)106403265
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
950 |
|
|
|a Pairing-based cryptography
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Kryptosystem
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-17455-1
|9 DE-14
|
852 |
|
|
|a DE-14
|z 2011-07-20T14:57:52Z
|x epn:3337511872
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-17455-1
|9 DE-15
|
852 |
|
|
|a DE-15
|z 2011-05-16T16:31:54Z
|x epn:3337511961
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-17455-1
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|z 2011-01-26T14:19:44Z
|x epn:3337512046
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-17455-1
|9 DE-520
|
852 |
|
|
|a DE-520
|z 2010-12-03T09:53:11Z
|x epn:3337512100
|
980 |
|
|
|a 1650596758
|b 0
|k 1650596758
|o 334438942
|
SOLR
_version_ |
1789362143815008256 |
access_facet |
Electronic Resources |
author |
Joye, Marc |
author2 |
Miyaji, Atsuko, Otsuka, Akira |
author2_role |
oth, oth |
author2_variant |
a m am, a o ao |
author_facet |
Joye, Marc, Miyaji, Atsuko, Otsuka, Akira |
author_role |
aut |
author_sort |
Joye, Marc |
author_variant |
m j mj |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Efficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation -- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves -- Invited Talk 1 -- Some Security Topics with Possible Applications for Pairing-Based Cryptography -- Digital Signatures -- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange -- Anonymizable Signature and Its Construction from Pairings -- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication -- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares -- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability -- Key Agreement -- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange -- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement -- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys -- Invited Talk 2 -- Pairing-Based Non-interactive Zero-Knowledge Proofs -- Applications: Code Generation, Time-Released Encryption, Cloud Computing -- Designing a Code Generator for Pairing Based Cryptographic Functions -- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability -- Optimal Authenticated Data Structures with Multilinear Forms -- Point Encoding and Pairing-Friendly Curves -- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves -- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time -- A New Method for Constructing Pairing-Friendly Abelian Surfaces -- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves -- ID-Based Encryption Schemes -- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks -- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts -- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman -- Invited Talk 3 -- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties -- Efficient Hardware, FPGAs, and Algorithms -- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves -- A Variant of Miller’s Formula and Algorithm -- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree -- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform. |
ctrlnum |
(DE-627)1650596758, (DE-576)334438942, (DE-599)BSZ334438942, (OCoLC)698517528, (ZBM)1200.94008, (DE-He213)978-3-642-17455-1, (EBP)040531279 |
de15_date |
2011-05-16T16:31:54Z |
doi_str_mv |
10.1007/978-3-642-17455-1 |
era_facet |
2010 |
facet_912a |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Paarungsbasierte Kryptografie |
finc_class_facet |
Informatik, Allgemeines, Mathematik |
finc_id_str |
0001455376 |
fincclass_txtF_mv |
science-computerscience |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2010 Kawamura-Yamanaka (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Kawamura-Yamanaka |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
6487 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1650596758 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2010 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2010 |
institution |
DE-14, DE-Zi4, DE-520, DE-15 |
is_hierarchy_id |
0-1650596758 |
is_hierarchy_title |
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings |
isbn |
9783642174551 |
isbn_isn_mv |
9783642174544, 364217454X |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1650596758 |
language |
English |
last_indexed |
2024-01-28T19:05:18.891Z |
local_heading_facet_dezwi2 |
Computer Communication Networks, Computer software, Computational complexity, Computer Science, Computer science, Data protection, Data encryption (Computer science), Coding theory, Discrete mathematics., Information theory., Computer networks ., Algorithms., Cryptography., Paarungsbasierte Kryptografie |
marc024a_ct_mv |
10.1007/978-3-642-17455-1 |
match_str |
joye2010pairingbasedcryptographypairing20104thinternationalconferenceyamanakahotspringjapandecember2010proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)6487 |
oclc_num |
698517528 |
physical |
Online-Ressource (XIII, 467p. 37 illus, digital) |
publishDate |
2010 |
publishDateSort |
2010 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
334438942 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)2462230 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 6487 |
series2 |
Lecture Notes in Computer Science ; 6487, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Joye, Marc aut, Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings edited by Marc Joye, Atsuko Miyaji, Akira Otsuka, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (XIII, 467p. 37 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6487, SpringerLink Bücher, Efficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation -- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves -- Invited Talk 1 -- Some Security Topics with Possible Applications for Pairing-Based Cryptography -- Digital Signatures -- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange -- Anonymizable Signature and Its Construction from Pairings -- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication -- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares -- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability -- Key Agreement -- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange -- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement -- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys -- Invited Talk 2 -- Pairing-Based Non-interactive Zero-Knowledge Proofs -- Applications: Code Generation, Time-Released Encryption, Cloud Computing -- Designing a Code Generator for Pairing Based Cryptographic Functions -- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability -- Optimal Authenticated Data Structures with Multilinear Forms -- Point Encoding and Pairing-Friendly Curves -- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves -- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time -- A New Method for Constructing Pairing-Friendly Abelian Surfaces -- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves -- ID-Based Encryption Schemes -- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks -- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts -- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman -- Invited Talk 3 -- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties -- Efficient Hardware, FPGAs, and Algorithms -- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves -- A Variant of Miller’s Formula and Algorithm -- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree -- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform., Computer Communication Networks, Computer software, Computational complexity, Computer Science, Computer science, Data protection, Data encryption (Computer science), Coding theory, Discrete mathematics., Information theory., Computer networks ., Algorithms., Cryptography., Konferenzschrift 2010 Kawamura-Yamanaka (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)7581976-4 (DE-627)543941655 (DE-576)271769076 Paarungsbasierte Kryptografie gnd, DE-101, Miyaji, Atsuko oth, Otsuka, Akira oth, 9783642174544, Buchausg. u.d.T. Pairing-based cryptography - Pairing 2010 Berlin : Springer, 2010 XIII, 466 S. (DE-627)63842593X (DE-576)334755379 364217454X 9783642174544, Lecture notes in computer science 6487 6487 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-17455-1 X:SPRINGER Verlag lizenzpflichtig Volltext, https://zbmath.org/?q=an:1200.94008 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://dx.doi.org/10.1007/978-3-642-17455-1 DE-14, DE-14 2011-07-20T14:57:52Z epn:3337511872, http://dx.doi.org/10.1007/978-3-642-17455-1 DE-15, DE-15 2011-05-16T16:31:54Z epn:3337511961, http://dx.doi.org/10.1007/978-3-642-17455-1 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:19:44Z epn:3337512046, http://dx.doi.org/10.1007/978-3-642-17455-1 DE-520, DE-520 2010-12-03T09:53:11Z epn:3337512100 |
spellingShingle |
Joye, Marc, Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings, Lecture notes in computer science, 6487, Efficient Software Implementation -- An Analysis of Affine Coordinates for Pairing Computation -- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves -- Invited Talk 1 -- Some Security Topics with Possible Applications for Pairing-Based Cryptography -- Digital Signatures -- A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange -- Anonymizable Signature and Its Construction from Pairings -- Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches -- Cryptographic Protocols -- Oblivious Transfer with Access Control : Realizing Disjunction without Duplication -- Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares -- Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability -- Key Agreement -- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange -- Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement -- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys -- Invited Talk 2 -- Pairing-Based Non-interactive Zero-Knowledge Proofs -- Applications: Code Generation, Time-Released Encryption, Cloud Computing -- Designing a Code Generator for Pairing Based Cryptographic Functions -- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability -- Optimal Authenticated Data Structures with Multilinear Forms -- Point Encoding and Pairing-Friendly Curves -- Deterministic Encoding and Hashing to Odd Hyperelliptic Curves -- Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time -- A New Method for Constructing Pairing-Friendly Abelian Surfaces -- Generating More Kawazoe-Takahashi Genus 2 Pairing-Friendly Hyperelliptic Curves -- ID-Based Encryption Schemes -- New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks -- Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts -- Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman -- Invited Talk 3 -- A Survey of Local and Global Pairings on Elliptic Curves and Abelian Varieties -- Efficient Hardware, FPGAs, and Algorithms -- Compact Hardware for Computing the Tate Pairing over 128-Bit-Security Supersingular Curves -- A Variant of Miller’s Formula and Algorithm -- Pairing Computation on Elliptic Curves with Efficiently Computable Endomorphism and Small Embedding Degree -- High Speed Flexible Pairing Cryptoprocessor on FPGA Platform., Computer Communication Networks, Computer software, Computational complexity, Computer Science, Computer science, Data protection, Data encryption (Computer science), Coding theory, Discrete mathematics., Information theory., Computer networks ., Algorithms., Cryptography., Konferenzschrift 2010 Kawamura-Yamanaka, Paarungsbasierte Kryptografie |
swb_id_str |
334438942 |
title |
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings |
title_auth |
Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings |
title_full |
Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings edited by Marc Joye, Atsuko Miyaji, Akira Otsuka |
title_fullStr |
Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings edited by Marc Joye, Atsuko Miyaji, Akira Otsuka |
title_full_unstemmed |
Pairing-Based Cryptography - Pairing 2010 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings edited by Marc Joye, Atsuko Miyaji, Akira Otsuka |
title_in_hierarchy |
6487. Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings (2010) |
title_short |
Pairing-Based Cryptography - Pairing 2010 |
title_sort |
pairing based cryptography pairing 2010 4th international conference yamanaka hot spring japan december 2010 proceedings |
title_sub |
4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings |
title_unstemmed |
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings |
topic |
Computer Communication Networks, Computer software, Computational complexity, Computer Science, Computer science, Data protection, Data encryption (Computer science), Coding theory, Discrete mathematics., Information theory., Computer networks ., Algorithms., Cryptography., Konferenzschrift 2010 Kawamura-Yamanaka, Paarungsbasierte Kryptografie |
topic_facet |
Computer Communication Networks, Computer software, Computational complexity, Computer Science, Computer science, Data protection, Data encryption (Computer science), Coding theory, Discrete mathematics., Information theory., Computer networks ., Algorithms., Cryptography., Konferenzschrift, Paarungsbasierte Kryptografie |
url |
https://doi.org/10.1007/978-3-642-17455-1, https://zbmath.org/?q=an:1200.94008, http://dx.doi.org/10.1007/978-3-642-17455-1 |