21![ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science](https://www.pdfsearch.io/img/a2fa367c4d164407254292edac519d59.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-12-04 01:09:45
|
---|
22![Next Generation X.509 Services Comodo EPKI Manager Instant security for your web operations, internal networks and employee’s email • Easy to use web based console • Issue high quality, fully trusted Next Generation X.509 Services Comodo EPKI Manager Instant security for your web operations, internal networks and employee’s email • Easy to use web based console • Issue high quality, fully trusted](https://www.pdfsearch.io/img/d8fd0e0c4f2949a865f24f76ab287b9b.jpg) | Add to Reading ListSource URL: www.comodo.comLanguage: English - Date: 2014-02-03 11:06:55
|
---|
23![Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups David Mandell Freeman Stanford University, USA Eurocrypt 2010 Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups David Mandell Freeman Stanford University, USA Eurocrypt 2010](https://www.pdfsearch.io/img/ba788f92a8b8b802490f86cb9f033844.jpg) | Add to Reading ListSource URL: theory.stanford.eduLanguage: English - Date: 2010-07-03 02:36:48
|
---|
24![Efficient Algorithms for Pairing-Based Cryptosystems Paulo S. L. M. Barreto1 , Hae Y. Kim1 , Ben Lynn2 , and Michael Scott3 1 Efficient Algorithms for Pairing-Based Cryptosystems Paulo S. L. M. Barreto1 , Hae Y. Kim1 , Ben Lynn2 , and Michael Scott3 1](https://www.pdfsearch.io/img/25fc5ee451d9fc7b517eabdefcc3968c.jpg) | Add to Reading ListSource URL: doras.dcu.ieLanguage: English - Date: 2009-12-03 09:35:00
|
---|
25![Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed] Pairing-Based Cryptographic Protocols : A Survey Ratna Dutta, Rana Barua and Palash Sarkar Cryptology Research Group Stat-Math and Applied Statistics Unit 203, B. T. Road, Kolkata India[removed]](https://www.pdfsearch.io/img/cf7a3690c3e0ac7adab354a383c96b74.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-06-24 08:19:14
|
---|
26![. Variants of the Montgomery form based on Theta functions Pierrick Gaudry [removed] . Variants of the Montgomery form based on Theta functions Pierrick Gaudry [removed]](https://www.pdfsearch.io/img/af0b12cfa409b3b467fb9e45dbfe671e.jpg) | Add to Reading ListSource URL: www.fields.utoronto.caLanguage: English - Date: 2006-11-15 13:29:11
|
---|
27![Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed] Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]](https://www.pdfsearch.io/img/37a706f36c5d67bc8113132da0af6d54.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2008-09-15 00:54:54
|
---|
28![Microsoft Word - Seagate TCG Enterprise SSC SED - FIPS 140 Module Security Policy.docx Microsoft Word - Seagate TCG Enterprise SSC SED - FIPS 140 Module Security Policy.docx](https://www.pdfsearch.io/img/35929bd8a64a840caacbd0ca320be3a4.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-01-09 11:08:06
|
---|
29![Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based San Ling, Khoa Nguyen, Huaxiong Wang Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University](https://www.pdfsearch.io/img/cc7ce7f2134a8775a1a8c55c8d2dda3b.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-01-09 09:24:22
|
---|
30![Microsoft Word - 9f - Seagate Secure® TCG Opal SSC SED FIPS[removed]Module Security Policy rev 1.4.docx Microsoft Word - 9f - Seagate Secure® TCG Opal SSC SED FIPS[removed]Module Security Policy rev 1.4.docx](https://www.pdfsearch.io/img/560d5134e140c145353f8ba55cb19e09.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2014-12-08 10:58:40
|
---|