Cargando…
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures
Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to di...
Autores principales: | Wang, Maocai, Dai, Guangming, Choo, Kim-Kwang Raymond, Jayaraman, Prem Prakash, Ranjan, Rajiv |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5001717/ https://www.ncbi.nlm.nih.gov/pubmed/27564373 http://dx.doi.org/10.1371/journal.pone.0161857 |
Ejemplares similares
-
Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016
por: Teruya, Tadanori
Publicado: (2019) -
Elliptic functions and elliptic curves
por: Du Val, Patrick
Publicado: (1973) -
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
por: Tidrea, Alexandra, et al.
Publicado: (2023) -
Elliptic curves
por: Husemöller, Dale
Publicado: (1987) -
Elliptic curves
por: Husemöller, Dale
Publicado: (2004)