搜索结果: 1-7 共查到“军队指挥学 pairing based protocols”相关记录7条 . 查询时间(0.062 秒)
On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
public-key cryptography implement pairing-based protocols
2016/4/26
We observe that the conventional classification of pairings into Types 1, 2, 3 and 4 is not applicable to pairings from elliptic curves with embedding degree one. We define three kinds of pairings fro...
Fault attacks on pairing-based protocols revisited
Fault attacks pairing-based cryptography supersingular elliptic curves
2016/1/8
Several papers have studied fault attacks on computing a pairing value e(P, Q),
where P is a public point and Q is a secret point. In this paper, we observe that these attacks
are in fact effective ...
The advent of Pairing-based protocols has had a major impact on the applicability of cryptography to the solution of more complex real-world problems. However there has always been a question mark ove...
The advent of Pairing-based protocols has had a major impact on the applicability of cryptography to the solution of more complex real-world problems. However there has always been a question mark ove...
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
pairing-based cryptography Type 1 and type 4 pairings
2010/7/14
We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timings for Type 1 pairings derived ...
In [17, 18] we presented a pairing based DAA protocol in the asymmetric setting, along
with a “security proof”. Jiangtao Li has pointed out to us an attack against this published protocol,
thus our ...
Scaling security in pairing-based protocols
Cryptographic key sizes pairing-based cryptosystems
2009/2/7
In number theoretic cryptography there is always the prob-
lem of scaling-up security to a higher level. This usually means increasing
the size of the modulus, from, say 1024 bits to 2048 bits. In p...