Pages that link to "Item:Q2010589"
From MaRDI portal
The following pages link to Updating key size estimations for pairings (Q2010589):
Displaying 31 items.
- Multi-party revocation in sovrin: performance through distributed trust (Q826287) (← links)
- Computing discrete logarithms in \(\mathbb F_{p^6}\) (Q1746956) (← links)
- A short-list of pairing-friendly curves resistant to special TNFS at the 128-bit security level (Q2055706) (← links)
- Group signatures with user-controlled and sequential linkability (Q2061926) (← links)
- Identity-based authenticated encryption with identity confidentiality (Q2067611) (← links)
- Hardware implementation of multiplication over quartic extension fields (Q2079983) (← links)
- Hashing to elliptic curves of \(j\)-invariant 1728 (Q2120982) (← links)
- Efficient hash maps to \(\mathbb{G}_2\) on BLS curves (Q2140834) (← links)
- LOVE a pairing (Q2146100) (← links)
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications (Q2147256) (← links)
- Faster beta Weil pairing on BLS pairing friendly curves with odd embedding degree (Q2163356) (← links)
- Families of SNARK-friendly 2-chains of elliptic curves (Q2170053) (← links)
- Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation (Q2182074) (← links)
- Improving the efficiency of re-randomizable and replayable CCA secure public key encryption (Q2229277) (← links)
- Fast, compact, and expressive attribute-based encryption (Q2234469) (← links)
- Beta Weil pairing revisited (Q2313463) (← links)
- Still wrong use of pairings in cryptography (Q2335138) (← links)
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984) (← links)
- Tower building technique on elliptic curve with embedding degree 18 (Q2689396) (← links)
- Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing (Q2894363) (← links)
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange (Q5918309) (← links)
- A survey of elliptic curves for proof systems (Q6063127) (← links)
- Fast subgroup membership testings for \(\mathbb{G}_1, \mathbb{G}_2\) and \(\mathbb{G}_T\) on pairing-friendly curves (Q6074017) (← links)
- A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation (Q6108852) (← links)
- Compact structure-preserving signatures with almost tight security (Q6134421) (← links)
- The state of the union: union-only signatures for data aggregation (Q6134829) (← links)
- Higher-dimensional sieving for the number field sieve algorithms (Q6165871) (← links)
- New versions of Miller-loop secured against side-channel attacks (Q6169018) (← links)
- Curves with Fast Computations in the First Pairing Group (Q6488030) (← links)
- Making the identity-based Diffie-Hellman key exchange efficiently revocable (Q6619930) (← links)
- zk-Bench: a toolset for comparative evaluation and performance benchmarking of SNARKs (Q6660380) (← links)