Back to Results
First PageMeta Content
Logarithms / Computational hardness assumptions / Modular arithmetic / Key size / Cryptanalysis / Pairing-based cryptography / Discrete logarithm / Public-key cryptography / Encryption / Cryptography / Abstract algebra / Mathematics


Document Date: 2013-09-12 01:05:36


Open Document

File Size: 326,94 KB

Share Result on Facebook

Company

Fujitsu Labs / Fujitsu Laboratories / /

Country

France / /

Facility

University of Rennes / Kyushu University / Rennes Institute of Mathematics / /

IndustryTerm

information security using cryptographic technology / internet shopping / conventional and new cryptographic technology / internet banking / information systems / data search / Data searching technology / /

Organization

Hakodate Future Univ. / Ministry of Defense in France / Kyushu University / University of Rennes 1 / Rennes Institute of Mathematics / NICT Kyushu Univ. / /

Technology

encryption / cryptography / pairing-based encryption / information security using cryptographic technology / Xeon processor / ID-based encryption / attacking algorithms / Data searching technology / /

SocialTag