Group-based cryptography

Results: 52



#Item
21ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School  of Engineering and Science

ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 01:09:45
22Next Generation X.509 Services Comodo EPKI Manager Instant security for your web operations, internal networks and employee’s email •	Easy to use web based console •	Issue high quality, fully trusted

Next Generation X.509 Services Comodo EPKI Manager Instant security for your web operations, internal networks and employee’s email • Easy to use web based console • Issue high quality, fully trusted

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2014-02-03 11:06:55
23Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups David Mandell Freeman Stanford University, USA  Eurocrypt 2010

Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups David Mandell Freeman Stanford University, USA Eurocrypt 2010

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-07-03 02:36:48
24Efficient Algorithms for Pairing-Based Cryptosystems Paulo S. L. M. Barreto1 , Hae Y. Kim1 , Ben Lynn2 , and Michael Scott3 1

Efficient Algorithms for Pairing-Based Cryptosystems Paulo S. L. M. Barreto1 , Hae Y. Kim1 , Ben Lynn2 , and Michael Scott3 1

Add to Reading List

Source URL: doras.dcu.ie

Language: English - Date: 2009-12-03 09:35:00
25Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]

Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-06-24 08:19:14
26.  Variants of the Montgomery form based on Theta functions Pierrick Gaudry [removed]

. Variants of the Montgomery form based on Theta functions Pierrick Gaudry [removed]

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2006-11-15 13:29:11
27Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
28Microsoft Word - Seagate TCG Enterprise SSC SED - FIPS 140 Module Security Policy.docx

Microsoft Word - Seagate TCG Enterprise SSC SED - FIPS 140 Module Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-09 11:08:06
29Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University

Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 09:24:22
30Microsoft Word - 9f - Seagate Secure® TCG Opal SSC SED FIPS[removed]Module Security Policy rev 1.4.docx

Microsoft Word - 9f - Seagate Secure® TCG Opal SSC SED FIPS[removed]Module Security Policy rev 1.4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 10:58:40