Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.
1111360268
Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.
54.99 In Stock
Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings

Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings

Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings

Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings

Paperback(2008)

$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 6-10 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.

Product Details

ISBN-13: 9783540855033
Publisher: Springer Berlin Heidelberg
Publication date: 10/10/2008
Series: Lecture Notes in Computer Science , #5209
Edition description: 2008
Pages: 377
Product dimensions: 6.10(w) x 9.20(h) x 0.90(d)

Table of Contents

Invited Talks.- Pairings in Trusted Computing.- Pairing Lattices.- The Uber-Assumption Family.- Cryptography I.- Homomorphic Encryption and Signatures from Vector Decomposition.- Hidden-Vector Encryption with Groups of Prime Order.- Mathematics.- The Hidden Root Problem.- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography.- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group.- Constructing Pairing Friendly Curves.- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field.- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials.- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties.- Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y2=x5+ax.- Implementation of Pairings.- Integer Variable χ–Based Ate Pairing.- Pairing Computation on Twisted Edwards Form Elliptic Curves.- Exponentiation in Pairing-Friendly Groups Using Homomorphisms.- Generators for ℓ-Torsion Subgroup of Jacobians of Genus Two Curves.- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.- Pairings on Hyperelliptic Curves with a Real Model.- Hardware Implementation.- Faster Implementation of— T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition.- A Comparison between Hardware Accelerators for the Modified Tate Pairing over and .- Cryptography II.- One-Round ID-Based Blind Signature Scheme without ROS Assumption.- Tracing Malicious Proxies in Proxy Re-encryption.- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.
From the B&N Reads Blog

Customer Reviews