113
click to vote
PKC
15 years 5 months ago
2004 Springer
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
123
click to vote
PKC
15 years 5 months ago
2004 Springer
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
105
Voted
PKC
15 years 5 months ago
2004 Springer
Let E be an elliptic curve defined over F2n . The inverse operation of point doubling, called point halving, can be done up to three times as fast as doubling. Some authors have t...
108
click to vote
PKC
15 years 5 months ago
2004 Springer
The isogeny for elliptic curve cryptosystems was initially used for the efficient improvement of order counting methods. Recently, Smart proposed the countermeasure using isogeny f...
PKC
15 years 5 months ago
2004 Springer |