Author:
Bertoni Guido M.,Breveglieri Luca,Chen Liqun,Fragneto Pasqualina,Harrison Keith A.,Pelosi Gerardo
Subject
Hardware and Architecture,Information Systems,Software
Reference40 articles.
1. Adi Shamir, 1984. Identity-Based Cryptosystems and Signature Schemes. In: CRYPTO, pp. 47–53.
2. The improbability that an elliptic curve has subexponential discrete log problem under the Menezes–Okamoto–Vanstone algorithm;Balasubramanian;Journal of Cryptology,1998
3. Barreto, Paulo S.L., 2007. The Pairing-based Crypto Lounge. .
4. Efficient algorithms for pairing-based cryptosystems;Barreto,2002
5. Constructing elliptic curves with prescribed embedding degrees;Barreto,2002
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献